Claim Missing Document
Check
Articles

Analisis Perbandingan Algoritma Advanced Encryption Standard Untuk Enkripsi Short Message Service (SMS) Pada Android Fredianto Fredianto; Ari Kusyanti; Kasyful Amron
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 10 (2018): Oktober 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1133.705 KB)

Abstract

Short Message Service (SMS) is a popular service among mobile phone users in Indonesia. The biggest security gap in SMS communications is that it can read messages and save them to the Short Message Service Center (SMSC) when an SMSC attack occurs. One solution to solve the problem is by encoding messages that are sent or better known as encryption. In this research, AES 128 AES, AES 192 bits AES and AES 256 bits are used for SMS message encryption on Android. The Elliptic Curve Diffie-Hellman (ECDH) protocol is used in key exchange mechanisms for encryption and decryption of messages. In this study obtained the longer the data will be the longer the process of encryption and decryption. In this research, there is no significant performance difference, it is proved by ANOVA test which has been done with each data length.
Pengamanan Data pada Media Penyimpanan Cloud Menggunakan Teknik Enkripsi dan Secret Sharing Mohammad Fachry; Ari Kusyanti; Kasyful Amron
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 11 (2018): November 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (557.367 KB)

Abstract

Cloud computing is a technology that used to store data online. With only internet connection, store and access data can be an easy task. However, cloud computing technology also cause some security problems. Cryptography is a study of how data can be secured. Therefore, applying cryptography in cloud computing environment is not a new thing. New algorithms and combination between them is expanded and studied to ensure security aspects such as confidentiality, integrity and availability. In this research, a system is built with applying 2 methods of cryptography, encryption and secret sharing to ensure data. Data that is ensured will be store at 2 different type of media storage namely cloud storage and laptop's internal storage. The test shows all the security functions work well.
Implementasi Konsep Internet of Things pada Sistem Monitoring Banjir menggunakan Protokol MQTT Chrisyantar Hasiholan; Rakhmadhany Primananda; Kasyful Amron
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 12 (2018): Desember 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (941.049 KB)

Abstract

In general, Internet of Things can be interpreted as connecting various objects around with an internet network. To implement it, the Internet of Things requires a communication path to suit the needs of the system. One protocol that suits the application of the concept of Internet of Things is the Message Queue Telemetry Transport (MQTT) protocol. The MQTT protocol is often used in systems that use the concept of the Internet of Things, one of which is the monitoring system. One aspect of life that requires a monitoring system is a natural disaster. From various natural disasters that occurs Indonesia, Flood is a natural disaster that quite often hit many cities in Indonesia. Therefore, this research implements the concept of Internet of Things on flood monitoring system using MQTT protocol. Based on test results, it is concluded that MQTT protocol can be used in flood monitoring system. The accuracy of the system is 97.801% with obtained standard deviation is ± 0.0309 cm. In scalability testing, obtained the average percentage of success rate of 100%, 99.87% and 99.93% on thread trials 100, 250 and 500, which each performed 3 times. And on data integrity testing, the MQTT protocol obtains the same 100% data in each experiment with intervals of 10ms, 100ms and 1000ms.
Implementasi Protokol Geographic Source Routing(GSR) Pada Vehicular Ad-Hoc Network(VANET) untuk Komunikasi Kendaraan Dengan Road Side Unit(RSU) Rezky Hadiwiriyanto; Primantara Hari Trisnawan; Kasyful Amron
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 12 (2018): Desember 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (410.628 KB)

Abstract

Vanet (Vehicular Ad Hoc Network)is a type of wireless network that provides communication vehicles that serve as its nodes. Vanet has three elements, namely among vehicle to vehicle communication (V2V), vehicle to infrastructure (V2I) and infrastructure to infrastructure (I2I). This study focuses on the communication vehicle to infrastructure such as Road Side Unit (RSU). Various problems arise in the design of Vanet, one of them is the use of a protocol that is not in accordance with the criteria and mechanism of action of the Vanet. In this study, the protocols in use are the GSR and AODV protocol which are implemented and compared based on the scenarios research which are the density of the vehicle, the vehicle speed and the number of RSU's variations specify the protocol works best on Vanet environment. Implementation is performed using (NS-2) and SUMO. The results of the GSR and AODV protocol implementation are analyzed based on the test parameters are throughput, end-to-end delay and packet delivery ratio. From the test results, protocols AODV has a better performance in scenarios density and speed of the vehicle with the parameters throughput and packet delivery ratio with a value of 1004 bps and 99.65%, while the GSR better its performance on parameters of end-to-end delay with a value of 2.35 ms. In scenario number variation RSU, GSR protocol has better performance parameters of throughput and end-to-end delay with a value of 4060 bps and 2,531 ms while AODV protocol, better on the parameters of packet delivery ratio with a value of 99.83%.
Implementasi Protokol Zigbee Pada Wireless Sensor Network Jefri Muhrimansyah; Rakhmadhany Primananda; Kasyful Amron
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 2 (2019): Februari 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (501.127 KB)

Abstract

WSN was implemented in densely populated area by using zigbee as the communication protocol. It was chosen to be the communication protocol because it is applicable in the extreme area. The selection of mesh topology due to each node is connected to each other, so they can communicate and switch the information among them. The selection protocol of routing Ad-hoc On-Deman Distance Vector (AODV) due to the route search on AODV is only needed when the route request is exist. In this research, testing was done in three scenarios, namely, test based on the condition where the barrier is exist and is not exist, test based on distance and the amount of the data. Based on the test, the analysis of several test parameters, such as throughput, delay and packet loss. Based on the result of testing and analyzing the Zigbee maximum distance in sending the data censor was 40 meter in a barrier condition, with the highest throughput value was 72 bps, the highest delay value was 0,0028 ms and the highest packet loss value was 70% at 50 meter distance. On the amount of data based testing, the highest throughput value was 65.3 bps, the highest delay value was 3.872ms, and the highest packet loss value was 47% from 30 data. Furthermore, the condition with and without barrier based test resulted some values, such as the highest throughput value was 65.3 bps, the highest delay value was 3.136ms and the highest packet loss value was 35%.
Perbandingan Algoritme FIFO, PIE, dan RED terhadap Quality of Service pada Wireless Local Area Network Rayza Arfian; Primantara Hari Trisnawan; Kasyful Amron
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 2 (2019): Februari 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (640.772 KB)

Abstract

One product of technological advancements in wireless network is Wi-Fi with the IEEE 802.11 standard. Wi-Fi technology can be found in public facilities in the form of a Wireless Local Area Network (WLAN) and then turned into a public hotspot. A public hotspot surely has limitation either in accomodating a data packet or a number of clients connected. Data packets that are in the queue are generally processed according to the order in which the packets arrives. This can have an effect on Quality of Service. In this research, the implementation of the queue algorithm in the WLAN was carried out to determine its effect on Quality of Service. The queue algorithms are the First-In-First-Out (FIFO) algorithm, Enhanced Proportional Integral Control (PIE), Random Early Detection (RED). The Wi-Fi standard being used is IEEE 802.11b. In Packet Delivery Ratio, the FIFO algorithm provides better results than PIE and RED. FIFO experienced a 0,7% improvement when using 1000 packets as a queue capacity. Then in the End-to-End Delay test, PIE and RED provide an average delay of 0,9 seconds on each test, better than the FIFO algorithm which can reach 5 seconds. Finally, in throughput all the algorithms tested give results that are not far with only 1-2 bps differences.
Analisis Perbandingan Kinerja Routing Protokol IS-IS dengan Routing Protokol EIGRP dalam Dynamic Routing Egi Muliandri; Primantara Hari Trisnawan; Kasyful Amron
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 2 (2019): Februari 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (954.085 KB)

Abstract

In Dynamic Routing, EIGRP routing protocol and IS-IS routing protocol were the fastest routing protocol with convergence time compared to other routing protocols. With the difference algorithm used in EIGRP routing protocol and IS-IS routing protocol, it certainly makes a difference in characteristics and performance of both routing protocols. In this research Graphical Network Simulator 3 (GNS 3) is used to simulate EIGRP routing protocol and IS-IS routing protocol with Mesh topology. The test was performed using Mesh topology with 4 routers, 6 routers and 8 routers. Parameters used are Convergence time and Round Trip delay. The purpose of this research is to know which routing protocol is the most appropriate for use on Mesh topology and to know Convergence process when link was broken. In the results of this study can be shown that the EIGRP routing protocol has the fastest Convergence process because it uses the DUAL algorithm on the best path calculation. While the IS-IS routing protocol is a very easy routing protocol to be deployed on the network
Implementasi Sistem Gateway Discovery pada Wireless Sensor Network (WSN) Berbasis Modul Komunikasi LoRa Alfian Rizky Susanto; Adhitya Bhawiyuga; Kasyful Amron
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 2 (2019): Februari 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (794.559 KB)

Abstract

Wireless Sensor Network (WSN) is a network of several nodes that do sensing and can control the environment, can contain interactions between humans and computers and the state of the environment. WSN has several components that are used for environmental monitoring such as sensor nodes and gateways to collect sensor data. Both components communicate with wireless technology intermediaries. One of the wireless technologies is LoRa. LoRa is a low-power wireless technology that uses the radio spectrum. LoRa characteristics that can accommodate long distances and low power consumption, are suitable to be applied to the WSN. But there are shortcomings in the implementation of LoRa, namely the absence of a gateway discovery system in LoRa. From this explanation, this research focuses on creating gateway discovery system to overcome these shortcomings. The performance test results show that the system built can function up to a distance of 1000 meters. At the maximum distance of performance testing, namely 1000 meters, the association time value is 354.4 milliseconds, unicast loss is 6% and broadcast loss is 20%. This has an impact on the performance of gateway discovery system because increase value of these parameters, the system performance will get worse.
Pengembangan Sistem Perantara Pengiriman Data Menggunakan Modul Komunikasi LoRa dan Protokol MQTT Pada Wireless Sensor Network Haidar Arijuddin; Adhitya Bhawiyuga; Kasyful Amron
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 2 (2019): Februari 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (406.646 KB)

Abstract

The development of Internet of Things is always supported by the WSN (Wireless Sensor Network) concept but the battery power consumption of WSN raises a constant need to lower the energy requirement. LoRa (Long Range) technology acquires low power consumption and broad communication range of more than 2 km, however cannot send data directly to the server. So that a data delivery system is needed to connect between devices at the sensor node to a server called the gateway. The communication between gateway and data centers employs MQTT protocol since it supports the characteristics of IoT such as small bandwidth usage. This research attempted to develop a gateway system in order to connect the sensor nodes and data centers utilizing LoRa communication modules and MQTT protocol. The result of successful rate gateway kinerjance using distance, data size, and different intervals as variables indicates that in range of 400 meters the gateway kinerjance in receiving and forwarding data to data centers is better than the range of 200 meters.
Implementasi Sistem Pemantauan Suhu dan Kelembapan Udara Berbasis Protokol AMQP Edgar Juvianno Santoso; Rakhmadhany Primananda; Kasyful Amron
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 4 (2019): April 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (310.426 KB)

Abstract

Indoor air quality is a problem that needs attention because it will affect human health. To maintain indoor air quality, there is a need for a system that can monitor temperature and humidity in the room. This monitoring system can be realized by using the Internet of Things (IoT) technology. In implementing IoT technology, a data communication protocol is needed to share data between each node in the IoT infrastructure. One of the frequently used data communication protocols is AMQP (Advanced Message Queuing Protocol). The use of the AMQP protocol in this study is supported by the condition of home networks that are considered to meet the needs of AMQP. With air temperature and humidity monitoring system, it is expected that the air quality in the room can be monitored properly. This study provides results that the implementation of the AMQP protocol on air temperature and humidity monitoring systems was successfully carried out and from the test results of the system reliability testing showed that the system was able to handle up to 210 Producers with Broker's devices memory usage of 0.4132 MB and Consumer's devices at 0.8345 MB.