Claim Missing Document
Check
Articles

A Store-forward Method for Biosignal Acquisition in Smart Health Care System using Wearable IoT Device Dany P Kartikasari; Apriyanto Tobing; Adhitya Bhawiyuga; Ari Kusyanti; Nuretha Hevy Purwaningtyas
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 6, No. 1, February 2021
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v6i1.1154

Abstract

Smart Health Care System has been developed massively in the last decade. Internet of Things implementation has accelerated the development of smart health technology. Now people have realized the importance of doing independent health monitoring. Supported by more affordable e-health tools, motivation in using the smart health system is increasing. The availability of cloud as storage services triggers demands to always be connected to the Internet. However, there are times when interference occurs so the measurement results cannot be stored in the cloud database properly. The idea of using a store-forward mechanism to overcome the problem of disconnected smart healthcare system is proposed in this paper. From the test results, the data can be sent properly eventhough disconnected status occurs for 30 minutes. Smartwatch’s memory usage has increase 30 percent during temporary storage occupied.
Implementasi Serangan Aktif Pada Algoritme Speck 128/128bit Berbasis Modul Komunikasi Lora Dian Astika Rini; Ari Kusyanti; Kasyful Amron
ikraith-informatika Vol 6 No 2 (2022): IKRAITH-INFORMATIKA Vol 6 No 2 Juli 2022
Publisher : Fakultas Teknik Universitas Persada Indonesia YAI

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1718.87 KB)

Abstract

LoRa (Long Range) termasuk pada konektivitas IoT nirkabel terbaru yang sedang berevolusi dan mendapatkanpopularitas dalam sistem tertanam dengan dioperasikan menggunakan daya rendah. LoRa perlu mentransfersejumlah kecil data pada interval pendek dengan jarak yang jauh. Modul komunikasi LoRa menggunakangelombang radio untuk melakukan komunikasi. Perangkat LoRa dihubungkan dengan frekuensi yang sama. Selainitu, dikarenakan LoRa menggunakan frekuensi sebagai metode komunikasinya, maka LoRa memiliki fitur yaitubroadcast. Pada fitur ini, LoRa mentransfer data pada frekuensi yang sama. Sehingga hal tersebut menjadi sebuahmasalah apabila terdapat perangkat LoRa yang melakukan transfer data penting, dikarenakan pada dasarnya LoRasendiri tidak memiliki upaya keamanan. Solusi berdasarkan permasalahan tersebut adalah diberikannya sebuahupaya keamanan yaitu berupa enkripsi pada data atau pesan yang dikirimkan. Pada penelitian yang dilakukan olehSemiconductor 2018 telah menerapkan algoritme AES-128 pada perangkat LoRa Namun terdapat penelitian lainyang menguji keefektifan algoritme AES-128bit dan menemukan beberapa kekurangan. Sehingga, pada penelitianini diterapkan algoritme SPECK 128/128bit yang memiliki kelebihan sehingga dapat menutupi kekurangan darialgoritme sebelumnya untuk mengamankan pesan penting yang dikirimkan agar tidak mudah dibaca oleh pihakyang tidak sah. Untuk menguji kemananan, serangkaian serangan aktif dan pasif dilakukan yaitu dengan metodeknown-plaintext attack. Hasil dari penelitian ini, sistem mampu memberikan keamanan pada pesan yangdikirimkan dengan mengirimkan pesan dalam bentuk ciphertext sehingga keamanan komunikasi antar modul LoRamenjadi terjamin.
Implementasi Man In The Middle Attack Pada Algoritme Blake2s Berbasis Lora Nurovi Andiyani; Ari Kusyanti; Reza Andria Siregar
ikraith-informatika Vol 6 No 2 (2022): IKRAITH-INFORMATIKA Vol 6 No 2 Juli 2022
Publisher : Fakultas Teknik Universitas Persada Indonesia YAI

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1743.752 KB)

Abstract

Long Range (LoRa) merupakan teknologi Low Power Wide Arean Network (LPWAN) yang digunakanuntuk transmisi menggunakan spectrum gelombang radio dengan transmisi jangkauan jarak yang jauhdan konsumsi daya yang rendah. Data yang ditransmisikan belum memiliki keamanan sehinggaintegritasnya tidak terjamin. Metode yang telah digunakan untuk keamanan integritas data yaitualgoritme SHA-256 yang sudah tidak aman untuk digunakan karena serangan collison attack dan secondpreimage. Oleh karena itu, algoritme BLAKE2S digunakan sebagai alternatif untuk menjaga integritasdata yang ditransmisikan. BLAKE2S telah terbukti sebagai algoritme yang memiliki tingat keamananyang lebih baik. Dari penelitian yang dihasilkan, algoritme BLAKE2S berhasil melakukan keamananyang diimplementasikan untuk menjamin keamanan data pada LoRa. Pengamanan data dilakukandengan mengubah menjadi message digest melalui proses hashing. Keamanan data dengan pengujianserangan aktif menggunakan teknik Man In The Middle Attack berhasil dilakukan. Ketika attackermelakukan serangan, gateway mampu melakukan pengecekan terhadap data dari node asli dan attackeryang dicocokan dengan data dari gateway sehingga menghasilkan data yang tidak valid yang berartiintegritas datanya terjamin.
Implementasi Known-Plaintext Attack Algoritme Pada Grain-128a Berbasis LoRa Olivia Very Noorlinda; Ari Kusyanti; Kasyful Amron
ikraith-informatika Vol 6 No 2 (2022): IKRAITH-INFORMATIKA Vol 6 No 2 Juli 2022
Publisher : Fakultas Teknik Universitas Persada Indonesia YAI

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1508.334 KB)

Abstract

Long-Range (LoRa) merupakan teknologi Low Power Wide Area Network (LPWN) yang menggunakanmodulasi Chirp Spread Spectrum (CSS) yang berasal dari skema modulasi spread spectrum yang mampumempertahankan daya rendah serta meningkatkan jangkauan komunikasi yang dibutuhkan pada Internetof things (IoT). Perangkat LoRa melakukan komunikasi melalui radio gelombang dengan frekuensi yangsama. Pada penelitian ini LoRa berperan sebagai node dan gateway yang melakukan pengiriman datapada LoRa melalui broadcast dengan frekuensi yang sama. LoRa memiliki kelemahan pada keamanandatanya, di mana data yang dikirimkan ke node gateway masih rentan terhadap serangan pihak ketiga.Keamanan pada LoRa dapat ditingkatkan dengan menambahkan algoritme Grain-128a pada node dangateway yang bertujuan untuk memberikan keamanan pada data yang dikirimkan oleh node ke gateway.Grain-128a merupakan algoritme enkripsi yang menawarkan autentikasi opsional, yaitu melakukanenkripsi dengan autentikasi dan tanpa autentikasi pada data. Pada penelitian ini Grain-128a berhasilmelakukan pengamanan pada data suhu dan pada modul komunikasi LoRa berdasarkan dari pengujianyang telah dilakukan. Pada pengujian known-plaintext attack yang dilakukan, penyerang tidak berhasilmengetahui plaintext dari ciphertext yang dihasilkan algoritme Grain-128a. Hal ini membuktikan bahwapenyerang tidak berhasil melakukan penyerangan, dan algoritme Grain-128a berhasil melakukanpengamanan pada data.
Analisis Perbandingan Penetration Testing Tool Untuk Aplikasi Web Bhaskara Vito Tarigan; Ari Kusyanti; Widhi Yahya
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 1 No 3 (2017): Maret 2017
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1576.032 KB)

Abstract

Penetration testing is a series of activities undertaken to identify and exploit security vulnerabilities. This helps confirm the effectiveness or ineffectiveness of security measures that have been implemented. This paper discusses the methodology in conducting penetration tests with a third tool penetration test is w3af, wapiti, and arachni. Penetration testing methodology includes three phases: test preparation, test and analysis test. Pilot phase involves the following steps: vulnerability analysis, information collection and analysis tool. This paper portrait is more to mengananlisa comparison tool that determines the penetration test and find out attacks anywhere that can be detected from the three tools that have been tested on existing vulnerabilities in web applications.
Analisis Penerimaan OS Windows 10 Dengan Unified Theory of Acceptance and Use of Technology 2 (UTAUT2) Mega Shero Gayatrie; Ari Kusyanti; Mochamad Chandra Saputra
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 1 No 6 (2017): Juni 2017
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1035.877 KB)

Abstract

This study discusses the acceptance of Windows 10 as operating system for desktop. This study is based on the seven constructs of the Unified Theory of Acceptance and Use of Technology 2 (UTAUT2) from Venkatesh et al. (2012) without moderate constructs who processed with Structural Equation Model (SEM). The respondents were teenage users in Indonesia. The result showed that effort expectancy, facilitating condition and price value do not have a significant positive impact on behavioral intentions while performance expectancy, social influence, hedonic motivation and habit had a significant positive effect on behavior intention. On the other hand, facilitating condition and habit factors influence use behavior while behavior intention do not have a positive impact on use behaviour to use Windows 10.
Analisis Hubungan Kesadaran Keamanan, Privasi Informasi, dan Perilaku Keamanan Pada Para Pengguna Media Sosial Line Irfan Arif Afandi; Ari Kusyanti; Niken Hendrakusma Wardani
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 1 No 9 (2017): September 2017
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1366.087 KB)

Abstract

LINE is the messaging application that often used as a way to non-normative act and used as media is looking for profit or benefit unilaterally by the peoples who work in cyber crime. This research attempted to explore the main factors affecting security behavior of LINE users. The research model comprised of eight constructs. The constructs were security awareness, self-effiacy in information security, expectation, security behavior, cues to action, perceived susceptibility/perceived severity, perceived security threat, and internet users information privacy concerns. It analyzed data collected from qustionnaire survey on users of LINE. Correlations and strength of corelations between laten constructs were identified using Structural Equation Modeling (SEM). The result of this research show that Cues to Action have significant and positive influence on Perceived Security Threat; Self-Efficacy in Information Security have significant and positive influence on Expectations; Perceived Security Threat have significant and positive influence on Internet Users Information Privacy Concerns; and Perceived Security Threat have significant and positive influence on Security Behavior.
Analisis dan Implementasi Algoritma SHA-1 dan SHA-3 pada Sistem Autentikasi Garuda Training Cost Firlhi Kurniawan; Ari Kusyanti; Heru Nurwarsito
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 1 No 9 (2017): September 2017
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (762.24 KB)

Abstract

Garuda Training Cost is a web application for calculating the training costs for pilots and flight attendants developed in Garuda Indonesia Training Center. This application use SHA-1 hash function algorithm to secure user password in database. However, the weakness and colisions have been found in this algorithm, therefore this algorithm less secure. Hence, in this research authors will replace the SHA-1 with the algorithm successor, SHA-3. This algorithm will be implemented in login process, password change process and adding users process. Both algorithm will be tested and analyzed to determine the performance of the algorithm. There are three types of tests performed. The first is brute-force testing, second is avalanche effect testing and the final test is processing time testing. From the brute-force test result, SHA-3 algorithm much better than SHA-1. From the 30 times testing for 10-character password, the SHA-1 generated hash need average 14 hours 53 minutes and 51 seconds to find the plaintext. While SHA-3 generated hash need average 4 days 13 hours 6 minutes and 6 seconds to find the plaintext. For the avalanche effect testing, SHA-1 algorithm get a percentage change of 100%, while SHA-3 get 95%. For the processing time testing, SHA-1 algorithm is better because of SHA-3 higher complexity. Although two of three test SHA-1 is better, does not mean SHA-3 is not better. Minimum avalanche effect percentage for an algorithm is 50%. And that processing time is still in milliseconds unit, so that user do not feel the impact directly. In conclusion, the three these tests show that the SHA-3 has a higher resistance than the algorithm SHA-1.
Analisis Perbedaan Pemahaman Antara Experienced dan Non-Experienced Smartphone User Terhadap Application Permission Fairuz Risky Yusniasari; Ari Kusyanti; Aryo Pinandito
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 1 No 10 (2017): Oktober 2017
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (708.664 KB)

Abstract

Application Permission is an application licensee type which appears before to installation process or update an application in smartphone. Many applications states that the permissions were installed to take some personal information of smartphone user. Smartphone user will be divided into two levels. Experienced smartphone user have tendency for not provide their personal information. While non-experienced smartphone user have tendency for provide their personal information. This research aims to analyze the difference understanding between the experienced and non-experienced smartphone users. It will analyze, what is the difference understanding between the experienced and non-experienced smartphone user towards installation process or update. Data collected from 200 Android user. The method that is used for analyzing is Independent Sample T-test and Regression Linear. The result of research is that there is significant difference understanding between experienced and non-experienced smartphone user.
Analisis Faktor - Faktor Yang Memengaruhi Penggunaan Smartphone Dengan Menggunakan Metode Structural Equation Modeling (SEM) Nungki Dwi Prastanti; Ari Kusyanti; Andi Reza Perdanakusuma
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 1 No 10 (2017): Oktober 2017
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1033.534 KB)

Abstract

Smartphone is an internet-enabled phone which provides a Personal Digital Assistant (PDA) functions such as a calendar, calculator, address book, diary, and notes. In addition, smartphone also defined as one of the technological evolution in the form of devices to meet the desires of its users. Smartphone technology has been adopted by many industrial sectors, such as, banks, health care, food, transportation which will improve user experience toward new technologies. Smartphones become one of the important things and desperately needed by Indonesian people at this moment. Using the smartphone, variety of work can be done more easily, faster and certainly more practical. Many benefits to be gained from the use of smartphone. That is encourage people to buy and use a smartphone. The desire to use a smartphone is influenced by various factors. This study aims to identify factors that affect the use of smartphones by using eight variables constructs. Data were collected by distributing online questionnaires to 248 smartphone users. Structural Equation Modeling (SEM) is used as data analysis method. From the analysis process using Structural Equation Modeling (SEM) can be concluded that the research model has a good fit level with research data because the test results show if the value of Goodness of Fit Indieces have met the criteria. In addition, the result of this study indicates that the factors which have positive affect toward Behavioral Intention to use smartphone that will affect the variable actual use of smartphone are Perceived Usefulness, Perceived Ease of Use, and Perceived Trust.
Co-Authors Adam Syahputra Adhitya Bhawiyuga Aditya Bhawiyuga Aditya Rachmadi Admaja Dwi Herlambang Agung Pambudi Agung Setia Budi Ahmad Faiz Ajeng Nurrohmah Alan Maulana Hamid Aldila Amalia Saufika Alex Sandro Irawan Ali Arifin Ami Fajar Hikmah Andhika Brahmana Putra Andi Reza` Perdanakusuma Andy Jaya Hartanto Angger Ramadhan Aniela Cahya Ningroem Apriyanto Tobing Arimbi Dewayanti Arsana Yudistira Arya Seta Bagaswara Aryo Pinandito Atika Baladina Audi Fauzan Septano Aulia Rizqy Pratama Bagus Priyambada Bagus Satria Wiguna Bhaskara Vito Tarigan Candra Emelia Fransisca Cindy Farah Safira Dany P Kartikasari Dany Primanita Kartikasari David Christanto Dian Astika Rini Dimas Dwi Radhityo Dita Nurina Malinda Dwi Qunita Putri Ambeq Paramarta Enrico Dimas Darmawan Evi Oktavia Kurniawati Fairuz Risky Yusniasari Fani Madina Fanny Aulia Rifki Fariz Andri Bachtiar Fariz Andri Bakhtiar Fida Royani Firlhi Kurniawan Firman Eko Purnomo Fitra Abdurrachman Bachtiar Fitra Firdaus Fredianto Fredianto Gibran Akbaromi Luhkito Hadyan El Aufar Halimah Septya Mikayla Hanaria Rotua Tampubolon Harin Puspa Ayu Catherina Helmy Rafi Nawawi Heru Nurwarsito Hilman Adi Kartika Himawat Aryadita I Putu Agrahita Wiguna Indriyana Liliasari Rahma Yusvi Irfan Arif Afandi Iskar Maulana Ismiarta Aknuranda Ivan Faturahman Iwi Suharti Izzati Dalilah Jihad Kamilullah Julio Dimitri Fredrik Kalbuadi Joyoputro Karmila Dewi Sulistyowati Kasyful Amron Kasyful Amron Khusnatul Mukaromah Lina Andreina Luqman Hakim Yumnun Lutfi Fanani Luthfi Maulana M. Ali Fauzi Mabda Amnesti Hananto Maharani Essraningtiyas Mahendra Data Mega Noviany Mega Shero Gayatrie Mochamad Chandra Saputra Mochammad Hannats Hanafi Ichsan Mochammad Valdi Fuadi Moh. Afif Ma'ruf Moh. Ahsani Taqwim Mohammad Fachry Muhammad Adi Wijaya Muhammad Alvian Syahputra Muhammad Faizal Ismail Muhammad Iqbal Rofi'i Muhammad Isfa Hany Muhammad Khatib Barokah Muhammad Nurul Fanani Muhammad Thareq Parsaulian Beyri Muhammad Wahyu Rizqi Pratama Muhammad Zainul Mubarok Nadya Puspitasari Ngr. Putu Raka Novandra Asta Nico F. Sitorus Niken Hendrakusma Wardani Ninscha Adisti Oktivianet Novia Dwi Setyaningrum Novita Krisma Diarti Nungki Dwi Prastanti Nur Azizah Mutmainnah Nuretha Hevy Purwaningtyas Nurjannah Nurjannah Nurma Abadi Firjatulloh Nurovi Andiyani Nurul Syamsi Ekowati Odytri Caesar Mahayani Okta Dwi Ariska Olivia Very Noorlinda Panji Mansyur Ansyah Pramasita Gustiarum Pramukantoro, Eko Sakti Primantara Hari Trisnawan Puspita Ainunnazahah Rafi Fajar Hidayat Raka Kurnia Novriantama Rakhmadhany Primananda Randyka Rusniantoro Ratna Khansa Anantika Retno Indah Rokhmawati Retno Nizma'urrahmi Reza Andria Siregar Reza Andria Siregar Richie Mahfud Ahmed Sambora Rifa Izza Nurlita Rika Mardatilla Rivai Fansuri Nasution Rizal Dismantoro Rizka Amalia Kurniawati Rizki Nanda Mustaqim Rohbi Visdya Harris Chandra Sabriansyah Rizqika Akbar Sandy Ramadhan Wijaya Sara Yosephina Sartika Amalia Sastra Ginata Sepdiyah Ayu Ningrum Septian Visiano Handoko Suhadak Akbar Supraptoa Supraptoa Syahifudin Shahid Syahmi Rifqi Hudha Perwira Tista Pamungkas Ragil Alit Widhi Yahya Wijaya Kurniawan Winda Ayu Safitri Yazid Yazid Yoga Rizwan Priyatna Yogi Anugrah Yohanes Heryka Febriarso Yulius Adi Pratama Yuniar Siska Fatmala Yusi Tyroni Mursityo Yustiyana April Lia Sari Zuroul Mufarokah