p-Index From 2020 - 2025
9.781
P-Index
This Author published in this journals
All Journal Sosiohumaniora JBIO: jurnal biosains (the journal of biosciences) Jurnal Konstruksi Jurnal Online Mahasiswa (JOM) Bidang Ilmu Sosial dan Ilmu Politik Jurnal Online Mahasiswa (JOM) Bidang Pertanian Intelektualita Jurnal Informatika dan Teknik Elektro Terapan Medula Biocelebes Jurnal Sains Dan Teknologi (SAINTEKBU) al-Afkar, Journal For Islamic Studies Mimbar Hukum - Fakultas Hukum Universitas Gadjah Mada Pendas : Jurnah Ilmiah Pendidikan Dasar J-MAS (Jurnal Manajemen dan Sains) Prosiding Seminar Nasional Pakar Jurnal Serambi Engineering Jurnal Pengabdian Magister Pendidikan IPA Aptisi Transactions on Management Jurnal Jatiswara Jurnal TAMBORA Jurnal Equity Perada: Jurnal Studi Islam Kawasan Melayu JOURNAL OF INFORMATICS AND COMPUTER SCIENCE ICIT (Innovative Creative and Information Technology) Journal JuTEkS (Jurnal Teknik Elektro dan Sains) Jurnal Ilmu Manajemen Universitas Tadulako (JIMUT) Budapest International Research and Critics Institute-Journal (BIRCI-Journal): Humanities and Social Sciences JURNAL TEKNOLOGI TECHNOSCIENTIA Jurnal Ilmiah Teunuleh: The International Journal of Social Sciences Ekosiana : Jurnal Ekonomi Syariah Multidiciplinary Output Research for Actual and International Issue (Morfai Journal) Jurnal Esensi Infokom: Jurnal Esensi Sistem Informasi dan Sistem Komputer EKONOMIKA45 International Journal of Humanities Education and Social Sciences At Tawasul: Jurnal Komunikasi dan Penyiaran Islam Jurnal Konstruksi Academic Journal Perspective : Education, Language, and Literature Jurnal Administrasi Publik International Journal of Health Science (IJHS) International Journal of Education and Literature (IJEL) SARGA Jurnal Pengabdian dan Pengembangan Masyarakat Indonesia Jurnal Manajemen Bisnis Kewirausahaan Darussalam English journal Jurnal Riset Rumpun Ilmu Kesehatan (JURRIKES) Universal Raharja Community (URNITY Journal) Journal of Scientific Research, Education, and Technology International Conference on Health Science, Green Economics, Educational Review and Technology (IHERT) Jurnal Pengabdian Kolaborasi dan Inovasi IPTEKS Jurnal Sains dan Ilmu Terapan Jurnal Bima: Pusat Publikasi Ilmu Pendidikan Bahasa dan Sastra Triwikrama: Jurnal Ilmu Sosial Kohesi: Jurnal Sains dan Teknologi Argopuro: Jurnal Multidisiplin Ilmu Bahasa Buletin Ilmiah Ilmu Komputer dan Multimedia (BIIKMA) APPA : Jurnal Pengabdian Kepada Masyarakat Journal of Islamic Education Students Contemplate: Jurnal Ilmiah Studi Keislaman At Tahfidz Jurnal Ilmu Al-Qur'an dan Tafsir Jurnal Pallangga Praja Jurnal Informatika Polinema (JIP) INDOPEDIA (Inovasi Pembelajaran dan Pendidikan) Jurnal Pengabdian Masyarakat dan Riset Pendidikan LATAR, Jurnal Arsitektur Jurnal Pengabdian Masyarakat Cendikia Jenius International Journal of Technology and Education Research International Journal of Educational Evaluation and Policy Analysis Akhlak: Jurnal Pendidikan Agama Islam Dan Filsafat International Journal of Computer Technology and Science International Journal of Electrical Engineering, Mathematics and Computer Science Journal of Informatics and Science Media (JISMEDIA) Fundamental : Jurnal Ilmiah Hukum Advance Sustainable Science, Engineering and Technology (ASSET)
Claim Missing Document
Check
Articles

Found 5 Documents
Search
Journal : International Journal of Computer Technology and Science

Enhancing IIoT Security: AI-Driven Blockchain-Based Authentication Scheme Azreen Shafieqah Asri; Faizatul Fitri Boestamam; Harith Zakwan Bin Zakaria; Mohammad Amir Alam Rahim Omar; Mohammad Hamka Izzuddin Bin Mohamad Yahya; Muhammad Faisal
International Journal of Computer Technology and Science Vol. 1 No. 3 (2024): July : International Journal of Computer Technology and Science
Publisher : Asosiasi Riset Teknik Elektro dan Infomatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62951/ijcts.v1i3.19

Abstract

With the rapid expansion of the Industrial Internet of Things (IIoT), integrating devices, machines, and systems to optimize operations and enable data-driven decision-making, ensuring robust security measures is essential. While blockchain has shown the potential to upgrade traditional authentication methods in IIoT environments, vulnerabilities persist. This paper introduces two innovative methods to enhance blockchain-based authentication in IIoT: first, integrating AI-driven anomaly and threat detection into the blockchain authentication scheme; second, implementing Ethereum smart contracts for enhanced authentication with a two-factor authentication (2FA) system and GFE algorithms. By combining AI for anomaly detection with decentralized smart contracts and blockchain-based 2FA, and leveraging GFE algorithms to enhance blockchain capabilities, the proposed scheme aims to significantly fortify security measures. This integration offers a resilient defense against evolving threats, ensuring transparency, adaptability, and heightened security in IIoT applications.
Multi-Factor Authentication Using Blockchain: Enhancing Privacy, Security and Usability Irenna Wanisha; James, Jaymaxcklien Bravyain; Witeno, Jeremy Silas; Mohammad Bakery, Luqmanul Hakim; Samuel, Melvianna; Muhammad Faisal
International Journal of Computer Technology and Science Vol. 1 No. 3 (2024): July : International Journal of Computer Technology and Science
Publisher : Asosiasi Riset Teknik Elektro dan Infomatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62951/ijcts.v1i3.24

Abstract

In the ever-changing digital world, strong security protocols are essential. As a vital line of defence against unwanted access, blockchain uses several verification techniques to boost security. This article investigates the use of blockchain technology to tackle privacy, security, and usability issues. By reducing the dangers associated with conventional centralised systems, blockchain's decentralised and immutable structure offers a secure platform for storing and verifying authentication credentials. This method increases user trust by using smart contracts to guarantee transparent and unchangeable authentication procedures. The suggested blockchain-based method strengthens security and enhances privacy by removing sources of failure and decreasing dependence on outside verification. Furthermore, user-centric design and expedited procedures improve the system's usability by making secure authentication more approachable and less obtrusive. This paper offers a thorough examination of the suggested system, stressing its benefits, possible drawbacks, and directions for future investigation. The results indicate that blockchain technology presents a viable solution to ensure that digital authentication frameworks combine privacy, security, and usability.
Enhancing Authentication Security: Analyzing Time-Based One-Time Password Systems Asyura Binti Sofian; Ayu Fitri Alafiah Binti Peradus; Fidel Yong; Irvine Shearer; Nurrul Nazwa Binti Ismail; Yugendran A/L Mahendran; Muhammad Faisal
International Journal of Computer Technology and Science Vol. 1 No. 3 (2024): July : International Journal of Computer Technology and Science
Publisher : Asosiasi Riset Teknik Elektro dan Infomatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62951/ijcts.v1i3.25

Abstract

This paper explores the Time-Based One-Time Password (TOTP) authentication mechanism enhanced with lightweight cryptographic algorithms, presenting it as an advanced solution to the limitations of traditional OTP systems. There are a lot of applications and systems where this mechanism is applied. For example, bank applications, e-commerce websites, access control system, healthcare system, etc. TOTP generates dynamic, time-sensitive passwords using the current time and a secret key processed through a cryptographic hash function, significantly improving security by reducing vulnerabilities to code reused and interception. The adoption of lightweight algorithms ensures that TOTP can be efficiently implemented on resource-constrained devices, such as those on the Internet of Things (IoT) ecosystem. Despite its benefits, TOTP faces challenges including synchronization issues between client devices and servers, and a trade-off between computational efficiency and security strength. This paper discusses the implications of these challenges and evaluates how TOTP, with appropriate design considerations, can provide a robust, secure, and efficient authentication method suitable for various applications, from digital banking to IoT environments.
Advancements in Multi-Factor Authentication: A Quantum-Resilient and Federated Approach for Enhanced Security Nur Syahrina Binti Juni; Grasila Huney Wan; Siti Aisyah Nabilah Binti Banchi; Estella Blessings; Venetha A/P Loganathan; Muhammad Faisal
International Journal of Computer Technology and Science Vol. 1 No. 3 (2024): July : International Journal of Computer Technology and Science
Publisher : Asosiasi Riset Teknik Elektro dan Infomatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62951/ijcts.v1i3.26

Abstract

The Internet of Things (IoT) phenomenon is centered around linking various devices and objects to the Internet, enabling them to communicate, collect, and exchange data [1]. The IoT needs strong, lightweight, and secure authorization schemes to regulate many devices with varying levels of ability. Quantum-resilient federated Multi-Factor Authentication (QRF-MFA) is a solution presented in this paper to address the above-discussed issues. Featuring quantum-resistant cryptographic protocols, high-speed and low-energy Physically Unclonable Functions (PUFs), decentralized identity management, and optimized communication protocols, QRF-MFA provides a complete solution for secure cross-domain device identification and authentication. This is done by leveraging blockchain technology for immutable and transparent management of identities yet limiting on-chain storage overhead. It also provides secure, lightweight communication well-suited for resource constrained IIoT devices, and it is designed for fog and edge computing environments as well. QRF-MFA eliminates the challenges of current methods by combining security, efficiency, and scalability and delivering a resilient and future-ready solution to secure IIoT authentication.  
Enhancing Security in Industrial IoT: Authentication Solutions Leveraging Blockchain Technology Rebecca Ling Ze Siew; Brendan Chan Kah Le; Lee Kai Yue; Nuri Nazirah Binti Ismail; Xavier Liong Zhi Hao; Muhammad Faisal
International Journal of Computer Technology and Science Vol. 1 No. 3 (2024): July : International Journal of Computer Technology and Science
Publisher : Asosiasi Riset Teknik Elektro dan Infomatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62951/ijcts.v1i3.29

Abstract

The rapid advancement of Industrial Internet of Things (IIoT) technology necessitates robust authentication solutions to ensure security, scalability, and efficiency. This project, titled "Enhancing Security in Industrial IoT: Authentication Solutions Leveraging Blockchain," examines various blockchain-based authentication methods for IIoT and identifies their strengths and weaknesses. Despite the enhanced security and decentralized nature of blockchain, issues such as scalability, high latency, and computational load persist. To address these challenges, we propose the integration of Multi-Factor Authentication (MFA) as a supplementary solution. MFA can distribute the authentication load, enhance flexibility and security, and reduce latency by utilizing quick-to-verify factors. Moreover, MFA ensures high availability and scalable storage and processing through cloud services, seamlessly integrating with existing systems to provide a superior user experience. This comprehensive approach not only mitigates the inherent limitations of blockchain technology in IIoT but also reinforces the overall security framework, ensuring resilient and efficient authentication mechanisms. The results demonstrate significant improvements in system performance and user satisfaction, establishing MFA as a viable enhancement to blockchain-based IIoT security solutions.
Co-Authors , Elfitra Desy Surya Abdul Saman Abiyyu Akbar Aristy Ade Rizky Amalia Afdal Syahreza Agussalim Agussalim Al Juhaeda, Zul Iflah Alan Fariz Maulana Alfandy Pratama Alfino Nicolas Prasetya Ali, Rana Mohsin Allyson Eddy Almeida, Maria Amalia Nur Azizah Aminuyati Amir Husin Andi M. Rifiyan Arief Andri Nirwana AN Anjelita Sinaga Aprizal, Fardhan Arditya Ferbiyanto Areeba Shahid Ari Asmawati Ariati Rusli Arief, Maryam Jamila Arifudin ' Aris Bahasruddin Arnetty Arnetty Asy'ari Asy'ari Asyura Binti Sofian Ayu Fitri Alafiah Binti Peradus Azreen Shafieqah Asri Bayu Al Badjie Hasan Benyamin Parubak bin Hilmi, Hafizuddin Bram Zoe anak Guillan Brendan Chan Kah Le Burhanudin Yusuf Clarissa Tarigan Dahyar Daraba Dalmi Iskandar Sultani Darmansjah Tjahja Prakasa Deden Rustiana Dedree Leonna Lai Defa Agripratama Ali Dewi Rosmalia, Dewi dewi susanti Dwi Khairani Edwien Setiwan Saputra Einstein Kent Elias Eka Sukanti Eldren Aniell Eliya Mursyida Erfendi Regar Erma Suryani Sahabuddin Estella Blessings Evita Andriani Sahbani Faizatul Fitri Boestamam Farhan, Rivki Lutfiya Farris Althaf Pratama Fauzi Sediyawan Fidel Yong Fifi Candita Firman Fisa, Triansyah Ghaitsa Zahira Ardelia Putri Ghulam Asrofi Buntoro Gihon Nugrahadi Grasila Huney Wan Hairunnas, Hairunnas Hamza Khaliq Harith Zakwan Bin Zakaria Hasbi Assiddiq S Hasmia M Arifin Helmi Helmi Hotlina Sihombing I Putu Eka Juliantara Ida Parida Ikbal Maulana Indah Puji Astuti Indawan Syahri Indra Dharma Wijaya Indriani Adha IRA NURIYA SANTI Irenna Wanisha Irvine Shearer Iswahyudi ISWAHYUDI ISWAHYUDI James, Jaymaxcklien Bravyain Jumalia Mannayong Juminten Saimin Khairunnisa Kusumawati, Yulia Tri Laila Rohani Lee Kai Yue Lina Iamayanti Ling, Fang Ting M Komarudin M. Andrey Harun Marwan, Deinike Wanita Maryam Jamila Arief Masruchin, Febby Rahmatullah Maya Jannah Meiske Wenno Mesra B Mgs. Sulaiman Mico Ferdian Minarni Minarni Misdi Misdi Mochamad Bastomi Mochamad Imamudin Mohammad Amir Alam Rahim Omar Mohammad Bakery, Luqmanul Hakim Mohammad Hamka Izzuddin Bin Mohamad Yahya Mona Arif Muda Mualifah Muh. Rizal S, Herling Muhammad Aji Faturahman Muhammad Aksan Muhammad Ernanda Taufiq Muhammad Hariansyah Muhammad Jailani Muhammad Razak Alfianto Muhammad Rizky Fauzi Muhammad Thoriq Al Rosyid Muhartini Muhartini Mukhairir Fikri Ihsan mulyati mulyati Muthmainnah Muthmainnah Mutiawati Mutiawati Muzakir Nazar Fadli Nazwa Ramadhona Ng Ee Zoe Ng Hui Wen Nida Husna Abdul Malik Novian Tri Wahyudi Nur Syahrina Binti Juni Nur Zakiyah Darajat Nurhasanah Nurhasanah Nurhikmah Nuri Nazirah Binti Ismail Nurlina Nurlina Nurrul Nazwa Binti Ismail Nyaknong Karti Alifah Padeli Padeli Parlagutan Silitonga Periskila Dina Kali Kulla Phiang, Jun Kong Pradipta Bagas Daniswara Praja Hadi Saputra Priyanto Priyono Priyono Rachmat Suryadithia Rafli Almubarok Rafy Muhammad Toha Rahma Ashari Hamzah Rahmat Mubaraq Raihan Hasbi Hilal Rebecca Ling Ze Siew Restia Christistianty Rico Fadillah Rico Jawi Rimsa Desela putri br Panjaitan Roestaman Roestaman Rudi Salam Rully Soeriaatmadja Samuel, Melvianna Sari Wulandari Satriyono, Adiska Putra Bagas Sawaluddin Siregar Semuel Souhoka Shircrayson bin Simon Siregar, Risdalina Siska Debora Siti Aisyah Siti Aisyah Nabilah Binti Banchi Siti Malika Azizatul Siti Nurjannah Sri Anggarini Sri Handayani Ashary Sri Rahmi Sriwahyuni Pasaribu Sudirman Suhanda Saputra Suhartono Syaiful Hadi TB, Desita Ria Yusian Teuku Alif Rican Aldian Thomafi, Muhamad Arvan Tohar, Ibrahim Trisno Utomo Naibaho Trisya Septiana Tsi Shi Ping Venetha A/P Loganathan Vina Maulidya Vivian Bong Chiaw Cin Vivian Yong Siew Yee Wahyudi Umar Wanda Alpiyandi Widya Karmila Sari Achmad Wiranti Sri Utami Witeno, Jeremy Silas Xavier Liong Zhi Hao Yew Wei Yi Yugendran A/L Mahendran Yuni Hafita Zubair Zubair Zufri, Zufri Zulfikri Zulfikri ⁠Sri Utamini