Claim Missing Document
Check
Articles

Found 4 Documents
Search

Developing a Prototype for Enhancing Data Security in LoRaBased Theft Detection Systems Using ASCON-128 Encryption Amelia, Fetty; Wulandari Hartejo, Bella
Indonesian Journal of Electrical Engineering and Informatics (IJEEI) Vol 13, No 1: March 2025
Publisher : IAES Indonesian Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52549/ijeei.v13i1.6021

Abstract

Asset protection is crucial for organizations to prevent theft. This study presents a LoRa-based theft detection prototype enhanced with ASCON-128 encryption for secure data transmission. The system consists of a transmitter attached to assets and a receiver in a monitoring room, featuring a web-based digital map for real-time tracking. ASCON-128, a NIST-standard lightweight encryption algorithm, ensures data confidentiality and integrity against ManIn-The-Middle (MITM) attacks. The system was evaluated based on transmission speed, power consumption, and security performance. Results indicate that ASCON-128 integration reduces data transmission speed by 42.7% in Line-of-Sight (LOS) and 45.35% in Non-Line-of-Sight (NLOS) conditions. Power consumption increased by 2.7% in standby mode and 12.85% under simulated attack scenarios. Despite these trade-offs, encryption provides significant security benefits with acceptable resource overhead, making it a viable solution for LoRa-based asset tracking and theft detection.
Measurement of Digital Literacy Index of High School Students or Equivalent in Bogor Regency Magfirawaty, Magfirawaty; Syahral, Mohamad; Ogi, Dion; Lestari, Andriani Adi; Amelia, Fetty; Khairunnisa, Rizka; Arizal, Arizal; Nurwa, Agus Reza Aristiadi
Jurnal Abdimas Vol. 28 No. 2 (2024): December 2024
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15294/26fmrt40

Abstract

The digitalization era is developing rapidly in Indonesia. The pandemic that occurred accelerated digital transformation in various fields. Various digital platforms were developed to support the continuity of education during the pandemic so that they could develop digital skills and improve the status of digital literacy in Indonesia. In addition to the positive impacts, there are also negative impacts from the development of digital transformation. The National Cyber and Crypto Polytechnic which focuses on information security is committed to encouraging increased digital skills and literacy in the surrounding community. Therefore, this time the National Cyber and Crypto Polytechnic located in Bogor Regency began to focus on developing digital skills and literacy among high school students or equivalent in Bogor Regency. The students' digital literacy status was first measured and then the right program or activity was determined to develop their digital skills and literacy. The digital literacy status was measured based on four pillars, Pillar 1 Digital Skill, Pillar 2 Digital Ethics, Pillar 3 Digital Safety, and Pillar 4 Digital Culture. Data collection was carried out by giving questionnaires to 276 high school students or equivalent who used the internet in Bogor Regency. Students give a score to each statement and then the score will be calculated as an average per pillar. The digital literacy index is obtained from the average score of all pillars. The digital literacy index result is 3.14 which is higher than the West Java digital literacy index of 2.78. In addition, pillar 2 Digital Ethic has the lowest score among the four pillars so that the next program is expected to aim to increase this score.
Mathematics in Cryptography and Its Applications in Cybersecurity Isnaini, Uha; Qomariasih, Nurul; Amiruddin, Amiruddin; Tantrawan, Made; Arizal, Arizal; Ernanto, Iwan; Adiati, Nadia Paramita Retno; Indarsih, Indarsih; Yasa, Ray Novita; Wijayanti, Indah Emilia; Indarjani, Santi; Salmah, Salmah; Ulfa, Septia; Hartanto, Ari Dwi; Amelia, Fetty
Jurnal Pengabdian kepada Masyarakat (Indonesian Journal of Community Engagement) Vol 11, No 4 (2025): December
Publisher : Direktorat Pengabdian kepada Masyarakat Universitas Gadjah Mada

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/jpkm.101525

Abstract

The growing prevalence of cyber threats and attacks poses significant risks to the security of personal data and the integrity of sensitive information worldwide. Cryptography plays a vital role in establishing strong cybersecurity defenses, and the development of robust cryptographic algorithms is essential for protecting data against cyber-attacks. This workshop aimed to enhance participants’ understanding of the mathematical foundations of cryptographic algorithms and equip them with practical skills to identify and mitigate cyber threats. It also introduced innovative educational tools, including an Augmented Reality (AR) application for teaching classical cryptography and a Game-Based URL Phishing Education application. A total of 110 participants attended and completed the pre-test. The post-test measured knowledge gained during the workshop, and an accompanying survey gathered feedback on its effectiveness and identified areas for improvement. Overall, the workshop successfully achieved its objectives by educating participants on cryptography in the Internet of Things (IoT), increasing awareness of social engineering, introducing cryptographic tools from ancient to modern times, and exploring the principles of quantum cryptography.
Seamless Security on Mobile Devices Textual Password Quantification Model Based Usability Evaluation of Secure Rotary Entry Pad Authentication Herman Kabetta; Hermawan Setiawan; Fetty Amelia; Muhammad Qolby Fawzan
MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer Vol. 22 No. 2 (2023)
Publisher : Universitas Bumigora

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/matrik.v22i2.2700

Abstract

Mobile devices are vulnerable to shoulder surfing and smudge attacks, which should occur when a user enters a PIN for authentication purposes. This attack can be avoided by implementing a rotary entry pad mechanism. Despite this, several studies have found that using a rotary entry pad reduces user usability. This study uses a Design Research Methodology approach. It will implement a rotary entry pad authentication in the Android operating system as an authentication method to protect the device against Shoulder Surfing Attacks and Smudge Attacks. Furthermore, it combined JSON Web Token (JWT) to secure the authentication process from the client to the server. At the end of implementation, it compared with other studies in terms of usability and evaluated it using the TQ-Model, which showed that the usability aspect has improved. Regarding security, we conducted a shoulder surfing attack simulation to assess the efficacy of guessing PINs. The results showed that only a limited number of attempts were successful, with two out of five samples failing to guess any numbers and only one sample successfully guessing six 10-digit PIN combinations out of 10 to the power of 10. The security test results show that shoulder surfing attacks are more difficult to perform after implementing the rotary entry pad. The evaluation showed that the JSpinpad performed better, with seven parameters showing improvement, one parameter showing a decline, and ten parameters remaining unchanged.