Claim Missing Document
Check
Articles

Implementasi Access Control List Berbasis Protokol MQTT pada Perangkat NodeMCU Ardhian Rizki Ramadhani; Adhitya Bhawiyuga; Reza Andria Siregar
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 8 (2018): Agustus 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1346.867 KB)

Abstract

Message Queuing Telemetry Transport (MQTT) is a light-weight Internet-of-Things protocol based of topic-based publish-subscribe mechanism that is suitable for constrained devices. MQTT has a security problem in terms of privacy, to ensure client's identity which access MQTT protocol required an authentication and authorization mechanisms, that can be achieved by applying Access Control List (ACLs) to the broker that will govern the rights of client to access certain topic on system, such as publish/subscribe. This research will be conducted to find out about how to implement authorization mechanisms using ACLs on MQTT-based system that use nodeMCU and how it affects the security and performance. This research will be conducted using mosquito-broker that implements auth-plug plugin as authentication and authorization mechanism, the ACLs will be designed on MySQL database and to be accessed by auth-server. Brokers and auth-server will communicate to check the identity and permissions of client, the client's identity will be encoded using JSON Web Token (JWT), and ACLs will be designed based on roles. From the test results, the ACLs managed to secure MQTT protocol-based systems with nodeMCU devices by performing authentication mechanisms using JWT and authorization mechanisms based on client's roles successfully, also successfully handle message with total of 141 each seconds with average time needed to publish each message in the course of 0,7092 seconds.
Pengembangan Perangkat Lunak IoT Cloud Platform Berbasis Protokol Komunikasi HTTP Ocki Bagus Pratama; Adhitya Bhawiyuga; Kasyful Amron
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 9 (2018): September 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1076.103 KB)

Abstract

The primary aim of Internet of Things (IoT) is to expand the benefits of Internet connectivity by connecting objects around us to the internet, thus enabling remote control and accessibility. IoT devices often have limitations in terms of storage capacity and computing capabilities. This requires the IoT device to be integrated with systems that have better computing capabilities One of them is cloud-based computing system. However, the integration between IoT and cloud devices has challenges in terms of network communication, security, and device management. Network communication is the number of network technologies being used, thus the selection of communication protocols should consider its support for a variety of devices. Security and privacy are a concern because of the large number of IoT devices that can be easily connect to the cloud, requiring authentication and authorization that is required to identify and validate devices that transmit the data. Device management is required due to the large number of IoT devices that will be used, it requires a device management mechanism. Based on those problems, a solution was proposed on IoT cloud platform design using HTTP communication protocol to solve network communication and RESTful for device management constraints. As for identifying and validating devices that transmit data, an authentication and authorization mechanism using JSON Web Token is utilized. The result of system performance testing, is that the built systems are capable of handling up to 100 users simultaneously.
Analisis Perbandingan Kinerja Algoritme Fair Share Scheduling Dengan Capacity Scheduling Terhadap Pengiriman Job Pada Hadoop Cluster Multinode Friska Anggia Nurlita Sari; Adhitya Bhawiyuga; Achmad Basuki
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 9 (2018): September 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1121.829 KB)

Abstract

Hadoop is a framework based on an open-source which is used for a data processing in a large scale and stored in a group of interconnected computers that are connected in a network which are distributed. Hadoop there are several scheduling algorithms to set the incoming job queue, jobs that have been submitted by the user will compete for a resource available. So the need for a scheduling algorithm in charge of managing the job on a resource and managing the data processing so that output issued in accordance with what is expected. This research was conducted to find out the comparison of performance of Fair Share Scheduling and Capacity Scheduling algorithm on job delivery on Hadoop multinode to know the value of Job Fail Rate, Latency, and Throughput parameters. Capacity Scheduling supports the queue in a hierarchy that is able to divide the available resources in the cluster into multiple queues. Fair Share Scheduling is a fair allocation of resource allocation methods for queues for all jobs that enter the queue. Based on the results of tests that have been done, has a minimum value of Job Failed Rate is better than Fair Share Scheduling of 0.99%. Fair Share Scheduling has a minimum value of better Latency of 19.25 minutes. While the value of Throughput on Fair Share Scheduling faster by 0.47 Mbit/s.
Rancang Bangun Perangkat Mobile Berbasis Delay Tolerant Network Sebagai Perantara Pengiriman Data Sensor Dari Lapangan Ke Pusat Data Hendra Danu Laksana; Adhitya Bhawiyuga; Kasyful Amron
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 9 (2018): September 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (814.566 KB)

Abstract

Internet of Things (IoT) consist of three main components: hardware, middleware, and presentation. The emerging problem is used hardware in sensor node have constrained processor and memory ability. Therefore, sensor node only functionate as sensor data reader and sender to data center for data analysis and decision making. Data sending in IoT system from sensor node to data center can use several protocol, but no one of those procotols can be used in intermittent connected network. Attempting to overcome these problems, a system that implements the mechanism of store-carry-forward data transmission is designed in this research. One of communication mechanism that implement store-carry-forward is Delay Tolerant Network. The designed mechanism will be applied to Android OS-based mobile device. The test results state that the system can transmit messages with a 100% success rate even when inter-device connection conditions are intermittently connected and the average delay is 51.8 seconds. The test result also states that the system is not too burdensome device because the device specifications that exist today is very qualified to accommodate the load.
Analisis Perbandingan Akurasi Deteksi Serangan Pada Jaringan Komputer Dengan Metode Naive Bayes Dan Support Vector Machine (SVM) Mercury Fluorida Fibrianda; Adhitya Bhawiyuga
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 9 (2018): September 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (678.949 KB)

Abstract

Serangan Denial of Service (DoS) merupakan suatu tindakan untuk melumpuhkan server komputer pada jaringan internet sehingga komputer tidak dapat menjalankan fungsinya dengan benar. Untuk melakukan pendeteksian atau pencegahan berbagai potensi serangan telah dikembangkan Intrusion Detection System (IDS). IDS memiliki dua metode dalam melakukan pendeteksian yaitu Rule Based (Signature Based) dan Behavior Based. Dalam penelitian ini digunakan metode behavior based dimana dalam proses kerjanya membutuhkan sebuah dataset dan metode. Metode yang dapat digunakan salah satunya adalah teknik klasifikasi data mining. Tetapi tidak semua algoritma data mining memiliki kinerja yang baik dalam mengklasifikasi jenis serangan. Oleh karena itu, penelitian ini melakukan perbandingan beberapa algoritma yaitu Naive Bayes, SVM Linear, SVM Polynomial, dan SVM Sigmoid. Dataset yang digunakan dalam penelitian ini adalah dataset dari ISCX2012 testbed tanggal 14 Juni 2012. Penelitian ini menganalisis perbandingan metode yang dihasilkan dari proses klasifikasi berdasarkan nilai akurasi confusion matrix, precision, recall, dan f1 score. Naive Bayes, SVM Linear, SVM Polynomial dan SVM Sigmoid menghasilkan persentase akurasi berturut-turut sebesar 85,055%, 99,995%, 99,999%, dan 99,995%. Persentase akurasi tertinggi diperoleh SVM Polynomial, sedangkan Naive Bayes menghasilkan persentase akurasi terendah.
Implementasi Load Balancing Pada Server Dengan Menggunakan Algoritme Least Traffic Pada Software Defined Network Nur Fauzi; Widhi Yahya; Adhitya Bhawiyuga
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 9 (2018): September 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (395.384 KB)

Abstract

On the use of the computer network technology continues to evolvefrapidly. One of the solutions to these problems are Software defined network liquid separating the concept of control plane and data plane. Control plane SDN is programmed allows to implement a wide range of applications, including network load balancing. Load balancing server performance Test liquid distribution in mere play every request and divides the incoming requests to be given to a server by providing the same service. There are several algorithms of load balancing that is used in one round-robin algorithm, but the algorithm does not pay attention to the traffic. An important aspect of liquid traffic to choose the path the sound server. In this research. A load balancing algorithm is used in this researchis the Algorithm a little traffic the algorithm allocates liquid special lines to the server with the shortest traffic. This algorithm will be tested and performance analyzed. This test is used in the test is has the functionality, throughput, packet loss, and time korvegensi. On testing the functionality of server-mapping algorithms a bit traffic handling big demand from the clients is better than a round-robin algorithm because the algorithm at least traffic would not choose the path to the server that there is a burden of the past Cross and will choose the path to another server. Throughput testing of the algorithm a little traffic is superior compared to the round robin algorithm on a high category. While the Pack lost the roud robin has an average of 6.96% higher than little traffic with an average of 2.97%. On the results of the test of convergence, convergence time is the time gained Round Robin Algorithm is 10.51 seconds compared to 14.80 seconds time obtained the algorithm a little traffic
Analisis Perbandingan Kinerja Protokol AOMDV, DSDV, Dan ZRP Sebagai Protokol Routing Pada Mobile Ad-Hoc Network (MANET) Fatkhurrozi Fatkhurrozi; Edita Rosana Widasari; Adhitya Bhawiyuga
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 10 (2018): Oktober 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (707.941 KB)

Abstract

Natural disaster is an event that can cause damage to communication network's infrastructure in a region. Therefore, a network technology that is able to run independently without the infrastructure of communication and internet networks; such as BTS, router, or access point, is required. The technology is called Mobile Ad-Hoc Network (MANET). MANET is a wireless network consisting of a set of mobile nodes that communicate in a multi-hop manner inside a dynamic topology without depending on a supporting infrastructure. MANET routing protocols are generally classified into three types, such as reactive, proactive, and hybrid routing protocols. These three types of routing protocols have different algorithms in route search methods. Among the three types of routing protocols, there are AOMDV, DSDV, and ZRP. This research was propsed to compare the performance of three different types of routing protocols, such as AOMDV, DSDV, and ZRP when simulated in different scopes. Simulations were performed using Network Simulator 2 and measured by four parameters such as throughput, end-to-end delay, packet delivery ratio, and normalized routing load. Based on the tests that were conducted in different range area and number of mobile nodes scenarios, it can be concluded that AOMDV has the highest average packet delivery ratio and throughput value. On the other hand, it was found that the best average value was obtained by DSDV protocol during the measurement of end-to-end delay and normalized routing load.
Pengembangan Sistem Pendeteksi Kehadiran Pegawai Berbasis Fingerprint Wifi Rizky Haryandi Rahman; Adhitya Bhawiyuga; Primantara Hari Trisnawan
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 11 (2018): November 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (884.8 KB)

Abstract

Checking the employees attendance is an important matter for every institution or company to see their own employee performance. Each instituion or company must have their own way to check the employees attendance, such as using a paper, smartphone application, RFID (Radio Frequency Identification), and biomentric technique. Those kind of ways are really making the company easier to check the employees attendance, but there is a flaw, for example is on the fingerprinting system when using the fingerprint, sometimes the fingerprint can not be detected by the system, moreover an employee should reach a specific location to make a presence. This sometimes make the employees to procrastinate or late to make a presence. As a result, the employees often forget and do not make a presence. From the problem, this reasearch is made to make a presence system for employees using a wifi fingerprint, wifi fingerprint means a MAC address which is caught by microtic router when a smartphone is connected. System will read the MAC address and interface of the router mikrotik through the API for RouterOS, then save it into the database, and compare it with the MAC address already in the database, so when it happens, an employee will be considered as present and the location of an employee will be known based on a place where a smartphone is connected. The testing result of functionality and performance shows the all functions on system run well and the time that needed by a system to read from a router has an average below of one second and the time for system to detect the presence including the employees location is about five seconds.
Pengembangan Perangkat Middleware Web of Things (WoT) Berbasis Arsitektur Publish Subscribe Menggunakan Protokol REST HTTP Donny Kurniawan; Adhitya Bhawiyuga; Reza Andria Siregar
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 11 (2018): November 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (541.817 KB)

Abstract

Internet of Things (IoT) refers to all physical objects or devices that connect and exchange data over the Internet. With the application of IoT in various fields, of course cannot be separated from the increasing challenge also. One of the major problems in IOT deployment includes devices with diverse protocols and accessibility of various devices. One solution that can be given to solving interoperability problems is to use the web as a universal integration platform. However, the application of WoT in sending commands to IoT devices becomes inefficient because the IoT device makes periodic requests as a command check mechanism. Therefore, it is necessary to replace the more efficient architecture in overcoming the delivery of middleware commands to the sensor nodes. To overcome the problem is required replacement HTTP RESTful request response architecture to use publish subscribe architecture. Based on the previous explanation, it is proposed a middleware development with publish subscribe architecture as communication of sensor node device to middleware. In replacement of the architecture is expected to reduce the load from the IoT device, so no need to make requests on a regular basis. System performance test results show, the system capable of handling up to 150 users with a 0% error rate.
Implementasi Wireless Sensor Node untuk Pemantauan Lahan Pertanian Berbasis Protokol 802.15.4 Muhammad Misbahul Munir; Sabriansyah Rizqika Akbar; Adhitya Bhawiyuga
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 11 (2018): November 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (796.285 KB)

Abstract

Wireless Sensor Nodes is the main element in Wireless Sensor Network (WSN). Farmers can find out the condition of farmland by using WSN to handle the land appropriately. On WSN, IEEE 802.15.4 Protocols more suitable to monitor farmland because it has a 40% improvement in energy efficiency compared to IEEE 802.11. To form the WSN with tree topology, it takes 3 types of nodes, i.e. End device, the Coordinator, and the PAN Coordinator. Each node consists of the Arduino Nano and MRF24J40MA that uses communication SPI. In the End device the results data captured by temperature, humidity, and soil moisture sensors are different with data from measurement device. The position of node placement affected on performance of wireless sensor node. Based on packet loss, maximum distance in the transmission of sensor data is 104 metres from the End device to the Coordinator and 96 metres from Coordinator to the PAN Coordinator. The optimal distance is 72 meters of the End device to the Coordinator. Each transmission of sensor data is carried out every 10 seconds with 17 bytes of data payload.
Co-Authors Achmad Basuki Achmad Bazuki Achmad Brahmantyo Arundaya Subianto Agi Putra Kharisma Agung Setia Budi Ahmad Aji Santoso Ahmad Nasrul Illahi Alan Maulana Hamid Alfian Rizky Susanto Alldo Raafi'ilman Ammar Waliyuddin Jannah Andhika Dwitama Putra Andri Warda Pratama Putra Annisa Puspa Kirana Annisa Widuri Murti Utami Apriyanto J.P.L Tobing Apriyanto Tobing Ardhian Rizki Ramadhani Ardi Rahmad Hermanto ari kusyanti Aria Tanzila Harfad Arya Wardhana Budi Utomo Aswin Suharsono Bagos Wahyu Suprayugi Baiq Findiarin Billyan Dany P Kartikasari Dany prima Kartikasari Dany Primanita Kartikasari Dany Primanita Kartikasari Dany Primanita Kartikasari Dedy Andrean Ardiansyah Delarta Tok Adin Dhiza Wahyu Firmansyah Donny Kurniawan Dwiyan Ramadhan Dharmanzah Dyah Ayu Ocky Mawardani Dyah Ayu Prabandari Ekky Pramudito Setiawan Fabiansyah Raam Pontoh Fadhlan Muhammad Fahmi Syahrulah Fajar Hamid Embutara Ratuloli Fanny Aulia Rifki Farah Nabilla Putri Irzan Fariz Andri Bakhtiar Fariz Andri Bakhtiar Fathan Muhammad Fatkhurrozi Fatkhurrozi Fauzan Pahlawan Ferra Adelinna Wibowo Putri Fidia Rosianti Firman Budi Safrizal Friska Anggia Nurlita Sari Haidar Arijuddin Harun Ulum Fajar Hendra Danu Laksana I Gede Wahyu Sanjaya Iskar Maulana Jodi Chris Jordan Sihombing Jogi Oliver Yohanes Tampubolon Kasyful Amron Kasyful Amron Kevin Jonathan Harnanta Khabban Sayyidi Razin Surya Kusnul Aeni Labib Imam Hidayat Lius Alviando Mahendra Data Mercury Fluorida Fibrianda Moch. Wildan Habibi Mochammad Hannats Hanafi Ichsan Moh Wildan Habibi Moh. Afif Ma'ruf Mohammad Harits Mohammad Zulfikar Muhammad Abdul Aziz Muhammad Aji Guna Darmawan Muhammad Chalif Nurfaizi Muhammad Fahmi Ali Fikri Muhammad Fauzi Muhammad Gigih Wicaksono Muhammad Hasbi Ash Shiddieqy Muhammad Irfan Syafi'i Muhammad Misbahul Munir Muhammad Rafi Fauzan Fathin Nico F. Sitorus Nimas Raya Ahsy Nur Fauzi Nuretha Hevy Purwaningtyas Ocki Bagus Pratama Ocki Bagus Pratama Pramukantoro, Eko Sakti Primantara Hari Trisnawan Rakhmadhany Primananda Refri Rifwan Daharmi Regita Yustania Esyaganitha Rembulan Suci Fii Jannatin Reza Andria Siregar Richad Gilang Wisduanto Riski Ananda Rizal Bayu Aji Pradana Rizky Haryandi Rahman Rizky Putra Pratama Sabit Ihsan Maulana Sabriansyah Rizqika Akbar Santoso, Bagus Jati Sapta Oryza Putra Sara Yosephina Satria Adhi Kharisma Satria Adi Kharisma Sofyan Ainurrachman Sukma Alamsyah Budianto Tsany Afif Wian Virgi Widasari, Edita Rosana Widhi Yahya Yosef Hesekiel Partogi