Claim Missing Document
Check
Articles

Modified GTS Allocation Scheme for IEEE 802.15.4 Zakha Maisat Eka Darmawan; M. Udin Harun Al Rasyid; Amang Sudarsono
EMITTER International Journal of Engineering Technology Vol 3 No 1 (2015)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (230.914 KB) | DOI: 10.24003/emitter.v3i1.92

Abstract

IEEE 802.15.4 standard is widely used in wireless personal area networks (WPANs). The devices transmit data during two periods: contention access period (CAP) by accessing the channel using CSMA/CA and contention free period (CFP), which consists of guaranteed time slots (GTS) allocated to individual devices by the personal area network (PAN). However, the use of GTS slot size may lead to severe bandwidth wastage if  the traffic pattern is not fit or only a small portion of GTS slot is used by allocated device. The proposed scheme devides the GTS slot and then optimizes the GTS slot size by exploiting the value of superframe order (SO) information. The proposed scheme was tested through simulations and the results show that the new GTS allocation scheme perform better than the original IEEE 802.15.4 standard in terms of average transmitted packets, throughput, latency and probability of successful packets.
Adaptive Sleep Scheduling for Health Monitoring System Based on the IEEE 802.15.4 Standard Nurul Fahmi; M. Udin Harun Al Rasyid; Amang Sudarsono
EMITTER International Journal of Engineering Technology Vol 4 No 1 (2016)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (2836.872 KB) | DOI: 10.24003/emitter.v4i1.115

Abstract

In the recent years, Wireless Sensor Networks (WSNs) have become a very popular technology for research in various fields. One of the technologies which is developed using WSN is environmental health monitoring. However, there is a problem when we want to optimize the performance of the environmental health monitoring such as the limitation of the energy. In this paper, we proposed a method for the environmental health monitoring using the fuzzy logic approach according to the environmental health conditions. We use that condition to determine the sleep time in the system based on IEEE 802.15.4 standard protocol. The main purpose of this method is to extend the life and minimize the energy consumption of the battery. We implemented this system in the real hardware test-bed using temperature, humidity, CO and CO2 sensors. We compared the performance without sleep scheduling, with sleep scheduling and adaptive sleep scheduling. The power consumption spent during the process of testing without sleep scheduling is 52%, for the sleep scheduling is 13%, while using the adaptive sleep scheduling is around 7%. The users also can monitor the health condition via mobile phone or web-based application, in real-time anywhere and anytime.
Secure Communication and Information Exchange using Authenticated Ciphertext Policy Attribute-Based Encryption in Mobile Ad-hoc Network Samsul Huda; Amang Sudarsono; Tri Harsono
EMITTER International Journal of Engineering Technology Vol 4 No 1 (2016)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (2906.57 KB) | DOI: 10.24003/emitter.v4i1.116

Abstract

MANETs are considered as suitable for commercial applications such as law enforcement, conference meeting, and sharing information in a student classroom and critical services such as military operations, disaster relief, and rescue operations. Meanwhile, in military operation especially in the battlefield in freely medium which naturally needs high mobility and flexibility. Thus, applying MANETs make these networks vulnerable to various types of attacks such aspacket eavesdropping, data disseminating, message replay, message modification, and especially privacy issue. In this paper, we propose a secure communication and information exchange in MANET with considering secure adhoc routing and secure information exchange. Regarding privacy issue or anonymity, we use a reliable asymmetric encryption which protecting user privacy by utilizing insensitive user attributes as user identity, CP-ABE (Ciphertext-Policy Attribute-Based Encryption) cryptographic scheme. We also design protocols to implement the proposed scheme for various battlefied scenarios in real evironment using embedded devices. Our experimental results showed that the additional of HMAC (Keyed-Hash Message Authentication Code) and AES (Advanced Encryption standard) schemes using processor 1.2GHz only take processing time about 4.452 ms,  we can confirm that our approach by using CP-ABE with added HMAC and AES schemes make low overhead.
Performance Analysis of CP-Based and CAZAC Training Sequence-Based Synchronization in OFDM System R. Gaguk Pratama Yudha; I Gede Puja Astawa; Amang Sudarsono
EMITTER International Journal of Engineering Technology Vol 4 No 2 (2016)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (363.5 KB) | DOI: 10.24003/emitter.v4i2.146

Abstract

Orthogonal Frequency Division Multiplexing (OFDM) is a popular wireless data transmission scheme. However, its synchronization is still being a major problem when it is applied in real hardware. Cyclic Prefix (CP) based synchronization is one of the solutions in this problem, but CP has high crest factor. In the other hand, CAZAC sequence is another solution with lower crest factor but the higher complexity and also CAZAC has potential in security and channel estimation implementation. The performance between CP and CAZAC sequence based synchronization in OFDM system is analyzed in this paper. The real hardware, Universal Software Rado Peripheral (USRP), is used to prove the analysis. The CAZAC sequence has 10% performance increased in frequency offset than CP based synchronization.
Performance Analysis of Circular 8-QAM Constellation with MMSE Equalizer for OFDM System Using USRP Muh. Alfan Taufiqurrahman; I Gede Puja Astawa; Amang Sudarsono
EMITTER International Journal of Engineering Technology Vol 4 No 2 (2016)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1974.161 KB) | DOI: 10.24003/emitter.v4i2.148

Abstract

Bandwidth is very important in communication system, and it is a limited resource. In order to save the limited bandwidth resource, high order M-ary modulation is widely employed in modern communication and broadcasting systems. In Orthogonal Frequency Division Multiplexing (OFDM), fading environment lead to a loss of orthogonality between the subcarriers. In this paper, we present the performance analysis of circular 8-Quadrature Ampilutude Modulation (QAM) constellation for Orthogonal Frequency Division Multiplexing (OFDM) system. We also combine the system with Minimum Mean Square Error (MMSE) equalizer to mitigate the effect of Inter Symbol Interference (ISI). Then, all of this system is implemented practically using Universal Software Radio Peripheral (USRP). The performance of circular 8-QAM and MMSE equalizer is evaluated by comparing with other 8-QAM modulation models such as circular-Zero Forcing (ZF), star-ZF, Square-ZF, Star-MMSE, and Square-MMSE. The performance of circular 8-QAM with MMSE equalizer is  better than the other combinations. Bit Error Rate (BER) graph shows that the performance of circular-MMSE is better than star-MMSE. The performance improvement using circular-MMSE is about 1.6%. The performance will decrease when the distance is increased. The performance of this system is greatly affected by the distance between transmitter and receiver.
Performance Analysis of Video Transmission Using Sequential Distortion Minimization Method for Digital Video Broadcasting Terrestrial Novita Astin; I Gede Puja Astawa; Amang Sudarsono
EMITTER International Journal of Engineering Technology Vol 4 No 2 (2016)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (479.593 KB) | DOI: 10.24003/emitter.v4i2.150

Abstract

This paper presents about the transmission of Digital Video Broadcasting system with streaming video resolution 640x480 on different IQ rate and modulation. In the video transmission, distortion often occurs, so the received video has bad quality. Key frames selection algorithm is flexibel on a change of video, but on these methods, the temporal information of a video sequence is omitted. To minimize distortion between the original video and received video, we aimed at adding methodology using sequential distortion minimization algorithm. Its aim was to create a new video, better than original video without significant loss of content between the original video and received video, fixed sequentially. The reliability of video transmission was observed based on a constellation diagram, with the best result on IQ rate 2 Mhz and modulation 8 QAM. The best video transmission was also investigated using SEDIM (Sequential Distortion Minimization Method) and without SEDIM. The experimental result showed that the PSNR (Peak Signal to Noise Ratio) average of video transmission using SEDIM was an increase from 19,855 dB to 48,386 dB and SSIM (Structural Similarity) average increase 10,49%. The experimental results and comparison of proposed method obtained a good performance. USRP board was used as RF front-end on 2,2 GHz.
Botnet Detection Using On-line Clustering with Pursuit Reinforcement Competitive Learning (PRCL) Yesta Medya Mahardhika; Amang Sudarsono; Ali Ridho Barakbah
EMITTER International Journal of Engineering Technology Vol 6 No 1 (2018)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (4349.397 KB) | DOI: 10.24003/emitter.v6i1.207

Abstract

Botnet is a malicious software that often occurs at this time, and can perform malicious activities, such as DDoS, spamming, phishing, keylogging, clickfraud, steal personal information and important data. Botnets can replicate themselves without user consent. Several systems of botnet detection has been done by using classification methods. Classification methods have high precision, but it needs more effort to determine appropiate classification model. In this paper, we propose reinforced  approach to detect botnet with On-line Clustering using Reinforcement Learning. Reinforcement Learning involving interaction with the environment and became new paradigm in machine learning. The reinforcement learning will be implemented with some rule detection, because botnet ISCX dataset is categorized as unbalanced dataset which have high range of each number of class. Therefore we implemented Reinforcement Learning to Detect Botnet using Pursuit Reinforcement Competitive Learning (PRCL) with additional rule detection which has reward and punisment rules to achieve the solution. Based on the experimental result, PRCL can detect botnet in real time with high  accuracy (100% for Neris, 99.9% for Rbot, 78% for SMTP_Spam, 80.9% for Nsis, 80.7% for Virut, and 96.0% for Zeus) and fast processing time up to 176 ms. Meanwhile the step of CPU and memory usage which are 78 % and 4.3 GB  for pre-processing, 34% and 3.18 GB for online clustering with PRCL, and  23% and 3.11 GB evaluation. The proposed method is one solution for network administrators to detect botnet which has unpredictable behavior in network traffic.
Classification of Radical Web Content in Indonesia using Web Content Mining and k-Nearest Neighbor Algorithm Muh Subhan; Amang Sudarsono; Ali Ridho Barakbah
EMITTER International Journal of Engineering Technology Vol 5 No 2 (2017)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24003/emitter.v5i2.214

Abstract

Radical content in procedural meaning is content which have provoke the violence, spread the hatred and anti nationalism. Radical definition for each country is different, especially in Indonesia. Radical content is more identical with provocation issue, ethnic and religious hatred that is called SARA in Indonesian languange. SARA content is very difficult to detect due to the large number, unstructure system and many noise can be caused multiple interpretations. This problem can threat the unity and harmony of the religion. According to this condition, it is required a system that can distinguish the radical content or not. In this system, we propose text mining approach using DF threshold and Human Brain as the feature extraction. The system is divided into several steps, those are collecting data which is including at preprocessing part, text mining, selection features, classification for grouping the data with class label, simillarity calculation of data training, and visualization to the radical content or non radical content. The experimental result show that using combination from 10-cross validation and k-Nearest Neighbor (kNN) as the classification methods achieve 66.37% accuracy performance with 7 k value of kNN method[1].
Trusted Data Transmission Using Data Scrambling Security Method with Asymmetric Key Algorithm for Synchronization Nihayatus Sa'adah; I Gede Puja Astawa; Amang Sudarsono
EMITTER International Journal of Engineering Technology Vol 6 No 2 (2018)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (804.766 KB) | DOI: 10.24003/emitter.v6i2.267

Abstract

Security is a major concern of the internet world because the development of the Internet requires the security of data transmission. The security method helps us to store valuable information and send it over an insecure network so that it can not be read by anyone except the intended recipient. Security algorithm uses data randomization method. This method of data information randomization has a low computation time with a large number of bits when compared to other encryption algorithms. In general, the encryption algorithm is used to encrypt data information, but in this research the encryption algorithm is used for synchronization between the sender and the intended recipient. Number of bits on asymmetric key algorithm for synchronization are the 64-bits, 512-bits and 1024-bits. We will prove that security methods can secure data sent with low computational time with large number of bits. In the result will be shown the value of computing time with variable number of bits sent. When data are sent by 50 bytes, encryption time required 2 ms using 1024 bits for synchronization technique asymmetric key algorithm. 
Medical Health Record Protection Using Ciphertext-Policy Attribute-Based Encryption and Elliptic Curve Digital Signature Algorithm Novi Aryani Fitri; M. Udin Harun Al Rasyid; Amang Sudarsono
EMITTER International Journal of Engineering Technology Vol 7 No 1 (2019)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (999.468 KB) | DOI: 10.24003/emitter.v7i1.356

Abstract

Information on medical record is very sensitive data due to the number of confidential information about a patient's condition. Therefore, a secure and reliable storage mechanism is needed so that the data remains original without any changes during it was stored in the data center. The user must go through an authentication process to ensure that not an attacker and verify to ensure the authenticity and accuracy of the data received. In this research, we proposed a solution to secure medical data using the Ciphertext-Policy Attribute-Based Encryption (CP-ABE) and Elliptic Curve Digital Signature Algorithm (ECDSA) methods. Our system can secure data centers from illegal access because the uploaded data has patient control over access rights based on attributes that have been embedded during the data encryption process. Encrypted data was added to the digital signature to pass the authentication process before being sent to the data center. The results of our experiments serve efficient system security and secure with low overhead. We compare the proposed system performance with the same CP-ABE method but don’t add user revocation to this system and for our computing times are shorter than the previous time for 0.06 seconds and 0.1 seconds to verify the signature. The total time in the system that we propose requires 0.6 seconds.
Co-Authors Abd. Rasyid Syamsuri Adam Surya Putra Adam Surya Putra Afifah Dwi Ramadhani agostinho marques ximenes Ahmad Zainudin Ali Ridho Barakbah Anang Budikarso Anang Budikarso, Anang Anang Siswanto Anang Siswanto Anang Siswanto, Anang Anindya Dwi Putri Islamidina Ari Wijayanti Ari Wijayanti Aries Pratiarso Aries Pratiarso Aries Pratiarso, Aries Astin, Novita Bambang Sumantri Bayu Dwiyan Satria Bih Hwang Lee Bima Sena Bayu Dewantara Choirun Nisa Dadet Pramadihanto Darmawan, Zakha Maisat Eka Dewi, Florista Dewi, Ni Made Lintang Asvini Dian Neipa Purnamasari Donny Farhan Eko Prayitno Farel Juliansyah Farhan, Donny Febby Ronaldo Fitri, Novi Aryani Florista Dewi Gulo, Melki Mario Gunawan, M. Wisnu Hadi, Mochammad Zen Samsono Haniah Mahmudah Hari Wahyuningrat S. Hary Oktavianto Haryadi Amran Hasan Basri Hasan Basri Hendy Briantoro Heru Iswanto Heru Iswanto, Heru Hidayah, Nuril Hudhajanto, Rizky Pratama I Gede Puja Astawa I Gede Puja Astawa I Gede Puja Astawa I Gede Puja Astawa I Gede Puja Astawa I Gede Puja Aswara Ida Anisah Idris Winarno Indah Yulia Prafitaning Tiyas Indah Yulia Prafitaning Tiyas, Indah Yulia Prafitaning Inka Trisna Dewi Ismed Jauhar Ismed Jauhar, Ismed Juliansyah, Farel Kevin Prima Pambudi Kevin Prima Pambudi, Kevin Prima Lordan Kimbal, Heaven Louis Nashih Uluwan Arif M Udin Harun Al Rasyid, M Udin Harun M. Cahyo Kriswantoro Mahardhika, Yesta Medya Mahmudah, Haniah Mala Nurilmala Mike Yuliana Mochammad Zen Samsono Hadi Mohamad Ridwan Muh Subhan Muh. Alfan Taufiqurrahman Muhammad Taufiq Sumadi Nanang Syahroni Ni Made Lintang Asvini Dewi Nihayatus Sa'adah Nihayatus Sa'adah Ningsih, Norma Novita Astin Nur Nur Adi Siswandari Nurul Fahmi Nurul Fahmi Nurul Fahmi Priambodo, Naufal Ammar Prima Kristalina Putra, Adam Surya Qoirul Setiawan Qoirul Setiawan, Qoirul R Rizki Rachmadi R. Gaguk Pratama Yudha Rafina Destiarti Ainul Rahardita Widyatra Ramadhani, Afifah Dwi Reni Soelistijorini Renovita Edelani Rini Satiti Rizky Pratama Hudhajanto Rokhmat Albasyih Samsul Huda Samsul Huda Santoso, Tribudi Saputro, Anton Cahyo Satiti, Rini Sa’adah, Nihayatus Soelistijorini, Reni Sritrusta Sukaridhoto Subhan, Muh Syahroni, Nanang Taufiqurrahman, Muh. Alfan Titon Dutono Tri Budi Santoso Tri Budi Santoso Tri Harsono TRI SUSANTI Tri Susanti Tribudi Santoso Vivien Arief Wardhany Wahjoe Tjatur Sesulihatien Wahyuningrat S., Hari Winarmo, Idris Ximenes, Agostinho Marques Yoedy Moegiharto, Yoedy Yoga Yuniadi Yudha, R. Gaguk Pratama Yuliana, Mike