Rakhmadhany Primananda
Fakultas Ilmu Komputer , Universitas Brawijaya

Published : 151 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Implementasi Algoritme AEGIS untuk Payload Data Protokol MQTT dan CoAP pada Raspberry Pi 3 Helmy Rafi Nawawi; Ari Kusyanti; Rakhmadhany Primananda
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 8 (2019): Agustus 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (650.537 KB)

Abstract

Raspberry Pi 3 is a device that can be used as a middleware. Middleware facilitates communication and information management between heterogeneous components. Based on previous research, there is a security gap in the data transmission system that exposes data packets to an unauthorized party. This problem can be solved with AEGIS algorithm. AEGIS algorithm is a method that guarantees confidentiality and authentication. AEGIS is suitable to be implemented in network communication because it protects packets during transmission. Based on research results, AEGIS algorithm was successfully implemented in MQTT and CoAP protocol's data payload. AEGIS when implemented on the researched system was tested with vector testing and was stated as valid. Time performance test is conducted on middleware systems that either used MQTT or CoAP protocol's, the testing process was time data samples with and without using the AEGIS algorithm. The average results indicated the time difference of a MQTT system that used MQTT system that used AEGIS and without AEGIS was 19.592 milliseconds. Meanwhile, the average of time difference of CoAP system that used AEGIS and without AEGIS was 28.141 milliseconds. The above mentioned results prove that the AEGIS algorithm is capable of securing data confidentiality and authentication on a Raspberry Pi 3.
Implementasi Algoritme Kriptografi SIMON pada Arsitektur Amazon Web Services Sastra Ginata; Ari Kusyanti; Rakhmadhany Primananda
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 8 (2019): Agustus 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (573.325 KB)

Abstract

Amazon Web Services (AWS) is one of the cloud computing services which has been primarily used by most of the big industries recently. One of the AWS services which has the advantage to store online data is the Amazon Simple Storage Service (Amazon S3). In this particular service features, there is a data security options, specifically Amazon Client Side Encryption, that works by securing the object and using the key that has been stored by the user in the hand of the client which later would be uploaded to the bucket of the Amazon S3. One of the vital state organization in the United States, National Security Agency (NSA), has launched a cryptography algorithm named SIMON. SIMON Algorithm is a block cipher algorithm that could be applied either in the software or hardware depending to the needs of the users themselves. SIMON Algorithm is applied in the website system by using Python, that is used for encrypting the file which later would be uploaded to the chosen bucket. Based on the result of time performance test, the average speed of both encryption and decryption files are 33.7 seconds and 28.5 seconds. And in the variaton file testing, the result showed that the SIMON algorythm is capable of encrypting files with the extention file: .txt, .docx, .pdf, .png, .jpg, .mp3, .m4a, .mp4 dan .mkv.
Implementasi Low Power Pada Sistem Pemantau Lahan Pertanian Berbasis Komunikasi MRF24J40MA Ahmad Ghufron Agustian; Mochammad Hannats Hanafi Ichsan; Rakhmadhany Primananda
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 8 (2019): Agustus 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (864.84 KB)

Abstract

Agriculture has now been transformed using a variety of technologies to increase production. Traditional agriculture has shifted to smart farming that utilizes the Internet of things using Wireless Sensor Network (WSN) as an information gathering and monitoring control application. The 802.15.4 protocol based agricultural land monitoring system has reliability in monitoring and sending data, this system runs for a long time, so an effort is needed to save energy in the system using the Low Power method so that the use of resources is reduced. In applying the Low Power method use the sleep mode powerdown feature which will forcibly turn off some work functions from ATmega328P. In the implementation of this system 3 Nodes are used, among others: 2 End Devices that perform data retrieval and delivery, and 1 PAN Coordinator as a server or data receiver. The test results using the Low Power method get savings of an average of 6 mA or 12.7%, namely the average value of the current when the system wake is 47.7 mA and when sleep is 42.3 mA. In addition, based on packet loss testing, data transmission is obtained at the optimal distance of 25 meters between End Device and PAN Coordinator.
Implementasi Routing pada OpenFlow Software-Defined Network dengan Algoritme Depth-First Search dan Breadth-First Search Aprilia Kartika Sriastunti; Rakhmadhany Primananda; Widhy Yahya
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 8 (2019): Agustus 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (684.952 KB)

Abstract

Routing is the process of determining the path to convey data from source to destination. In conventional network routing configuration is still not flexible and efficient, because they have to configure network devices manually. Software-Defined Network as a new paradigm in network architecture, has the flexibility and efficiency for centralized network configuration. In SDN, the data plane and control plane are connected by the OpenFlow protocol. Routing on the network can be interrupted because of link disruptions such as link failures that result in the system having to find another pathway to keep communicating. In this research, network routing uses DFS and BFS algorithms, because both has simple concept and better complexity than other routing algorithms such as Dijkstra. The testing parameters are path finding, response time, packet loss, and packet traffic. When at link failure, system can still find another path to continue sending data from the source node to the destination node. The results of response time without link failure, both algorithms have been able to search for the best path based on determining the maximum value of the path on the controller. The average value of packet loss when 1 link down on DFS has the same result as BFS when 2 links down, which is 3.62%. In traffic testing, both algorithms have the same average value of the results of packet transmission to another switch, which is 52.67%.
Implementasi Perbandingan Sistem Pengiriman Sinyal Suara secara Wireless pada Arduino Muhammad Rasyid Perdana; Wijaya Kurniawan; Rakhmadhany Primananda
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 8 (2019): Agustus 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (832.608 KB)

Abstract

Technology has always experienced development from time to time, and the development of technology also affects various aspects of life, at this time the focus of how the impact of technology on audio media. Audio is the transmitter of information in the form of sound signals. with the development of technology now, not infrequently audio is used as a medium for delivering messages. In getting good sound quality, it is necessary to pay attention to several aspects that affect sound quality such as connecting media and the placement of sound sources and voice receivers. For this reason, this study designed a wireless voice sending device. This tool has a transmitter as sending voice and receiver as voice reception. For sending voice via radio media, the nRFL201 module is used, the HC-02 module is for sending voice via bluetooth, and the ESP8266 module is for sending voice over wifi. The module reading will be processed using the Arduino Uno micro controller. In each transmitter the mic will be used as the voice input and the speaker will use the speaker as the sound output. Based on the test results it shows a fairly large comparison when executing tools and programs together. The results of this test indicate that each sound signal that is sent has significantly different data. Every difference in distance, the data obtained has decreased. Whereas in bluetooth the sound signal produced is relatively stable. But there was a decrease in sound quality. For testing on wifi the results obtained by voice delivery are relatively stable. The sound quality produced is also consistent even though it is done at different distances.
Perbandingan Kinerja Protokol DSDV dan FSR Terhadap Model Node Tetap dan Node Bergerak Moh Irfan Haris; Primantara Hari Trisnawan; Rakhmadhany Primananda
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 9 (2019): September 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (803.425 KB)

Abstract

MANET is a well-known self-configuring and infrastructure-less network. Each device connected to MANET is called a node, each of which has different characteristics in terms of mobility, which plays a role in the quality of a network. A node, when conveying a packet, requires routing process as a mechanism to determine the best path to let it reach its right destination. This research focused on comparing the performances of DSDV and FSR routing protocols when applied to both fixed and mobile nodes by testing three parameters, namely Routing Overhead, End-to-end Delay, and Convergence Time. Test scenarios were performed by varying the number of both moving nodes and non-moving nodes and varying the size of the packet conveyed. The results showed that the FSR protocol is more suitable to be applied in large-scale networks, with the values of convergence time, end to end delay, and routing overhead of 0.118 sec, 20.813 ms, and 22.748, respectively. Meanwhile, DSDV protocol is more suitable to be applied in small-scale networks, with the values of convergence time, end to end delay, and routing overhead of 0.1 sec, 31.607 ms, and 8.875, respectively. The results also indicated that the greater the packet conveyed the more significant the effect on the performance of a network because the data needs to be broken down into several segments, which are vulnerable to failure (Packet Loss).
Perancangan Jaringan VoIP Berbasis SIP pada Wireless Mesh Network (WMN) menggunakan Routing Protocol OLSR Muhammad Afian Musthofa; Primantara Hari Trisnawan; Rakhmadhany Primananda
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 9 (2019): September 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (902.638 KB)

Abstract

Voice over Internet Protocol (VoIP) is a technology which allow a long distance communication and conversation through a computer network. However the quality of VoIP technology performance is very dependent on the computer network used as a conducting media to fasilitate long distance communication and conversation especially in a place which had a heavy terrain. Therefore to achive the best performance of VoIP, it requires a computer network technology to support its maximum performance. One of the computer network technology which becomes a mainstay and could be use for VoIP is a Wireless Mesh Network (WMN) which has various advantages over conventional computer network. On this research, a WMN is composed of 5 Laptops as main Nodes and some other are for user as a foundation to build the VoIP Network. A VoIP network built above WMN would be supported by Session Initiation Protocol (SIP) Server which is also be built on one of the Node with Linux platform. To discover the quality and performance of the VoIP network, a test sequence is required as well as the analysis to determine the Quality of Service (QoS) by using Delay, Packet Loss, and Jitter as parameter. The result of this research, which consider the outcome of the Delay, Packet Loss, and Jitter paramater showed a result which can be categorized as ‘satisfying' and suitable for implementation.
Implementasi N-Modular Redundancy Fault Tolerant System Pada Permodelan Automatic Train Protection Ira Oktavianti; Rakhmadhany Primananda; Wijaya Kurniawan
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 10 (2019): Oktober 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (619.393 KB)

Abstract

Automatic Train Protection System is a system to control the speed and braking of trains automatically, to avoid any obstacles that are read. Automatic Train Protection System belongs to the critical system category, if there is damage or error can affect the system as a whole. Thus, reliability is required in the critical system implementation, to obtain a high level of reliability and minimize the failure or Erorr level for the system to be able to persist. The level of reliability of the system can be done by implementing Hardware Redundancy. Redundancy is required as a data duplication using the N-Modular Redundancy method, to make the system fault tolerance and high reliability. The virtue in the application of redundancy lies in the microcontroller module used, such as Arduino UNO which acts as a module for the receiver of the Sharp Distance 2Y0A20 (Redundancy module) and the voter (voting) and LED modules (indicators Treatment). The liaison communication between the redundancy module and the voter can use I2C communication based on the prevailing rules. The test values of each module differ greatly from each module. Module C becomes a reliable module in the tolerance of test failures. The reliability percentage of the system without redundancy is 83.51% while with redundancy of 80.69% overall system.
Rancang Bangun CCTV berbasis Wireless Sensor Network dengan Sistem Deteksi Pergerakan untuk Keamanan Rumah Wahyu Pria Purnama; Rakhmadhany Primananda; Mochammad Hannats Hanafi Ichsan
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 11 (2019): November 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (534.789 KB)

Abstract

Home security system is an important and mandatory thing that must be considered by every homeowner. Therefore, one solution that is widely used is to use CCTV to monitor the state of the home environment, but the current CCTV data stored is in the form of video which usually requires a large enough storage space of course it is less efficient in the use of storage space. The solution is to build a CCTV with a system that uses image files as a data format, in addition to more efficient storage of image data formats, it also makes the system work less so that it is lower power than video formats. Therefore in this research, a CCTV system based on Wireless Sensor Network with Motion Detection System for Home Security consists of 3 sensor nodes and a sink node. When the sensor node detects a movement of the system will send a notification to the homeowner and take pictures automatically then send it to the sink node. Homeowners will receive a URL address to access the image file. This system communicates using a WiFi network and consists of several components, namely: 3 ESP32 microcontrollers and a camera, 3 SR501 PIR (Passive InfraRed) sensors and a Raspberry Pi Model B. Based on the results of trials on this system it was found that the system can detect movement by effective in the range of 1 meter to 6 meters from moving objects. Each sensor node is able to send images to the sink node. The system is able to send notifications to homeowners and the system can provide a URL address so that image files can be accessed remotely.
Implementasi Antarmuka Komunikasi Berbasis Long Range pada IoT Middleware untuk Mendukung Network Interoperability Galih Bhaktiar Candra; Eko Sakti Pramukantoro; Rakhmadhany Primananda
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 4 No 1 (2020): Januari 2020
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (741.905 KB)

Abstract

The characteristics of IoT are heterogeneity of device and the communication interface. The heterogeneity of communication interface in IoT causes network interoperability problems. Network interoperability is discussing about network and communication interfaces used by objects (things in IoT) to connect with other devices. One of the existing developed IoT middleware is to support network interoperability by providing communication using WiFi, BLE, and 6LoWPAN interface. Implementation of BLE, WiFi and 6LoWPAN is a limited development of Wide Personal Area Network, where the range of transmission media is in the same category. In this case, development of different types of communication interface and long distance is needed to support network interoperability. The chosen communication interface to be added is LoRa. In this research, LoRa was chosen and applied because it is type of Low Power Wide Area Network. LoRa is a wireless technology for IoT which is becoming popular because of the transfer of its data in small amounts at short intervals over long distances of communication. LoRa is implemented in IoT middleware as a new communication interface and replaces the 6LoWPAN communication interface. Based on testing, the results obtained indicate that the LoRa communication interface can reach 500 meters with an average delay 0.502 seconds. LoRa can receive data from different sensor nodes. In addition, LoRa can run and receive packages from WiFi and BLE, so that the use of LoRa can append middleware capabilities to support network interoperability.
Co-Authors Abimanyu Sri Setyo Abraham Arya Satyana Achmad Basuki Adhitya Bhawiyuga Aditya Geraldo Aditya Hermawan Aditya Prayudhi Agiya Yoshua Agung Setia Budi Ahdi Hudaya Ahmad Fajri Rahman Ahmad Faris Adhnaufal Ahmad Fikri Marzuqi Ahmad Ghufron Agustian Ajeng Nurrohmah Akbar Pandu Segara Alfrienza Tighfaraka Alifibioneri Ali Ali Ammar Waliyuddin Jannah Andi Yudiko Leonardo Solin Andre Ananda Pratama Andre Rizki Haryuaditya Andrean Dwi Andaru Andreas Widyatmoko Anggit Surya Gumilang Aprilia Kartika Sriastunti ari kusyanti Arief Indra Rivaldy Permana Arief Sukma Indrayana Arif Rahmanto Arya Sena Marga Mukti Asroful Khusna Arifianto Aswin Suharsono Aulia Nabih Rizqullah Bagas Gerry Caesario Bagos Wahyu Suprayugi Baiq Findiarin Billyan Bambang Gunawan Tanjung Bayu Bagus Prabowo Bella Aulia Rahmataufany Brillian Taufan Budiyanto Budiyanto Cakra Bhirawa Chrisyantar Hasiholan Da'imul Royan Dahnial Syauqy Damianus Dewa Pratama Daniel H. Simatupang Dany Primanita Kartikasari Dany Rahmana David Isura Dedy Andrean Ardiansyah Dedy Tinovrasibo Nababan Desy Ulina Purba Dhani Wahyu Wijaya Dimas Malik Ibrahim Edgar Juvianno Santoso Eka Putri Aprilianingsih Eko Aditya Ramadianto Eko Setiawan Enggar Saka Dirgantara Erricson Bernedy Setiawan Fadila Rafi Alifiandi Fahmi Ardiansyah Faizal Ramadhan Fajra Rizky Faris Naufal Al Farros Fariz Andri Bakhtiar Fathia Ningtyasari Aroeboesman Feriz Pradibya Uditama Fikri Miftah Akmaludin Firza Nur Hibatullah Fitriyah, Hurriyatul Frans Muliawan Panjaya Galeh Fatma Eko Ardiansa Galih Bhaktiar Candra Getdra Saragih Sumbayak Gibran Haq Giservin Tifira Zain Hafizhul Karim Helmy Rafi Nawawi Heri Setiawan Heru Nurwarsito Heru Nurwasito Hidayatus Syafa'ah Holden Gunawan Hudan Abdur Rochman I Putu Krisna Yoga Tanaya Igo Vicky Firmandia Ira Oktavianti Irfani Fadlan Irvan Ramadan Irvan Wahyu Bagus Pratama Irvana Alfiyan Nur Irwan Primadana Mulya Izaaz Waskito Widyarto Jefri Muhrimansyah Jenrinaldo Tampubolon Jodi Prayoga Wahyudwi Kasyful Amron Kevin Charlie Kurnia Ade Prasetia Laisa Ryry Pudja Mentari Lastio Irfathan Ananda Lucky Ronny Chandra Negara Lutfi Fanani Lyna Dwi Maryati M Ilham Fadilah Akbar M. Ammar Batistuta Haryawan Mabda Amnesti Hananto Mahendra Data Moch. Wahyu Imam Santosa Mochamad Hannats Hanafi Ichsan Mochammad Hannats Hanafi Ichsan Moh Irfan Haris Mohamad Ilham Firdaus Mohamad Lutfi Muhammad Afian Musthofa Muhammad Alfarizi Muhammad Fachri Hasibuan Muhammad Farradhika Muntaha Muhammad Fattah Na'im Pang Ripto Muhammad Hannats Hanafi Ichsan Muhammad Mahar Jahary Muhammad Naufal Aziz Huryansyah Muhammad Nursodik Wicaksono Muhammad Rasyid Perdana Muhammad Reza Wahyu Chrisdyan Muhammad Risyat Nashrullah Muhammad Sabilillah Mukhamad Roni Nugraha Pangestu Nur Cahyo Utomo Nuril Huda Pramudya Mahardika Kusumawardhana Pramukantoro, Eko Sakti Prastise Titahningsih Primantara Hari Trisnawan Putri Ayu Delina Sari Putri Rizqia Hardein Rendyanto Adi Kurniawan Resya Wakhid Ardiansyah Retno Perwita Sari Reynald Novaldi Reza Andria Siregar Rifki Pinto Hidayat Risailin Dwi Jaka Fauzi Riza Anisul Fu'ad Rizal Maulana Rizqi Agung Dwi Nugraha Sabriansyah Rizqika Akbar Salsabila Salsabila Sastra Ginata Satria Kencana P. Kacaribu Selma Aulia Sekarrizky Shindy Maria Ulfa Siwi Rahmat Januar Suhadak Akbar Sultan Achmad Chidir Fajar Sutikno Sutikno Syahifudin Shahid Syahmi Rifqi Hudha Perwira Syifaul Hud'riyah Tugar Aris Andika Prastiyo Raharjo Upik Jamil Shobrina Vico Andrea Budi Harto Wahyu Pria Purnama Wian Virgi Widasari, Edita Rosana Widhi Yahya Wijaya Kurniawan Wisnu Fajar Dewantara Yefta Kristiyanto Yemima Dara Gloriawati Yugi Trilia Septiana Zaky Farsi