Claim Missing Document
Check
Articles

Found 3 Documents
Search
Journal : JOIN (Jurnal Online Informatika)

Development of National Digital Evidence Metadata Bambang Sugiantoro
JOIN (Jurnal Online Informatika) Vol 4 No 1 (2019)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/join.v4i1.292

Abstract

The industrial era 4.0 has caused tremendous disruption in many sectors of life. The rapid development of information and communication technology has made the global industrial world undergo a revolution. The act of cyber-crime in Indonesia that utilizes computer equipment, mobile phones are increasingly increasing. The information in a file whose contents are explained about files is called metadata. The evidence items for cyber cases are divided into two types, namely physical evidence, and digital evidence. Physical evidence and digital evidence have different characteristics, the concept will very likely cause problems when applied to digital evidence. The management of national digital evidence that is associated with continued metadata is mostly carried out by researchers. Considering the importance of national digital evidence management solutions in the cyber-crime investigation process the research focused on identifying and modeling correlations with the digital image metadata security approach. Correlation analysis reads metadata characteristics, namely document files, sounds and digital evidence correlation analysis using standard file maker parameters, size, file type and time combined with digital image metadata. nationally designed the highest level of security is needed. Security-enhancing solutions can be encrypted against digital image metadata (EXIF). Read EXIF Metadata in the original digital image based on the EXIF 2.3 Standard ID Tag, then encrypt and insert it into the last line. The description process will return EXIF decryption results in the header image. This can secure EXIF Metadata information without changing the image quality
Performance Evaluation of Vehicular Ad Hoc Networks Considering Malicious Node Impact on Quality of Services Metrics Alfarizi, Naufal Faiz; Nuruzzaman, Muhammad Taufiq; Uyun, Shofwatul; Sugiantoro, Bambang; Abdullah, Mohd. Fikri Azli bin
JOIN (Jurnal Online Informatika) Vol 10 No 2 (2025)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/join.v10i2.1568

Abstract

Vehicular Ad Hoc Networks (VANETs), a subset of mobile ad hoc networks (MANETs), is essential for enabling communication between vehicles in intelligent transportation systems. However, their dynamic and decentralized nature exposes them to significant security threats, particularly from malicious nodes. Attacks such as black holes and wormholes can severely degrade network performance by causing packet loss and increasing end-to-end delays. This paper aims to evaluate the impact of malicious node behavior on VANET performance using key Quality of Service (QoS) parameters, including throughput, end-to-end delay, jitter, packet delivery ratio (PDR), and packet loss ratio (PLR). The specific objective is to analyze how black hole and wormhole attacks affect communication efficiency in VANET environments. The main contribution of this work lies in the integration of Simulation of Urban Mobility (SUMO) for realistic traffic scenario generation with Network Simulator 3 (NS-3) for detailed network performance evaluation. This approach enables comprehensive simulation of VANET behavior under attack conditions. The findings provide valuable insights into the vulnerabilities of VANETs and form a basis for the design of more robust and secure vehicular communication systems.
Development of National Digital Evidence Metadata Sugiantoro, Bambang
JOIN (Jurnal Online Informatika) Vol 4 No 1 (2019)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/join.v4i1.292

Abstract

The industrial era 4.0 has caused tremendous disruption in many sectors of life. The rapid development of information and communication technology has made the global industrial world undergo a revolution. The act of cyber-crime in Indonesia that utilizes computer equipment, mobile phones are increasingly increasing. The information in a file whose contents are explained about files is called metadata. The evidence items for cyber cases are divided into two types, namely physical evidence, and digital evidence. Physical evidence and digital evidence have different characteristics, the concept will very likely cause problems when applied to digital evidence. The management of national digital evidence that is associated with continued metadata is mostly carried out by researchers. Considering the importance of national digital evidence management solutions in the cyber-crime investigation process the research focused on identifying and modeling correlations with the digital image metadata security approach. Correlation analysis reads metadata characteristics, namely document files, sounds and digital evidence correlation analysis using standard file maker parameters, size, file type and time combined with digital image metadata. nationally designed the highest level of security is needed. Security-enhancing solutions can be encrypted against digital image metadata (EXIF). Read EXIF Metadata in the original digital image based on the EXIF 2.3 Standard ID Tag, then encrypt and insert it into the last line. The description process will return EXIF decryption results in the header image. This can secure EXIF Metadata information without changing the image quality
Co-Authors Abdul Haris Muhammad Abdullah, Mohd. Fikri Azli bin Afrianto, Nurdi Agung Fatwanto Ahmad Luthfie Akbar, Bintang Faisal Akbar, Muhammad Tulus Akbar, Reonaldo Al Jum'ah, Muhammad Na'im Alfani, Muhammad Nur Alfarizi, Naufal Faiz Alifah Amalia Amalia, Alifah Amanulloh, Rivkih Amin Pujiati Amin Retnoningsih Anbari, Muhamad Zaki Anwar, Muhammad Khoirul Arromdoni, Bad’ul Hilmi Astari, M Rizky Asyhab, Naufal bahary, muhammad syaiful Bahry, Muhammad Syaeful Budi Permana Putra Budiman, Kholiq Dewantara, Rizki Dori Gusti Alex Candra Efdika, Muhamad Fadil Efendi, Muhamad Masjun Elvanisa Ayu Muhsina, Elvanisa Ayu Endra Yuliawan Fahmi Romisa Gatra, Rahmadhan Gatra, Ramadhan Gunawan Gunawan Habibah, Berlian Ummu Habibullah, Ricky Hafizuddin, Faiz Akhmad Hakim, Fani Rakhman Hanif Hanif Hartono Hartono Helmi Rachman Hikmatyar, Firmansyah Gustav Idir Fitriyanto Idir Ika Arfiani Imtikhan Azmi, Himawan Istianto, Yudi Izdiharsant, Almaas Jazi Eko Istiyanto Karmesti, Danissa Wirna Kesumahadi, Lisdianto Dwi Khanif Setiyawan Khusna, Tachiyya Nailal Mahardhika, Yuha Bani Mahbub Puba Fawzan Mahbub Puba Fawzan, Mahbub Puba Mahmuda, Muhimmatul Mardlian, M. Sa’id Abdurrohman Kunta Maria Ulfa Siregar Maria Ulfah Siregar Maria Ulfah Siregar Mastur Mastur Meiditra, Irzon Merisa Kurniasari Fadilla Muhamad Fadli Muhamad Soleh Muhamad Zaki Anbari Muhammad Hambali, Muhammad Muhammad Reza Velayani Muhammad Taufiq Nuruzzaman Mujahidah, Latifatul Mulyana, Riyan Nana Kariada Trimartuti Nana Supriyana Ngisomudin, Ngisomudin Nora Lizarti Nugrah Rekto Prabowo Nur Wibowo, Trio Nuruzzaman, Muhammad Taufiq Panggih Gumelaring Praja Pomalingo, Suwito Praharto, YB. Prasdika, Prasdika Pratiwi, Millati Putry Wahyu Setyaningsih Qorry Aina Fitroh Rachman, Helmi Retantyo Wardoyo Rini Audia Rinny Asasunnaja Riwanto, Yudha Romisa, Fahmi Rusnaldhy, Rusnaldhy Sakuri, Sakuri Sakuri, Sakuri Shofwatul 'Uyun Shofwatul ‘Uyun Son’Aniy, Irham Sophan Sofian Sri Hartati Subki, Ahmad Sucinta, Hanny Handayani Sumarsono , Sumarsono Sunyoto Sunyoto Supiyana, Nana Supriyono, Abdul Rohman Susilo Adi Widyanto Sutarno Sutarno Tasya Kumala Dewi, Bella Tri Widodo Tris Sugiarto Utis Sutisna Warso Warso, Warso Wicaksono, Nur Kukuh widowati widowati Wildan Nadiyal Ahsan Winasis, Bima Putra Wishnu, Asep Yudi prayudi Yuha Bani Mahardhika