Claim Missing Document
Check
Articles

Medical Image Encryption Using Modified Identity Based Encryption Dian Neipa Purnamasari; Amang Sudarsono; Prima Kristalina
EMITTER International Journal of Engineering Technology Vol 7 No 2 (2019)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24003/emitter.v7i2.405

Abstract

The development of technology and communication also affects the level of security needed for digital image transmission. It is known that digital images now have important meanings in both communication and video conference. In this paper, we propose a security method for medical encryption in the form of images. The proposed method is implemented in the modified Identity-Based Encryption scheme. The encryption algorithm used is Elliptic Curve Cryptography (ECC) to generate key pairs and the Advanced Encryption Standard (AES) to generate symmetric keys and encrypt process. This method has been tested based on computation time, histogram analysis and statistical analysis. The results of the test were obtained that the proposed method was resistant to multiple attacks despite having slower computing time. The proposed compute time error percentage is 1.69% for key generator stages and 0.07% for total compute time at the encrypt-decrypt stage.
Secure Data Travelling User using Hybrid Cryptosystem with User Privacy Protection Anindya Dwi Putri Islamidina; Amang Sudarsono; Titon Dutono
EMITTER International Journal of Engineering Technology Vol 8 No 1 (2020)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24003/emitter.v8i1.486

Abstract

Nowadays traveling is the activity that everyone likes the most, but sometimes there is one traveling member who is lost and confused looking for the location of the other members. When traveling, they must bring a smartphone because of its small size and easy to carry anywhere. For this reason, an Android-based smartphone application that is able to send GPS data to all travelling members is proposed. In order to secure data transmission, cryptography and group signature to ensure that only traveling members could find out the location are applied. We use hybrid cryptography, which is a combination of symmetric cryptography using AES and asymmetric cryptography using IB-mRSA. We also add group signature as verification that members are in the same traveling group. The test result showed that the proposed method is safer than the comparison method because the symmetric key is encrypted before the key is distributed, so the attacker can not know the key. The total processing time needed to send data until member get data is 2.01 s.
Higher Rate Secret Key Formation (HRKF) based on Physical Layer for Securing Vehicle-to-Vehicle Communication Inka Trisna Dewi; Amang Sudarsono; Prima Kristalina; Mike Yuliana
EMITTER International Journal of Engineering Technology Vol 8 No 1 (2020)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24003/emitter.v8i1.493

Abstract

One effort to secure vehicle-to-vehicle (V2V) communication is to use a symmetrical cryptographic scheme that requires the distribution of shared secret keys. To reduce attacks on key distribution, physical layer-based key formation schemes that utilize the characteristics of wireless channels have been implemented. However, existing schemes still produce a low bit formation rate (BFR) even though they can reach a low bit error rate (BER). Note that V2V communication requires a scheme with high BFR in order to fulfill its main goal of improving road safety. In this research, we propose a higher rate secret key formation (HRKF) scheme using received signal strength (RSS) as a source of random information. The focus of this research is to produce keys with high BFR without compromising BER. To reduce bit mismatch, we propose a polynomial regression method that can increase channel reciprocity. We also propose a fixed threshold quantization (FTQ) method to maintain the number of bits so that the BFR increases. The test results show that the HRKF scheme can increase BFR from 40% up to 100% compared to existing research schemes. To ensure the key cannot be guessed by the attacker, the HRKF scheme succeeds in producing a key that meets the randomness of the NIST test.
SDN-Based Network Intrusion Detection as DDoS defense system for Virtualization Environment Saifudin Usman; Idris Winarno; Amang Sudarsono
EMITTER International Journal of Engineering Technology Vol 9 No 2 (2021)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24003/emitter.v9i2.616

Abstract

Nowadays, DDoS attacks are often aimed at cloud computing environments, as more people use virtualization servers. With so many Nodes and distributed services, it will be challenging to rely solely on conventional networks to control and monitor intrusions. We design and deploy DDoS attack defense systems in virtualization environments based on Software-defined Networking (SDN) by combining signature-based Network Intrusion Detection Systems (NIDS) and sampled flow (sFlow). These techniques are practically tested and evaluated on the Proxmox production Virtualization Environment testbed, adding High Availability capabilities to the Controller. The evaluation results show that it promptly detects several types of DDoS attacks and mitigates their negative impact on network performance. Moreover, it also shows good results on Quality of Service (QoS) parameters such as average packet loss about 0 %, average latency about 0.8 ms, and average bitrate about 860 Mbit/s.
Partition-Based GTS Adjustment for Wireless Sensor Networks M. Udin Harun Al Rasyid; Bih Hwang Lee; Amang Sudarsono
Journal of ICT Research and Applications Vol. 9 No. 2 (2015)
Publisher : LPPM ITB

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.5614/itbj.ict.res.appl.2015.9.2.4

Abstract

The personal area network (PAN) coordinator can assign a guaranteed time slot (GTS) to allocate a particular duration for requested devices in IEEE 802.15.4 beacon-enabled mode. The main challenge in the GTS mechanism is how to let the PAN coordinator allocate time slot duration for the devices which request a GTS. If the allocated devices use the GTS partially or the traffic pattern is not suitable, wasted bandwidth will increase, which degrades the performance of the network. In order to overcome the abovementioned problem, this paper proposes the Partitioned GTS Allocation Scheme (PEGAS) for IEEE 802.15.4 networks. PEGAS aims to decide the precise moment for the starting time, the end, and the length of the GTS allocation for requested devices taking into account the values of the superframe order, superframe duration, data packet length, and arrival data packet rate. Our simulation results showed that the proposed mechanism outperforms the IEEE 802.15.4 standard in terms of the total number of transmitted packets, throughput, energy efficiency, latency, bandwidth utilization, and contention access period (CAP) length ratio.
Implementasi Metode LightGBM Untuk Klasifikasi Kondisi Abnormal Pada Pengemudi Sepeda Motor Berbasis Sensor Smartphone R Rizki Rachmadi; Amang Sudarsono; Tri Budi Santoso
Jurnal Komputer Terapan Vol. 7 No. 2 (2021): Jurnal Komputer Terapan
Publisher : Politeknik Caltex Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (399.912 KB) | DOI: 10.35143/jkt.v7i2.5164

Abstract

Traffic accident is one of the most significant contributors which makes the death number is increasing around the world. With the demographic condition from Indonesia, motorcycle driver is the types of the driver that dominated the traffic, therefore increasing the probability of caught in a traffic accident The existing Vehicle Activity Detection System (VADS) mainly focused on the car driver, with the main problem is that the computational time from the system is too high to be implemented on a real-time condition. To solve this problem, in this research, a classification system for abnormal driving behavior from motorcycle drivers is created, using Light Gradient Boosting Machine (LightGBM) model. The system is designed to be lightweight in computation and very fast in response to the changes of the activities with a high velocity. To train the LightGBM model, the data from Accelerometer and Gyroscope sensor, that has been integrated into a smartphone, will be used to detect the movement from a driver. The accuracy rate from the proposed model is reaching 82% on the test dataset and shows a promising result of around 70% on the real-time detection process. With a computational time of around 10ms, the proposed system is able to work 5 times faster than the existing system.
Modifikasi Identity-based Encryption pada Keamanan dan Kerahasiaan Data Rekam Medis Dian Neipa Purnamasari; Amang Sudarsono; Prima Kristalina
INOVTEK POLBENG Vol 9, No 2 (2019): INOVTEK VOL.9 NO 2 - 2019
Publisher : POLITEKNIK NEGERI BENGKALIS

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (80.356 KB) | DOI: 10.35314/ip.v9i2.1005

Abstract

Keamanan pada data rekam medis menjadi hal yang penting selain mengingat pentingnya isi dari rekam medis tersebut, keamanan pada data rekam medis telah diatur oleh kemeterian di Indonesia. Perkembangan teknologi membawa pengaruh pada penyimpanan data rekam medis, salah satunya perubahan data rekam medis dari konvensional menjadi elektronik. Namun, perkembangan teknologi ini juga memiliki dampak buruk yaitu munculnya oknum-oknum yang menjalankan kegiatan ilegal untuk mendapatkan keuntungan pribadi atau kelompok. Salah satunya adalah mencuri data rekam medis untuk memeras pasien, bahkan melakukan perubahan pada data rekam medis yang berdampak fatal pada kesehatan pasien. Pada penelitian ini diusulkan metode keamanan data rekam medis menggunakan modifikasi skema Identity-based Encryption (IBE) dan algoritma AES atau dapat disebut dengan mIBE-AES. Keunikan dari metode yang diusulkan adalah nilai awal yang telah ditentukan dari tiap byte pada identitas pengguna sehingga dapat menekan waktu komputasi pada proses pembangkitan kunci. Metode yang diusulkan akan dibandingkan dengan metode keamanan yang hanya menggunakan algoritma AES. Evaluasi performa yang telah dilakukan adalah pengujian kinerja dan tingkat keamanan pada penyerangan Man in The Middle (MITM). Didapatkan hasil bahwa metode mIBE-AES lebih unggul dengan total waktu komputasi 0,799 detik serta mampu menangani penyerangan MITM dengan skenario sniffing dan chosen-plaintext.
Implementation Parallel Computation for Automatic Clustering Bayu Dwiyan Satria; Ali Ridho Barakbah; Amang Sudarsono
Jurnal Mantik Vol. 5 No. 2 (2021): Augustus: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/jurnalmantik.Vol5.2021.1439.pp994-1005

Abstract

Developments in the industrial world, especially in the field of computer technology, demand solutions to needs ranging from computing resources, storage media, and communication speeds. This was followed by many new studies in this field, including those related to clustering. Clustering is an exploratory data analysis tool that deals with the task of grouping objects that are similar to each other [1], [2]. Clustering requires computers with high resources, usually the price for computers with high resources, while computers with not too high specifications will be less reliable in handling such large data. Clustering that runs on a single-core processor takes a long time to execute tasks, so parallel computing is needed to speed up computing performance especially at Automatic Clustering. This research will produce faster performance in grouping large data by utilizing parallel computing and automatic clustering methods as methods for grouping data. This technology allows data processing to be carried out in parallel and distributed in hundreds or even thousands of computers, so this technology is very appropriate for processing very large amounts of data)
Zero Knowledge Authentication Modification for Drone and Server Communication Security Choirun Nisa; Amang Sudarsono; Mike Yuliana
Jurnal Mantik Vol. 5 No. 2 (2021): Augustus: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/jurnalmantik.Vol5.2021.1446.pp1019-1029

Abstract

Drones are now being used in various fields. One of the uses of drones is for delivery service. When delivering goods, the drone needs to report its condition while traveling to the server so that the server can monitor the drone and the server can give some commands to the drone. However, when the drone receives data from the server, there are many vulnerabilities it has against the attacker that can take control of the drone device. Taking control of the drone can occur if the attacker manages to send a script that can take over control of the drone. If the attacker can take control over the drone device, the attacker can steal the drone both physically or data of the drone. For this reason, in this study, we propose an authentication algorithm that can filter out who is allowed to send data to the system. The algorithm used is Zero-Knowledge Authentication. To improve the performance of the Zero-Knowledge Authentication algorithm in terms of authentication speed, we try to combine it with the secret key generated from the Secret Key Generation process. From the results of authentication testing, the effectiveness of the proposed algorithm after a Brute Force attack experiment is 100% for single attacker scenarios and for multiple attackers the effectiveness is 100% in LOS and NLOS conditions. Because drones have limited resources, the authentication time experiment is also performed and the result is that in all scenarios the time required to authenticate is in microseconds so that the proposed algorithm can be implemented on drones with limited resources.
Secure Real-time Data Transmission for Drone Delivery Services using Forward Prediction Scheduling SCTP Febby Ronaldo; Amang Sudarsono; Dadet Pramadihanto
EMITTER International Journal of Engineering Technology Vol 10 No 1 (2022)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24003/emitter.v10i1.690

Abstract

Drone technology is considered the most effective solution for the improvement of various industrial fields. As a delivery service, drones need a secure communication system that is also able to manage all of the information data in real-time. However, because the data transmission process occurs in a wireless network, data will be sent over a channel that is more unstable and vulnerable to attack. Thus, this research, purposes a Forward Prediction Scheduling-based Stream Control Transmission Protocol (FPS-SCTP) scheme that is implemented on drone data transmission system. This scheme supports piggybacking, multi-streaming, and Late Messages Filter (LMF) which will improve the real-time transmission process in IEEE 802.11 wireless network. Meanwhile, on the cybersecurity aspect, this scheme provides the embedded option feature to enable the encryption mechanism using AES and the digital signatures mechanism using ECDSA. The results show that the FPS-SCTP scheme has better network performance than the default SCTP, and provides full security services with low computation time. This research contributes to providing a communication protocol scheme that is suitable for use on the internet of drones’ environment, both in real-time and reliable security levels.
Co-Authors Abd. Rasyid Syamsuri Adam Surya Putra Adam Surya Putra Afifah Dwi Ramadhani agostinho marques ximenes Ahmad Zainudin Ali Ridho Barakbah Anang Budikarso Anang Budikarso, Anang Anang Siswanto Anang Siswanto Anang Siswanto, Anang Anindya Dwi Putri Islamidina Ari Wijayanti Ari Wijayanti Aries Pratiarso Aries Pratiarso Aries Pratiarso, Aries Astin, Novita Bambang Sumantri Bayu Dwiyan Satria Bih Hwang Lee Bima Sena Bayu Dewantara Choirun Nisa Dadet Pramadihanto Darmawan, Zakha Maisat Eka Dewi, Florista Dewi, Ni Made Lintang Asvini Dian Neipa Purnamasari Donny Farhan Eko Prayitno Farel Juliansyah Farhan, Donny Febby Ronaldo Fitri, Novi Aryani Florista Dewi Gulo, Melki Mario Gunawan, M. Wisnu Hadi, Mochammad Zen Samsono Haniah Mahmudah Hari Wahyuningrat S. Hary Oktavianto Haryadi Amran Hasan Basri Hasan Basri Hendy Briantoro Heru Iswanto Heru Iswanto, Heru Hidayah, Nuril Hudhajanto, Rizky Pratama I Gede Puja Astawa I Gede Puja Astawa I Gede Puja Astawa I Gede Puja Astawa I Gede Puja Astawa I Gede Puja Aswara Ida Anisah Idris Winarno Indah Yulia Prafitaning Tiyas Indah Yulia Prafitaning Tiyas, Indah Yulia Prafitaning Inka Trisna Dewi Ismed Jauhar Ismed Jauhar, Ismed Juliansyah, Farel Kevin Prima Pambudi Kevin Prima Pambudi, Kevin Prima Lordan Kimbal, Heaven Louis Nashih Uluwan Arif M Udin Harun Al Rasyid, M Udin Harun M. Cahyo Kriswantoro Mahardhika, Yesta Medya Mahmudah, Haniah Mala Nurilmala Mike Yuliana Mochammad Zen Samsono Hadi Mohamad Ridwan Muh Subhan Muh. Alfan Taufiqurrahman Muhammad Taufiq Sumadi Nanang Syahroni Ni Made Lintang Asvini Dewi Nihayatus Sa'adah Nihayatus Sa'adah Ningsih, Norma Novita Astin Nur Nur Adi Siswandari Nurul Fahmi Nurul Fahmi Nurul Fahmi Priambodo, Naufal Ammar Prima Kristalina Putra, Adam Surya Qoirul Setiawan Qoirul Setiawan, Qoirul R Rizki Rachmadi R. Gaguk Pratama Yudha Rafina Destiarti Ainul Rahardita Widyatra Ramadhani, Afifah Dwi Reni Soelistijorini Renovita Edelani Rini Satiti Rizky Pratama Hudhajanto Rokhmat Albasyih Samsul Huda Samsul Huda Santoso, Tribudi Saputro, Anton Cahyo Satiti, Rini Sa’adah, Nihayatus Soelistijorini, Reni Sritrusta Sukaridhoto Subhan, Muh Syahroni, Nanang Taufiqurrahman, Muh. Alfan Titon Dutono Tri Budi Santoso Tri Budi Santoso Tri Harsono Tri Susanti TRI SUSANTI Tribudi Santoso Vivien Arief Wardhany Wahjoe Tjatur Sesulihatien Wahyuningrat S., Hari Winarmo, Idris Ximenes, Agostinho Marques Yoedy Moegiharto, Yoedy Yoga Yuniadi Yudha, R. Gaguk Pratama Yuliana, Mike