Claim Missing Document
Check
Articles

Found 4 Documents
Search

Evaluation of Smart Home Platform Based on Blockchain Nugraha, I Gde Dharma; Yoarana, Hosea
International Journal of Electrical, Computer, and Biomedical Engineering Vol. 2 No. 1 (2024)
Publisher : Universitas Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62146/ijecbe.v2i1.12

Abstract

A smart home consists of various sensors and actuators that can communicate with each other. In addition, various home appliances have similar capabilities. Therefore, the smart home became one of the applications of the Internet of Things (IoT). In this application, arise the challenges caused by the integration of various devices that came from various vendors have a different data format and keeps the data's security. Blockchain has been proposed as one solution to address these challenges. In this paper, we investigate and evaluate the performance of the blockchain-based solution for smart home IoT. Our experiment results show that the Blockchain can secure the IoT-based smart home, but it took47% longer for packet delivery.
Advancing Network Infrastructure: Integrating VXLAN Technology with Automated Circuit Operations and NOS Configurations Efendi, Arfan; Husna, Diyanatul; Nugraha, I Gde Dharma
International Journal of Electrical, Computer, and Biomedical Engineering Vol. 1 No. 2 (2023)
Publisher : Universitas Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62146/ijecbe.v1i2.30

Abstract

Enhancing network infrastructure is achieved through integrating VXLAN technology, Python-automated circuit operations, and Ansible-driven Network Operating System (NOS) configurations, complemented by GitHub for reliable configuration backups. VXLAN, a robust network virtualization protocol, addresses the challenges of managing extensive network segments. Python scripts facilitate the automated analysis, creation, and management of network circuits, significantly boosting efficiency and accuracy. Ansible, a powerful automation tool, is employed to streamline NOS configurations, ensuring consistency and reducing manual overhead in network settings. Concurrently, GitHub, working in tandem with crontab scheduling, offers a dependable platform for the automated, regular backup of configurations, thus enhancing network resilience and simplifying recovery processes. The collective implementation of VXLAN, Python, and Ansible automation, along with GitHub for configuration management, marks a notable advancement in operational efficiency, underscoring their importance as critical components in the modernization and security of network infrastructures.
Artificial Intelligence Risk Identification: Challenges, Impacts, and Mitigation Strategies Syukrina, Ulfia; Nugraha, I Gde Dharma
International Journal of Electrical, Computer, and Biomedical Engineering Vol. 3 No. 2 (2025)
Publisher : Universitas Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62146/ijecbe.v3i2.109

Abstract

Artificial Intelligence (AI) has rapidly transformed various industries, providing significant benefits in automation, decision-making, and efficiency. However, AI also presents numerous risks, including bias, lack of transparency, security vulnerabilities, and regulatory challenges. This study employs a Systematic Literature Review (SLR) approach to identify and categorize key risks associated with AI implementation. The findings indicate that AI risks can be classified into technological, social, and regulatory aspects, each posing unique challenges. Algorithmic bias, privacy concerns, and the lack of global AI governance frameworks highlight the need for more robust risk mitigation strategies. To address these challenges, this study recommends enhancing fairness-aware AI models, strengthening AI governance, and increasing public AI literacy. Future research should focus on improving AI accountability, security measures, and ethical guidelines to ensure responsible AI adoption.
Cybersecurity Of Work From Anywhere Model For Government : A Systematic Literature Review Asyrofi, Muhammad Fahreza; Nugraha, I Gde Dharma
International Journal of Electrical, Computer, and Biomedical Engineering Vol. 3 No. 1 (2025)
Publisher : Universitas Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62146/ijecbe.v3i1.113

Abstract

Presidential Regulation No. 21 of 2023 grants Indonesian civil servants (ASN) location flexibility, creating cybersecurity challenges that institutions and authorities have yet to fully address. Existing frameworks such as ISO 27001 and NIST provide only general remote work guidelines, lacking specific recommendations for the Work From Anywhere (WFA) model. This gap poses significant risks to data security and government operations, particularly as cyber incidents reported by the National Cyber and Crypto Agency of Indonesia (BSSN) continue to rise. The 2023 Indonesian Cybersecurity Landscape report recorded 347 suspected cyber incidents, including data breaches and the exposure of over 1.6 million records on the darknet, affecting numerous stakeholders. This study employs a Systematic Literature Review (SLR) to identify cybersecurity threats associated with remote work and explore effective mitigation techniques. The findings reveal five primary threats classified into two categories: human-centric threats (social engineering attacks, insider threats, and human errors) and technology-centric threats (malware-based and network attacks). To address these threats, the study identifies four key best practice themes: Awareness and Education, Phishing Protection, Technical Countermeasures, and Management and Audit. These themes provide a structured approach to enhancing cybersecurity in WFA environments. The results of this study serve as valuable input for formulating policy and technical guidelines to implement WFA in government settings. Future research should explore supply chain security, integration of WFA with on-site operations, cultural factors in security compliance, and governance frameworks to enhance cybersecurity resilience in government WFA environments.