Claim Missing Document
Check
Articles

Kinerja Protokol Contact-Based Routing (CBR) dengan menggunakan Management Buffer Shortest Life First (SHLI) pada Delay Tolerant Network Roy Marten Sirait; Primantara Hari Trisnawan; Dany Primanita Kartikasari
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 6 No 8 (2022): Agustus 2022
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Delay Tolerant Network (DTN) is a network protocol that can connect contacts between devices with unstable connectivity with high delay times. DTN network protocol applies the store-carry-and-forward concept to send messages so that it does not always have an end-to-end connection. The multi-copy message-copying scheme is an effective for message routing approach between the source and destination nodes. However, this scheme results in a large number of unwanted messages being copied, resulting in a high number of remaining packets in the network. To solve this issue, a message copying process policy can be created. Contact-based routing (CBR) is a protocol that can observe the mobility property of each connected node by looking at the amount of node encounters in the past. The message copying selection policy on the CBR, can reduce the average delivery delay time, reduce the remaining packets on the network, but still be able to maintain the success rate of message delivery when compared to the routing protocols used in general. The addition of a management buffer is also needed to control the storage space owned by each node. The simulation results show an increase in the value of delivery probability up to 51.5%, a decrease in the value of overhead ratio up to 24.9%, and average latency up to 20.1% when compared to the flooding-based routing protocol that is often used.
Kinerja Protocol Location Aided Routing (LAR) terhadap serangan Wormhole pada Jaringan Mobile Ad-Hoc Network (MANET) Hasan Sabiq; Primantara Hari Trisnawan; Reza Andri Siregar
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 6 No 8 (2022): Agustus 2022
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Mobile ad-hoc network (MANET) is a network that can function without a fixed infrastructure. In MANET, the communication process is managed using a mechanism called a routing protocol. In this case, a problem arises that generally can occur in MANET, namely network security problems. Wormhole itself is a network attack that cannot be carried out by one node, because basically a wormhole attack forms a tunnel that connects one wormhole node with other wormhole nodes. Therefore, this study evaluates the impact of wormhole attacks on the MANET network using the Location Aided Routing (LAR) routing protocol. From the results of the tests carried out, the effect of increasing the number of nodes in the network before the wormhole attack occurred to get the best value from the packet delivery ratio parameter of 97.13% for a variation of 40 nodes. For the average end to end delay parameter, the best value is obtained at a variation of 20 nodes with a value of 57.06ms. And the best value of the routine overhead parameter is obtained at a variation of 40 nodes with a value of 0.73. While in the scheme after the wormhole attack, the value of the packet delivery ratio parameter increased significantly, achieved at a variation of 30 nodes with a value of 99.92%. For the average end to end delay parameter, the best value is obtained at a variation of 30 nodes with a value of 41.62ms. And for the routine overhead parameter, the best value is obtained at a variation of 30 nodes with a value of 0.18..
Implementasi Algoritma Lesamnta-LW pada Blockchain Peer-to-Peer Transaction Arya Seta Bagaswara; Ari Kusyanti; Primantara Hari Trisnawan
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 6 No 13 (2022): Publikasi Khusus Tahun 2022
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Dipublikasikan di Jurnal TEKNOSI
Studi Pengaruh Jumlah Cluster pada Wireless Sensor Network (WSN) menggunakan Protokol Low Energy Adaptive Clustering Hierarchy (LEACH) Risqi Nuril Aimah; Primantara Hari Trisnawan; Reza Andria Siregar
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 6 No 10 (2022): Oktober 2022
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

One of the problems in Wireless Sensor Network (WSN) is the use of energy.WSN is a network that connects devices, such as sensor node, router and sink node. This problem occurs because the power supply used for each node only uses battery in every process such as sending and receiving data, so the energy reserves are very limited. Therefore, the use of energy in the WSN sensor node becomes efficient by using the Low Energy Adaptive Clustering Hierarchy (LEACH) protocol. The performance of the LEACH routing protocol is influenced by several factors such as the number of node and the number of cluster. This study focuses on determining the performance of the LEACH routing protocol to determine the effect of variations in the number of cluster with the test parameters of Average Energy, Packet Delivery Ratio (PDR), Average Delay and Average Throughput on WSN. Based on the test results of Average Energy, Packet Delivery Ratio (PDR), Average Delay and Average Throughput obtained, the number of cluster 1 has the smallest Average Energy. The Packet Delivery Ratio test was found for the number of cluster 4 to get the highest result. Throughput testing for the number of cluster 4 get the highest Average Troughput results.
Perancangan dan Implementasi Server Presensi Online dengan Geotagging berbasis Foto Mohammad Rizky Dwisaputra; Primantara Hari Trisnawan; Reza Andria Siregar
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 6 No 11 (2022): November 2022
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Today, governments or any office attendance system still uses paper or RFID (Radio Frequency Identification) and finger prints in their office, and if someone needs to work outside the office, it will be difficult to maintain and monitor their employee. Therefore, the writer suggests an attendance system with their selfie picture based on their location. Because everyone nowadays uses their smartphone for communication, implementing this attendance system is the best solution, as the employee begins by logging in with their credentials, uploading a selfie photo with geotagging, and displaying their time and location. The server that maintains their data must be checked, and testing the network performance from outside the office using either a cellular network or fixed broadband from the employee side started with filling out their credentials to upload their picture, which contains geolocation, and showing up their time and location for monitoring.
Pengaruh Rekayasa Tingkat Energi Routing Protocol Dynamic Source Routing (DSR) pada Mobile Ad Hoc Network (MANET) Hilmy Riadika; Primantara Hari Trisnawan; Reza Andria Siregar
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 6 No 11 (2022): November 2022
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

A Mobile Ad Hoc Network (MANET) is a network consisting of multiple nodes that are interconnected to exchange data. Nodes act as routers to route packets to other nodes. A routing protocol is needed to exchange data. Dynamic Source Routing (DSR) is an example of a reactive routing protocol often used in MANETs. Nodes in a MANET have limited energy, so energy conservation is necessary. One method for conserving energy in nodes is by engineering the energy level and by selecting the appropriate routing protocol, such as the DSR protocol. This research uses two testing scenarios: one with energy conservation and one without. The parameters used are packet delivery ratio (PDR) and remaining energy. The results show that the scenario without energy conservation performs better in improving system performance with the DSR routing protocol. Optimal energy use can improve system performance with the DSR routing protocol because it ensures that there are enough nodes with sufficient energy to continue sending and receiving packets. This will increase the packet delivery ratio (PDR) because more messages are successfully sent and received. On the other hand, if energy use is not optimal, then there will be more nodes that run out of energy before all messages can be sent and received, resulting in a lower packet delivery ratio (PDR).
Pengaruh Serangan Wormhole terhadap Kinerja Protokol Temporally Ordered Routing Algorithm (TORA) pada Mobile Ad Hoc Network (MANET) Ravy Agistya Alkamaly; Primantara Hari Trisnawan; Reza Andria Siregar
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 7 No 2 (2023): Februari 2023
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Mobile Ad-Hoc Network (MANET) is a wireless network that has several interconnected nodes and acts as a router to transmit data. Several nodes can interact with each other by implementing routing protocols, one of which is TORA. TORA has a control message in the form of UDP (Update) to update the routing table and a CRL (Clear) control message that can minimize the occurrence of continuous looping which results in data not reaching its destination. The minimization process is not said to be perfect if there are many additional nodes. Research needs to be done using other methods, namely manipulating control traffic on the network by adding attacks in the form of wormhole attacks. Wormhole has characteristics that are very likely to affect the environmental conditions of MANET using TORA. The characteristics possessed by Wormhole are 2 nodes that can be connected to each other and can send data even with a very far position so that it is likely to reduce the occurrence of looping during packet transmission. The test results are obtained based on the Packet Delivery Ratio, Packet Loss, Troughput, and End to End Delay test parameters. Overall, the application of wormhole in TORA produces better performance compared to not applying wormhole. Packet delivery ratio testing with a scenario of 20 nodes shows 90.56% results compared to only 79.64% without wormhole. Testing the average troughput with a scenario of 20 nodes shows results of 95.06kbps compared to only 83.6kbps without wormhole. And testing the average end to end delay with a scenario of as many as 20 nodes shows results of only 19.18ms compared to without a wormhole rising to 30.12ms.
Implementasi Priority Packet Scheduling di Sisi Node Pengirim pada Mobile Ad-hoc Network berdasarkan Ukuran Paket Data Muhammad Ichwan Pradana; Primantara Hari Trisnawan; Reza Andria Siregar
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 7 No 3 (2023): Maret 2023
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Mobile Ad-hoc Network (MANET) is a mobile network, due to its nature MANET has basic weaknesses in its reliability when traffic is high. High network traffic is caused by one of the factors including the size of the packets being transmitted, which can cause smaller packets to be susceptible to not reaching the recipient or packet loss. Packet Scheduling is one solution to address these issues. This research uses Priority Packet Scheduling method based on the size of the data packet. Data packets with a size greater than 1000 bytes will be given high priority and sent first. Packets with a size between 1000 bytes and 500 bytes will be given medium priority and packets below 500 bytes will be given the lowest priority. Each priority will still receive a sending quota to prevent starvation. The results of Priority Packet Scheduling show that the method does not have an impact on the Packet Delivery Ratio and even experienced an increase in Average End-to-End Delay when compared to not using Priority Packet Scheduling. However, the Average Throughput values obtained with this method are significant.
Dampak Serangan Wormhole terhadap Kinerja Protokol Routing Adhoc On Demand Multipath Distance Vector (AOMDV) pada Jaringan Mobile Ad-hoc Network (MANET) Mahardika Yuristyawan Putra; Primantara Hari Trisnawan; Reza Andria Siregar
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 7 No 5 (2023): Mei 2023
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Mobile Adhoc Networks (MANET) adalah jaringan terdesentralisasi dan terorganisir sendiri yang bersifat dinamis, dapat berubah – ubah terhadap keluar masuknya node dalam jaringan. Dalam proses pengiriman data pada jaringan MANET dibutuhkan sebuah protokol routing. Salah satu protokol routing yang dalam jaringan MANET yaitu protokol Adhoc On-Demand Multipath Distance Vector (AOMDV). Protokol AOMDV merupakan upgrade terhadap protokol routing Ad hoc On-Demand Distance Vector Routing (AODV) yang didesain khusus untuk jaringan Adhoc yang bersifat dinamis. MANET menghadapi masalah keamanan yang akut dibandingkan dengan media kabel salah satu adalah, serangan wormhole. Serangan wormhole beroperasi dengan dua node yang bekerja sama dengan cara men-tunneling paket antara satu sama lain untuk membuat jalan pintas (atau Wormhole) dalam jaringan. Penelitian dilakukan menggunakan Network Simulator v2 (NS-2.35) dengan skenario variasi jumlah node wormhole dan jumlah node pada jaringan. Parameter pengujian yang digunakan, yaitu throughput, packet delivery ratio (PDR), dan end-to-end delay. Dari pengujian didapatkan hasil bahwa serangan wormhole berdampak terhadap penurunan maupun kenaikan terhadap kinerja dari protokol routing. Nilai throughput yang terbaik adalah 0,48893 Kbps pada skenario 60 node tanpa node wormhole. Nilai packet delivery ratio yang terbaik adalah 95,4% pada skenario 60 node tanpa node wormhole pada jaringan. Nilai end-to-end delay yang terbaik adalah 0,0194352 detik pada skenario 50 node dengan 3 pasang node wormhole pada jaringan.
Analisis Forensik Digital untuk Investigasi Kasus Cyberbullying pada Media Sosial TikTok Halimah Septya Mikayla; Ari Kusyanti; Primantara Hari Trisnawan
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 7 No 13 (2023): Publikasi Khusus Tahun 2023
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Dipublikasikan ke Seminar Nasional Teknologi dan Rekayasa Informasi (SENTRIN 2023)
Co-Authors Abraham Arya Satyana Achmad Basuki Adam Kukuh Kurniawan Adhitya Bhawiyuga Aditya Bhawiyuga Ahmad Ali Hamdan Ahmad Hanif AR Al Aziiz Burhanudin Faidzin Labay Andi Mohammad Thareq Akbar Andre Hadi Saputra Andre Rizal Sinaga Angger Ramadhan Anisa Permatasari Anita Sumiati Antarif Ekadhia Cahyadi Anugerah Wijaya ari kusyanti Arie Prayogo Pangestu Aris Adi Utomo Arya Seta Bagaswara Asika Ayu Wandira Audi Azzura Falaq Ayub Firdhouzi Bagus Prasetya Chandra Yogi Adhitama Dahru Wildan Pradanaputra Damianus Dewa Pratama Daniel H. Simatupang Danny Candra Rumantyo Dany Primanita Kartikasari Dicky Satriawan Dimas Agung Rizky Ananta Egi Muliandri Eki Renaldi Faiz Amzadkhan Fajar Faris Naufal Al Farros Fariz Andri Bachtiar Fariz Andri Bakhtiar Fathan Abdurrahman Shani Amarta Putra Firza Nur Hibatullah Halimah Septya Mikayla Hans Romario Sitorus Hasan Sabiq Hilman Nihri Hilmy Riadika I Dewa Gede Ardana Pucanganom I Made Oka Semara Putra Ignatius Suryo Wicaksono Imam Nurhidayat Imam Utomo Julio Firdaus Irawan Kasyful Amron Kesit Budi Kusumo Khalid Hamzah Haza Al Hamami Lulus Bagos Hermawan M. Ali Fauzi Mahadika Putra Pratama Mahardika Yuristyawan Putra Miftaqul Novandi Moh Irfan Haris Mohamad Deltaviyahya Mohamad Lutfi Mohammad Rizky Dwisaputra Muhammad Affan Alvyan Muhammad Afian Musthofa Muhammad Alif Bahari Muhammad Farradhika Muntaha Muhammad Fattah Na'im Pang Ripto Muhammad Ichwan Pradana Muhammad Nurusshobah Muhammad Ramiz Kamal Muhammad Ryan Firmansyah Muhammad Sholeh Muhammad Syaifuddin FP Muhammad Taufiq Aryadi Nuril Huda Pahlevi Muhammad Pramukantoro, Eko Sakti Prasetyo Eko Yulianto Putu Ade Arta Kusuma Putra Suparta Ragil Setyo Utomo Rahmat Yani Raihan Radito Rakhmadani Primananda Rakhmadhani Primananda Rakhmadhany Primananda Ravy Agistya Alkamaly Rayza Arfian Reza Andri Siregar Reza Andria Siregar Rezky Hadiwiriyanto Rino Erik Sanrio Risqi Nuril Aimah Rizky Haryandi Rahman Roy Marten Sirait Ryan Eko Listyanto Sabriansyah Rizqika Akbar Sandy Prasetyo Shindy Maria Ulfa Swasti Paramita Terbit Reformator Thelemanica Wicaksana Tommy Bona Hamonangan Sitorus Widhi Yahya Wildan Aulia Rachman Yohanes Heryka Febriarso Zeddin Arief