Claim Missing Document
Check
Articles

Aplikasi Indoor Secured-Localization System Menggunakan Jaringan Sensor Nirkabel untuk Koordinasi Pasukan PMK pada Kondisi Darurat Kebakaran di dalam Gedung Adam Surya Putra; Prima Kristalina; Amang Sudarsono
Seminar Nasional Aplikasi Teknologi Informasi (SNATI) 2016
Publisher : Jurusan Teknik Informatika, Fakultas Teknologi Industri, Universitas Islam Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Abstrak—Informasi lokasi suatu object penginderaan adalah salah satu hal yang penting dan menjadi tantangan dalam implementasi jaringan sensor nirkabel. Saat ini jaringan sensor nirkabel dapat digunakan dalam aplikasi pemantuan suatu object, pelacakan sasaran, koordinasi, dan masih banyak lagi. Karena jaringan sensor dapat berinteraksi dengan data sensitif dan / atau beroperasi di lingkungan tanpa pengawasan, maka sangat penting bahwa masalah sistem keamanan diperhatikan dari awal men-design system. Dalam makalah ini, kami mengusulkan suatu sistem lokalisasi node secara terdistribusi di lingkungan indoor dengan skema penentuan lokasi node dilakukan di setiap node dengan bantuan dari node refrensi. Setiap pengiriman paket data dalam jaringan sensor dilengkapi dengan sistem keamanan. Teknik lokalisasi node menggunakan metode trilaterasi dengan memanfaatkan 3 node refrensi. Sistem keamanan data terdiri dari AES (Advanced Encryption Standard) sebagai confidentiality dan Fungsi Hash MD5 sebagai authentication. Kami mengevaluasi kinerja secara komprehensif meliputi estimasi jarak antar node, kalkulasi posisi node, waktu dan keamanan pengiriman paket data. Hasil evaluasi sistem yang diusulkan menggunakan platform jaringan sensor perangkat waspmote. Hasil penelitian pada lingkungan indoor menunjukkan bahwa sistem yang diusulkan menghasilkan kinerja yang baik, meliputi penentuan posisi node, waktu komunikasi dan keamanan pengiriman paket data. Secara keseluruhan sistem yang di usulkan memiliki keandalan yang cukup baik dalam aplikasi real time tracking node.
Analisys and Implementation Cloud-based Biometricauthentication in Mobile Platform agostinho marques ximenes; Sritrusta Sukaridhoto; Amang Sudarsono; Hasan Basri
Jurnal Ilmiah Kursor Vol 10 No 2 (2019)
Publisher : Universitas Trunojoyo Madura

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21107/kursor.v10i2.200

Abstract

Based on the Indonesian Central of Statistics the level of poverty people in September 2018 was 25.95 million, based on data, the government allocation care fund the reduce poverty people, the fund are given through the bank. However, banks cannot allocation funds because the cost for build infrastructure is expensive, such as making an ATM. about that, the banks need to find a new solution to allocation care fund to the poverty people, Mobile Platform Biometric Cloud Authentication is one solution. In this study, the experimentationn of the biometric face recognized( face data enrypt and decript by algoritma AES 256 bit) to secure online payment mobile application based on the QR Code scan and face recognition[8,10]. The concentration of this study lies in the experimentationn of biometric face recognize and QR Code scan on biometric payment based face recognition and QR Code scan mobile applications that play a role in data communication security. The test results on this mobile application show that scanning a QR Code and biometric face recognize can be implemented at an online merchant transaction with an accuracy of 95% and takes 53, 21 seconds in transactions. Keyword: biometric, cloud server, Cryptography, QR Code.
Partition-Based GTS Adjustment for Wireless Sensor Networks M. Udin Harun Al Rasyid; Bih Hwang Lee; Amang Sudarsono
Journal of ICT Research and Applications Vol. 9 No. 2 (2015)
Publisher : LPPM ITB

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.5614/itbj.ict.res.appl.2015.9.2.4

Abstract

The personal area network (PAN) coordinator can assign a guaranteed time slot (GTS) to allocate a particular duration for requested devices in IEEE 802.15.4 beacon-enabled mode. The main challenge in the GTS mechanism is how to let the PAN coordinator allocate time slot duration for the devices which request a GTS. If the allocated devices use the GTS partially or the traffic pattern is not suitable, wasted bandwidth will increase, which degrades the performance of the network. In order to overcome the abovementioned problem, this paper proposes the Partitioned GTS Allocation Scheme (PEGAS) for IEEE 802.15.4 networks. PEGAS aims to decide the precise moment for the starting time, the end, and the length of the GTS allocation for requested devices taking into account the values of the superframe order, superframe duration, data packet length, and arrival data packet rate. Our simulation results showed that the proposed mechanism outperforms the IEEE 802.15.4 standard in terms of the total number of transmitted packets, throughput, energy efficiency, latency, bandwidth utilization, and contention access period (CAP) length ratio.
Implementasi Metode LightGBM Untuk Klasifikasi Kondisi Abnormal Pada Pengemudi Sepeda Motor Berbasis Sensor Smartphone R Rizki Rachmadi; Amang Sudarsono; Tri Budi Santoso
Jurnal Komputer Terapan Vol. 7 No. 2 (2021): Jurnal Komputer Terapan
Publisher : Politeknik Caltex Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (399.912 KB) | DOI: 10.35143/jkt.v7i2.5164

Abstract

Traffic accident is one of the most significant contributors which makes the death number is increasing around the world. With the demographic condition from Indonesia, motorcycle driver is the types of the driver that dominated the traffic, therefore increasing the probability of caught in a traffic accident The existing Vehicle Activity Detection System (VADS) mainly focused on the car driver, with the main problem is that the computational time from the system is too high to be implemented on a real-time condition. To solve this problem, in this research, a classification system for abnormal driving behavior from motorcycle drivers is created, using Light Gradient Boosting Machine (LightGBM) model. The system is designed to be lightweight in computation and very fast in response to the changes of the activities with a high velocity. To train the LightGBM model, the data from Accelerometer and Gyroscope sensor, that has been integrated into a smartphone, will be used to detect the movement from a driver. The accuracy rate from the proposed model is reaching 82% on the test dataset and shows a promising result of around 70% on the real-time detection process. With a computational time of around 10ms, the proposed system is able to work 5 times faster than the existing system.
Modifikasi Identity-based Encryption pada Keamanan dan Kerahasiaan Data Rekam Medis Dian Neipa Purnamasari; Amang Sudarsono; Prima Kristalina
INOVTEK POLBENG Vol 9, No 2 (2019): INOVTEK VOL.9 NO 2 - 2019
Publisher : POLITEKNIK NEGERI BENGKALIS

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (80.356 KB) | DOI: 10.35314/ip.v9i2.1005

Abstract

Keamanan pada data rekam medis menjadi hal yang penting selain mengingat pentingnya isi dari rekam medis tersebut, keamanan pada data rekam medis telah diatur oleh kemeterian di Indonesia. Perkembangan teknologi membawa pengaruh pada penyimpanan data rekam medis, salah satunya perubahan data rekam medis dari konvensional menjadi elektronik. Namun, perkembangan teknologi ini juga memiliki dampak buruk yaitu munculnya oknum-oknum yang menjalankan kegiatan ilegal untuk mendapatkan keuntungan pribadi atau kelompok. Salah satunya adalah mencuri data rekam medis untuk memeras pasien, bahkan melakukan perubahan pada data rekam medis yang berdampak fatal pada kesehatan pasien. Pada penelitian ini diusulkan metode keamanan data rekam medis menggunakan modifikasi skema Identity-based Encryption (IBE) dan algoritma AES atau dapat disebut dengan mIBE-AES. Keunikan dari metode yang diusulkan adalah nilai awal yang telah ditentukan dari tiap byte pada identitas pengguna sehingga dapat menekan waktu komputasi pada proses pembangkitan kunci. Metode yang diusulkan akan dibandingkan dengan metode keamanan yang hanya menggunakan algoritma AES. Evaluasi performa yang telah dilakukan adalah pengujian kinerja dan tingkat keamanan pada penyerangan Man in The Middle (MITM). Didapatkan hasil bahwa metode mIBE-AES lebih unggul dengan total waktu komputasi 0,799 detik serta mampu menangani penyerangan MITM dengan skenario sniffing dan chosen-plaintext.
Implementation Parallel Computation for Automatic Clustering Bayu Dwiyan Satria; Ali Ridho Barakbah; Amang Sudarsono
Jurnal Mantik Vol. 5 No. 2 (2021): Augustus: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/jurnalmantik.Vol5.2021.1439.pp994-1005

Abstract

Developments in the industrial world, especially in the field of computer technology, demand solutions to needs ranging from computing resources, storage media, and communication speeds. This was followed by many new studies in this field, including those related to clustering. Clustering is an exploratory data analysis tool that deals with the task of grouping objects that are similar to each other [1], [2]. Clustering requires computers with high resources, usually the price for computers with high resources, while computers with not too high specifications will be less reliable in handling such large data. Clustering that runs on a single-core processor takes a long time to execute tasks, so parallel computing is needed to speed up computing performance especially at Automatic Clustering. This research will produce faster performance in grouping large data by utilizing parallel computing and automatic clustering methods as methods for grouping data. This technology allows data processing to be carried out in parallel and distributed in hundreds or even thousands of computers, so this technology is very appropriate for processing very large amounts of data)
Zero Knowledge Authentication Modification for Drone and Server Communication Security Choirun Nisa; Amang Sudarsono; Mike Yuliana
Jurnal Mantik Vol. 5 No. 2 (2021): Augustus: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/jurnalmantik.Vol5.2021.1446.pp1019-1029

Abstract

Drones are now being used in various fields. One of the uses of drones is for delivery service. When delivering goods, the drone needs to report its condition while traveling to the server so that the server can monitor the drone and the server can give some commands to the drone. However, when the drone receives data from the server, there are many vulnerabilities it has against the attacker that can take control of the drone device. Taking control of the drone can occur if the attacker manages to send a script that can take over control of the drone. If the attacker can take control over the drone device, the attacker can steal the drone both physically or data of the drone. For this reason, in this study, we propose an authentication algorithm that can filter out who is allowed to send data to the system. The algorithm used is Zero-Knowledge Authentication. To improve the performance of the Zero-Knowledge Authentication algorithm in terms of authentication speed, we try to combine it with the secret key generated from the Secret Key Generation process. From the results of authentication testing, the effectiveness of the proposed algorithm after a Brute Force attack experiment is 100% for single attacker scenarios and for multiple attackers the effectiveness is 100% in LOS and NLOS conditions. Because drones have limited resources, the authentication time experiment is also performed and the result is that in all scenarios the time required to authenticate is in microseconds so that the proposed algorithm can be implemented on drones with limited resources.
Secure Real-time Data Transmission for Drone Delivery Services using Forward Prediction Scheduling SCTP Febby Ronaldo; Amang Sudarsono; Dadet Pramadihanto
EMITTER International Journal of Engineering Technology Vol 10 No 1 (2022)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24003/emitter.v10i1.690

Abstract

Drone technology is considered the most effective solution for the improvement of various industrial fields. As a delivery service, drones need a secure communication system that is also able to manage all of the information data in real-time. However, because the data transmission process occurs in a wireless network, data will be sent over a channel that is more unstable and vulnerable to attack. Thus, this research, purposes a Forward Prediction Scheduling-based Stream Control Transmission Protocol (FPS-SCTP) scheme that is implemented on drone data transmission system. This scheme supports piggybacking, multi-streaming, and Late Messages Filter (LMF) which will improve the real-time transmission process in IEEE 802.11 wireless network. Meanwhile, on the cybersecurity aspect, this scheme provides the embedded option feature to enable the encryption mechanism using AES and the digital signatures mechanism using ECDSA. The results show that the FPS-SCTP scheme has better network performance than the default SCTP, and provides full security services with low computation time. This research contributes to providing a communication protocol scheme that is suitable for use on the internet of drones’ environment, both in real-time and reliable security levels.
Pembuatan Sistem Mikroskop Digital Terintegrasi dengan Pengolahan Citra untuk Pengembangan Perangkat Pembelajaran IPA di SMPIT Al Uswah Surabaya Bima Sena Bayu Dewantara; Dadet Pramadihanto; Wahjoe Tjatur Sesulihatien; Amang Sudarsono; Hary Oktavianto; Bambang Sumantri; Idris Winarno
J-Dinamika : Jurnal Pengabdian Masyarakat Vol 7 No 2 (2022): Agustus
Publisher : Politeknik Negeri Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25047/j-dinamika.v7i2.2413

Abstract

Untuk mewujudkan pembelajaran yang baik dan tepat kepada para siswa-siswi peserta didik sehingga dapat meningkatkan pemahaman, pengalaman dan kemampuan siswa-siswi, maka pendidikan yang diterima tidak hanya diperlukan untuk melatih aspek kognitif saja. Namun juga diperlukan untuk membangun kemampuan afektif dan psikomotornya. Oleh karena itu, pembelajaran berbasis praktek di laboratorium perlu untuk diberikan. Kegiatan ini bertujuan untuk membuat sebuah peralatan bantu kepada para siswa-siswi SMPIT Al Uswah Surabaya yaitu perangkat mikroskop digital yang terintegrasi dengan embedded mini PC sehingga hasil observasi/pengamatan yang dilakukan siswa-siswi bisa lebih cepat, akurat dan efisien. Peralatan yang dikembangkan terdiri dari sebuah perangkat mikroskop digital dengan kemampuan pembesaran hingga 1600x, sebuah embedded mini PC, sebuah monitor dan satu set keyboard-mouse wireless terintegrasi. Disamping itu, kami juga mengembangkan aplikasi atau perangkat lunak untuk mendukung fungsi operasional peralatan dengan menggunakan pendekatan pengolahan citra. Diharapkan dengan adanya bantuan dari kegiatan ini, siswa dan siswi SMPIT Al Uswah Surabaya mampu meningkatkan kemampuan dan mendapatkan pengalaman berharga selama menjalani studi di SMPIT tersebut.
Implementasi skema pengacakan subcarrier OFDM dengan algoritma RSA pada NI-USRP Nihayatus Sa'adah; I Gede Puja Aswara; Amang Sudarsono
JURNAL ELTEK Vol 20 No 2 (2022): ELTEK Vol 20 No 2
Publisher : Politeknik Negeri Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (536.983 KB) | DOI: 10.33795/eltek.v20i2.354

Abstract

Abstrak Keamanan jaringan nirkabel merupakan salah satu hal terpenting dalam sistem komunikasi. Karena sinyal dikirim dari pengirim melalui saluran nirkabel, tidak hanya penerima yang sah, tetapi juga penyadap dapat menangkap dan menyimpan sinyal informasi dengan mudah. Penelitian ini mengeksplorasi skema keamanan komunikasi nirkabel dimana skema yang digunakan adalah pengacakan subcarrier. Pemancar dan penerima harus disinkronkan untuk mengembalikan subcarrier ke posisi semula. Sistem ini menggunakan algoritma RSA sebagai sinkronisasi. Teknologi keamanan pengacakan subcarrier diimplementasikan pada sistem OFDM. Sistem OFDM diimplementasikan menggunakan perangkat USRP. Hasil yang diperoleh dari penelitian ini membuktikan bahwa teknik keamanan yang digunakan tidak menurunkan kinerja sistem, bahkan dapat mengurangi jumlah kesalahan bit akibat teknik sinkronisasi. Dengan teknik sinkronisasi algoritma RSA, dari jarak pengujian 1 meter, 2 meter, dan 5 meter. Pada jarak 1 meter didapatkan hasil terbaik dengan penurunan error bit dari 19,04% menjadi 0% pada 32-QAM dan penurunan error bit dari 28,57% menjadi 4,76% pada 64-QAM Abstract Wireless network security is one of the essential things in communication systems. Since the signal is sent from the sender through a wireless channel, the legitimate receiver and eavesdropper can easily capture and store signal information. This study explores a wireless communication security scheme where the scheme used is subcarrier randomization. The transmitter and receiver must be synchronized to return the subcarrier to its original position. This system uses the RSA algorithm as synchronization. Subcarrier randomization security is implemented in OFDM system. OFDM system is implemented using USRP. The results from this study prove that security techniques don't reduce system performance, and can even reduce the number of errors due to synchronization techniques with RSA synchronization technique, with 1meter, 2meters, and 5meters experiments. At 1meter distance is the best result with bit error drop from 19.04% to 0% on 32-QAM and a bit error drop from 28.57% to 4.76% on 64-QAM.
Co-Authors Abd. Rasyid Syamsuri Adam Surya Putra Adam Surya Putra Afifah Dwi Ramadhani agostinho marques ximenes Ahmad Zainudin Ali Ridho Barakbah Anang Budikarso Anang Budikarso, Anang Anang Siswanto Anang Siswanto, Anang Anindya Dwi Putri Islamidina Ari Wijayanti Ari Wijayanti Aries Pratiarso Aries Pratiarso Aries Pratiarso, Aries Astin, Novita Astin, Novita Bambang Sumantri Bayu Dwiyan Satria Bih Hwang Lee Bima Sena Bayu Dewantara Dadet Pramadihanto Darmawan, Zakha Maisat Eka Darmawan, Zakha Maisat Eka Dewi, Florista Dewi, Inka Trisna Dewi, Ni Made Lintang Asvini Dian Neipa Purnamasari Donny Farhan Eko Prayitno Farel Juliansyah Farhan, Donny Febby Ronaldo Fitri, Novi Aryani Florista Dewi Gulo, Melki Mario Gunawan, M. Wisnu Hadi, Mochammad Zen Samsono Haniah Mahmudah Hari Wahyuningrat S. Hary Oktavianto Haryadi Amran Hasan Basri Hasan Basri Hendy Briantoro Heru Iswanto, Heru Hidayah, Nuril Hudhajanto, Rizky Pratama Hudhajanto, Rizky Pratama I Gede Puja Astawa I Gede Puja Astawa I Gede Puja Aswara Ida Anisah Idris Winarno Indah Yulia Prafitaning Tiyas, Indah Yulia Prafitaning Ismed Jauhar, Ismed Juliansyah, Farel Kevin Prima Pambudi, Kevin Prima Lordan Kimbal, Heaven Louis Nashih Uluwan Arif M Udin Harun Al Rasyid, M Udin Harun M. Cahyo Kriswantoro Mahardhika, Yesta Medya Mahmudah, Haniah Mala Nurilmala Mike Yuliana Mochammad Zen Samsono Hadi Mohamad Ridwan Muhammad Taufiq Sumadi Nanang Syahroni Ni Made Lintang Asvini Dewi Nihayatus Sa'adah Ningsih, Norma Nisa, Choirun Choirun Nisa Nur Nur Adi Siswandari Nurul Fahmi Nurul Fahmi Priambodo, Naufal Ammar Prima Kristalina Putra, Adam Surya Qoirul Setiawan, Qoirul R Rizki Rachmadi Rafina Destiarti Ainul Rahardita Widyatra Ramadhani, Afifah Dwi Reni Soelistijorini Renovita Edelani Rini Satiti Rokhmat Albasyih Sa'adah, Nihayatus Samsul Huda Samsul Huda Santoso, Tribudi Saputro, Anton Cahyo Satiti, Rini Sa’adah, Nihayatus Soelistijorini, Reni Sritrusta Sukaridhoto Subhan, Muh Syahroni, Nanang Taufiqurrahman, Muh. Alfan Taufiqurrahman, Muh. Alfan Titon Dutono Tri Budi Santoso Tri Budi Santoso Tri Harsono TRI SUSANTI Tri Susanti Tribudi Santoso Vivien Arief Wardhany Wahjoe Tjatur Sesulihatien Wahyuningrat S., Hari Winarmo, Idris Ximenes, Agostinho Marques Yoedy Moegiharto, Yoedy Yoga Yuniadi Yudha, R. Gaguk Pratama Yudha, R. Gaguk Pratama Yuliana, Mike