Claim Missing Document
Check
Articles

Implementasi Algoritme Grain V1 Pada Protokol MQTT Menggunakan Raspberry Pi Untuk Mengamankan Data IoT Iskar Maulana; Ari Kusyanti; Adhitya Bhawiyuga
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 12 (2018): Desember 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (561.016 KB)

Abstract

Internet of Things (IoT) is one of the most commonly used technologies today because IoT can connect various devices. In general, the protocol used in IoT is the MQTT protocol that utilize wireless as a medium for data exchange. However, wireless media is vulnerable to wiretapping. Data threats become an unavoidable so there is a need secure the data. One technique for securing data is Grain v1 algorithm. This algorithm is an algorithm in cryptography that is used to encrypt and decrypt messages. The author uses Raspberry Pi as a publisher and subscriber as well as a Virtual Machine (VM) as a broker. The Grain v1 algorithm is placed on each client (publisher and subscriber) so that when the payload is transmitted over the MQTT protocol, the data contained in the payload is encrypted. Likewise, the payload is decrypted after it is received by the subscriber. There are 5 tests to ensure that the system works well including test vector validation testing, system functional, validation testing, encryption and decryption results, sniffing, and time performance. The result shows that test vector validation, encryption and decryption process validation are valid. Functional test shows that system can run well. Based on sniffing test, the payload cannot be read by unauthorized party. Finally, the execution time of processing keystream, encryption and decryption take 0.01246 second, 0.01627 second, and 0.02238 second.
Implementasi Algoritme Trivium Untuk Mengamankan Data Pada Protokol MQTT Menggunakan Perangkat Raspberry Pi Alan Maulana Hamid; Ari Kusyanti; Adhitya Bhawiyuga
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 12 (2018): Desember 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1356.465 KB)

Abstract

MQTT Protocol (Message Queuing Telemetry Transport) is widely used in wireless communication medium on IOT (Internet of Things). On the other hand, the use of wireless medium has a disadvantage. As an example, the data are highly vurnerable to eavesdropping (sniffing data). The dangerous impact of eavesdropping or sniffing is that the loss of security. Therefore, it is required to have a mechanism to ensure data security. Trivium algorithm is one of the cryptographic synchronous encryption cryptographic algorithms used to secure data and Trivium is tested well and Trivium is assigned as a stream cipher encyption algorithms by ISO/IEC 29192-3; 2012. Raspberry Pi is used as a publisher, subscriber and virtual machine as a broker. Publisher will encrypt the data before the data and topic are sent to the broker. Broker will forward the data to the subscriber that is subscribed. After the data is received by the subscriber, the data will be decrypted into plaintext. Here are the results of the study; keystream result to the vector test is valid, validation result of encyption and decryption is valid, the result of sniffing data of Wireshark shows that the data cannot be read by an unofficial authority, and the result of six functional systems showed that all of the functional work well, the result of the average time to produce keystream is that 0.034886725 seconds, encryption process is that 0.047045873 seconds and decryption process is that 0.053834003 seconds
Implementasi Algoritme Trivium Untuk Mengamankan Komunikasi Data Master-Slave Pada Perangkat Berbasis Modul Komunikasi NRF24L01 Sara Yosephina; Adhitya Bhawiyuga; Ari Kusyanti
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 12 (2018): Desember 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (919.952 KB)

Abstract

Internet of Things (IoT) is a network concept that connects various devices so that these devices can produce services and cooperate with each other to achieve common goals. Security is one of the weaknesses of IoT implementation. Trivium algorithm is a hardware-side security candidate by the eSTREAM Project organized by NIST. Trivium algorithm architecture has a complex level of complexity and does not require large power so it is suitable for use on devices that have low power. This study explains how to utilize the Trivium algorithm to secure data communication using NRF24L01. There are 5 tests performed including validation test vector, performance analysis through the validation time keystream and data encryption ecryption, performance analysis of delivery time from master to slave using communication module NRF24L01, and testing with sniffing. Results of this resesarch indicate that the keystream validation in accordance with test vector. The performance of encryption processing time has an average of 695.8 ms for 8 bit data size, 951.2 ms for 16 bit data size and 1460.2 ms for 32 bit data size. And the results of the decryption processing time performance have an average of 443.5 ms for 8 bit data size, 447.8 ms for 16 bit data size and 448.4 ms for 32 bit data size. And the results of the test by sniffing shows that the Trivium algorithm can perform data encryption well with the sniffing process can only sniff the data that has been encrypted.
Implementasi Sistem Pendeteksi Rogue Access Point Dengan Metode Perhitungan Nilai Round Trip Time Fahmi Syahrulah; Adhitya Bhawiyuga; Mahendra Data
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 12 (2018): Desember 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (259.878 KB)

Abstract

With the increasing development of wireless technology, which provoke the cyberattack using wireless technology increase as well, this would make user data be put to risk. One of the cyberattack that exploit wireless technology is Rogue Access Point. To prevent this, RAP detection system was made with comparing round trip time method. This system sent a DNS lookup to get round trip time. RAP would return much longer round trip time value than the legitimate access point, this happen because the added hop that was passed during the trip to RAP. To minimalize the impact from unstable network that would affect the accuracy of detection system, filtering mechanism is used to filter round trip time value that is deemed as an anomaly. Testing will be done to the two similar access point which one of them is the RAP. Round trip time value from both access point will be compared, which will be used as parameter to determine RAP. In this research the accuracy detection would be never less than 90%.
Analisis Perbandingan Kinerja File System GlusterFS dan HDFS dengan Skenario Distribusi Striped dan Replicated Muhammad Irfan Syafi'i; Adhitya Bhawiyuga; Mahendra Data
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 1 (2019): Januari 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (976.706 KB)

Abstract

Big Data is a term used to describe the growth of large data, both structured data and data not tersrukur. Big Data has three main characteristics: volume, velocity, and variety. The problem that arises with the development of Big Data is how to store the data. Data that continues to grow enlarged each time requires a large storage space as well. This certainly will not be able if the storage space is in one machine (single node / host). Distributed file system is a storage and file management module consisting of multiple machines (multi node / host). This study aims to compare the performance of two file systems, GlusterFS and HDFS in distributed file storage with striped and replicated distribution scenarios. The study is limited to the measurement of file system performance in performing write / read file operational. The test results show that the performance GlusterFS have a lighter in performing write file operations with the acquisition of 44.54 MBps throughput, execution time for 58.54 seconds, CPU usage for 54.83% and memory usage for 3.6%. HDFS has the optimal performance on read files operations, obtained the average of throughput for 194.37 MBps, execution time for 16.01 seconds, CPU usage for 86.9% and memory usage for 18.5%.
Analisis Kinerja Protokol Routing Ad Hoc On Demand Distance Vector (AODV) Pada Jaringan Vehicular Ad Hoc Network (VANET) Berdasarkan Variasi Model Jalan Dedy Andrean Ardiansyah; Rakhmadhany Primananda; Adhitya Bhawiyuga
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 2 (2019): Februari 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (574.876 KB)

Abstract

VANET (Vehicular Ad Hoc Network) is a wireless network technology developed from MANET (Mobile Ad Hoc Network) which is devoted for motorized vehicles. The main application of VANET technology is to realize better and safer traffic management. However, due to the high mobility of vehicles and varying road conditions, the most serious problem in VANET is the efficiency of the search process and maintaining network routes. AODV (Ad Hoc on Demand Distance Vector) is one solution to the VANET problem which is one of the reactive routing protocols. Variations of road models in Indonesia are divided into four groups based on the prevailing speed namely the freeway, inter-city roads, urban roads and residential roads. In each of these environments a simulation test was carried out with a difference in the number of vehicles. The simulation is carried out using Network Simulator v2.35 (NS-2.35) and SUMO as mobility generator. AODV performance is measured based on the parameters of average throughput, packet delivery ratio, and end-to-end delay in sequence. Test result on the freeway resulted in 111.48 KBps, 40.99 %, 0.14676 seconds. Test result on inter-city roads 156.20 KBps, 58.08 %, 0.08036 seconds. Test result on urban roads 210.07 KBps, 77.18 %, 0.05839 seconds. Whereas test result on residential roads 212.82 KBps, 77.27 %, 0.03362 seconds. These results show that the road model in Indonesia with the performance of the AODV routing protocol on the VANET network from the best to the worst in sequence is a residential road model, an urban road model, an inter-city road model, and freeway model.
Implementasi Sistem Gateway Discovery pada Wireless Sensor Network (WSN) Berbasis Modul Komunikasi LoRa Alfian Rizky Susanto; Adhitya Bhawiyuga; Kasyful Amron
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 2 (2019): Februari 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (794.559 KB)

Abstract

Wireless Sensor Network (WSN) is a network of several nodes that do sensing and can control the environment, can contain interactions between humans and computers and the state of the environment. WSN has several components that are used for environmental monitoring such as sensor nodes and gateways to collect sensor data. Both components communicate with wireless technology intermediaries. One of the wireless technologies is LoRa. LoRa is a low-power wireless technology that uses the radio spectrum. LoRa characteristics that can accommodate long distances and low power consumption, are suitable to be applied to the WSN. But there are shortcomings in the implementation of LoRa, namely the absence of a gateway discovery system in LoRa. From this explanation, this research focuses on creating gateway discovery system to overcome these shortcomings. The performance test results show that the system built can function up to a distance of 1000 meters. At the maximum distance of performance testing, namely 1000 meters, the association time value is 354.4 milliseconds, unicast loss is 6% and broadcast loss is 20%. This has an impact on the performance of gateway discovery system because increase value of these parameters, the system performance will get worse.
Implementasi Perangkat Mobile Publisher Subscriber Sebagai Perantara Pengiriman Data Sensor Dari Lapangan Ke Pusat Data Sukma Alamsyah Budianto; Adhitya Bhawiyuga; Dany Primanita Kartikasari
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 2 (2019): Februari 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (521.984 KB)

Abstract

Sensor devices implemented in the field facing a problem when sending data on unstable network conditions to the data center. To solve these problems, we develop an application based on the Android operating system implementing publish/ subscribe communication as an intermediary for sending sensor data in the field to the data center using the MQTT protocol. To prove the application can operate as an intermediary for sending sensor data in the field to the data center, three tests are carried out. There are functional testing, scenario testing and performance testing. In functional tests, five functional requirements designed can be fulfilled by the application as an intermediary for sending sensor data to the data center. In scenario tests, from the three test scenarios performed the results of the application can be carried out without any application errors. In performance testing by calculation application performances and get the results of Subscriber Throughput is equal to 161.55 message/s, Publihser Throughput is equal to 2.13 message/s, the latency message average Subscriber apps are 1488.28 ms and the publisher message latency average app is 5208.86 ms.
Pengembangan Sistem Perantara Pengiriman Data Menggunakan Modul Komunikasi LoRa dan Protokol MQTT Pada Wireless Sensor Network Haidar Arijuddin; Adhitya Bhawiyuga; Kasyful Amron
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 2 (2019): Februari 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (406.646 KB)

Abstract

The development of Internet of Things is always supported by the WSN (Wireless Sensor Network) concept but the battery power consumption of WSN raises a constant need to lower the energy requirement. LoRa (Long Range) technology acquires low power consumption and broad communication range of more than 2 km, however cannot send data directly to the server. So that a data delivery system is needed to connect between devices at the sensor node to a server called the gateway. The communication between gateway and data centers employs MQTT protocol since it supports the characteristics of IoT such as small bandwidth usage. This research attempted to develop a gateway system in order to connect the sensor nodes and data centers utilizing LoRa communication modules and MQTT protocol. The result of successful rate gateway kinerjance using distance, data size, and different intervals as variables indicates that in range of 400 meters the gateway kinerjance in receiving and forwarding data to data centers is better than the range of 200 meters.
Implementasi Sistem Akuisisi Data Sensor Pertanian Menggunakan Protokol Komunikasi LoRa Richad Gilang Wisduanto; Adhitya Bhawiyuga; Dany Primanita Kartikasari
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 3 (2019): Maret 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (495.026 KB)

Abstract

Periodic monitoring of agricultural environmental condition is needed to growth the plant will be better, so it will improve the quality and quantity of agricultural products. The way of monitor environmental conditions periodically is an acquisition data system. The system requires minimum of two nodes, namely sensor nodes and gateways. Sensor node has function to put the data from the sensor and transmit it to the gateway, while the gateway receives the data and store it. Beside that a communication protocol is needed to connect both of nodes and to transmit the data wirelessly to remote monitoring, which one of it is LoRa. LoRa is a technology which has a wide range with low battery consumption, so it is suitable for monitoring agriculture in Indonesia, which is known as an agricultural country because of the wide area of agricultural land. There are two tests had been done, that are functional testing and performance testing. In the functional testing, the system can run properly where the system can put the till save it. The performance testing was hold to see the performance of the LoRa HopeRF-RFM9x module based on packet loss and delay with the influence of distance, packet size, and interval of delivery time. The result of the performance is the HopeRF-RFM9x module can transmit the packets well for 200, 300 and 400 meters.
Co-Authors Achmad Basuki Achmad Bazuki Achmad Brahmantyo Arundaya Subianto Agi Putra Kharisma Agung Setia Budi Ahmad Aji Santoso Ahmad Nasrul Illahi Alan Maulana Hamid Alfian Rizky Susanto Alldo Raafi'ilman Ammar Waliyuddin Jannah Andhika Dwitama Putra Andri Warda Pratama Putra Annisa Puspa Kirana Annisa Widuri Murti Utami Apriyanto J.P.L Tobing Apriyanto Tobing Ardhian Rizki Ramadhani Ardi Rahmad Hermanto ari kusyanti Aria Tanzila Harfad Arya Wardhana Budi Utomo Aswin Suharsono Bagos Wahyu Suprayugi Baiq Findiarin Billyan Dany P Kartikasari Dany prima Kartikasari Dany Primanita Kartikasari Dany Primanita Kartikasari Dany Primanita Kartikasari Dedy Andrean Ardiansyah Delarta Tok Adin Dhiza Wahyu Firmansyah Donny Kurniawan Dwiyan Ramadhan Dharmanzah Dyah Ayu Ocky Mawardani Dyah Ayu Prabandari Ekky Pramudito Setiawan Fabiansyah Raam Pontoh Fadhlan Muhammad Fahmi Syahrulah Fajar Hamid Embutara Ratuloli Fanny Aulia Rifki Farah Nabilla Putri Irzan Fariz Andri Bakhtiar Fariz Andri Bakhtiar Fathan Muhammad Fatkhurrozi Fatkhurrozi Fauzan Pahlawan Ferra Adelinna Wibowo Putri Fidia Rosianti Firman Budi Safrizal Friska Anggia Nurlita Sari Haidar Arijuddin Harun Ulum Fajar Hendra Danu Laksana I Gede Wahyu Sanjaya Iskar Maulana Jodi Chris Jordan Sihombing Jogi Oliver Yohanes Tampubolon Kasyful Amron Kasyful Amron Kevin Jonathan Harnanta Khabban Sayyidi Razin Surya Kusnul Aeni Labib Imam Hidayat Lius Alviando Mahendra Data Mercury Fluorida Fibrianda Moch. Wildan Habibi Mochammad Hannats Hanafi Ichsan Moh Wildan Habibi Moh. Afif Ma'ruf Mohammad Harits Mohammad Zulfikar Muhammad Abdul Aziz Muhammad Aji Guna Darmawan Muhammad Chalif Nurfaizi Muhammad Fahmi Ali Fikri Muhammad Fauzi Muhammad Gigih Wicaksono Muhammad Hasbi Ash Shiddieqy Muhammad Irfan Syafi'i Muhammad Misbahul Munir Muhammad Rafi Fauzan Fathin Nico F. Sitorus Nimas Raya Ahsy Nur Fauzi Nuretha Hevy Purwaningtyas Ocki Bagus Pratama Ocki Bagus Pratama Pramukantoro, Eko Sakti Primantara Hari Trisnawan Rakhmadhany Primananda Refri Rifwan Daharmi Regita Yustania Esyaganitha Rembulan Suci Fii Jannatin Reza Andria Siregar Richad Gilang Wisduanto Riski Ananda Rizal Bayu Aji Pradana Rizky Haryandi Rahman Rizky Putra Pratama Sabit Ihsan Maulana Sabriansyah Rizqika Akbar Santoso, Bagus Jati Sapta Oryza Putra Sara Yosephina Satria Adhi Kharisma Satria Adi Kharisma Sofyan Ainurrachman Sukma Alamsyah Budianto Tsany Afif Wian Virgi Widasari, Edita Rosana Widhi Yahya Yosef Hesekiel Partogi