Claim Missing Document
Check
Articles

Implementasi Algoritme SPECK dalam Sistem Monitoring Sumber Daya pada Raspberry Pi Yohanes Heryka Febriarso; Ari Kusyanti; Primantara Hari Trisnawan
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 5 No 5 (2021): Mei 2021
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Monitoring system is common this time. However, security system needs attention. Because if unauthorized people controls the data from monitoring system, it can endanger owner of monitoring system. Aspect that need to guarded in monitoring system is confidentiality. SPECK algorithm can fulfill confidentiality security and has advantage of low specifications system. SPECK algorithm is implemented in monitoring system on manager and agent when sending and receiving data. Tests includes test vectors, performance, sniffing attacks and known plaintext attacks. Time for monitoring system process encryption has an average 1,780.738 ms on Raspberry Pi 0 W, 799.173 ms on Raspberry Pi 2 and 481.7921 ms on Raspberry Pi 3. Time to process decryption has an average 2,007.717 ms on Raspberry Pi 0 W, 880.4057 ms on Raspberry Pi 2 and 508.9488 ms on Raspberry Pi 3. Data amount before and after encryption is 524 byte in resource, network and disk scenarios. Results of test vector test is same as the SPECK paper so they declared successful. Sniffing test also successful because when checked using Wireshark application, contents of the packet is ciphertext. In known plaintext attack test, the test was successful because the resulting ciphertext failed to decrypt by brute force.
Implementasi Algoritme PRESENT untuk Proses Enkripsi pada Modul Komunikasi LoRa Fitra Firdaus; Ari Kusyanti; Reza Andria Siregar
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 5 No 5 (2021): Mei 2021
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Internet of Things (IoT) pada dasarnya merupakan gabungan dari dua komponen utama, yaitu internet dan things. Dalam mewujudkan visi IoT, teknologi Low Power Wide Area (LPWA) networks menarik banyak perhatian karena kemampuannya untuk menawarkan konektivitas yang terjangkau untuk perangkat berdaya rendah yang tersebar pada cakupan area yang luas (long range). LoRa adalah teknologi nirkabel unlicensed berdaya rendah (low battery consumption) yang memiliki jangkauan jarak yang cukup jauh dengan menggunakan teknik chirp-spread-spectrum(CSS), namun LoRa belum memiliki pengamanan pada proses pengiriman data. Dengan tidak adanya pengamanan pada LoRa, maka sangat rentan terhadap serangan oleh pihak yang tidak bertanggung jawab diantaranya adalah serangan sniffing. Untuk dapat menerapkan sistem keamanan pada data yang dikirimkan diantaranya adalah dengan menggunakan algoritme enkripsi PRESENT. Hal ini dibuktikan dengan hasil pengujian pada penelitian dengan melakukan serangan pasif menggunakan teknik sniffing serta serangan aktif menggunakan teknik Known Plaintext Attack (KPA). Pada serangan sniffing penyerang hanya mendapatkan data yang terenkripsi dalam bentuk chipertext sehingga data tidak dapat dibaca. Kemudian untuk hasil serangan KPA, penyerang tidak berhasil mendapatkan key algoritme. Dari hasil uji dengan menggunakan serangan sniffing dan KPA, maka dapat diambil sebuah kesimpulan bahwa implementasi algoritme PRESENT berhasil dalam melakukan pengamanan data yang dikirimkan menggunakan Lora.
Implementasi Algoritme Light Encryption Device (LED) pada Wireless Sensor Network dengan Media Pengiriman Data nRF24L01 Septian Visiano Handoko; Ari Kusyanti; Fariz Andri Bakhtiar
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 5 No 6 (2021): Juni 2021
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The nRF24L01 module is more frequently used to send data on Wireless Sensor Network (WSN) compared to the ESP8266 module. This is because of the nRF24L01 module tend to be an Ultra Low Power (ULP) module which requires less power and can transmit data at speeds of 2Mbps. The nRF24L01 module can use 125 different channels and able to create 125 networks in one area and on each channel that has up to 6 addresses. The number of channels and adressess which can be made by the nRF24L01 will make the data traffic will be slightly harder to control and will having a chance to cause a security problem, such as it becomes more vulnerable to hack. Because there is an opportunity for the problem to occur, cryptographic method is needed to encrypt communications on the nRF24L01 module. The Light Encryption Device (LED) algorithm is a development of the Advanced Encryption Standard (AES) algorithm and it is compatible with hardware because this algorithm is a fairly light algorithm if compared to other symmetric block ciphers in its class such as the AES algorithm itself, so that this LED algorithm can implemented in WSN with nRF24L01 module which tend to be Ultra Low Power to fulfill the basic principle of confidentiality security. The implementation of the LED algorithm on the system makes this system resistant to even passive and active attacks. Keywords: Wireless Sensor Network (WSN), nRF24L01, Light Encryption Device (LED)
Implementasi Feige-Fiat-Shamir Identification Scheme untuk Autentikasi antara Node dan Gateway pada Module Lora Audi Fauzan Septano; Ari Kusyanti; Reza Andria Siregar
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 5 No 7 (2021): Juli 2021
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The authentication system using the Long Range (LoRa) module with the Wireless Sensor Network (WSN) mechanism still has problems. The problem lies in the security side of sending authentication data. The authentication that is carried out only matches the ID number as the identity of the sensor node that will communicate to the gateway node. This can cause unauthorized parties to easily break into the system. The Fiege-Fiat-Shamir (FFS) Identification Scheme authentication method is one method that implements the Zero-Knowledge Proof (ZKP) mechanism. The ZKP mechanism is an authentication method used to prove verifier, without providing confidential information or providing a way for other people to find out the confidential information. The authentication is done by matching the evidence generated from the key pair using the FFS identification scheme method. This research resulted in the FFS identification scheme authentication system being successfully implemented in the WSN mechanism using the LoRa module. Attacks carried out by using fake nodes to communicate and replay attacks with duplication of authentication data have been successfully overcome using an FFS identification scheme mechanism.The authentication validation level is 100% which is calculated using confusion matrix.
Implementasi Algoritme Speck Untuk Enkripsi One-Time Password Pada Two-Factor Authentication Moh. Ahsani Taqwim; Ari Kusyanti; Reza Andria Siregar
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 5 No 7 (2021): Juli 2021
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Static authentication is very vulnerable to attacks, Therefore, two-factor authentication is carried out by adding OTP as a factor in the authentication. However, even with all the conveniences offered by OTP, OTP is still very vulnerable to attacks, there are many attacks on OTP such as sniffling, wireless interception, etc. Therefore, it is necessary to have a second security for OTP. The SPECK algorithm provides excellent performance in both software and hardware, SPECK Family also has a variety of block and key sizes to match the application requirements and security needs without hindering the performance. OTP is encrypted with the SPECK algorithm to prevent attacks that directed at OTP. The OTP is encrypted with a key and sent to the user which is then sent back by the user to the system to be decrypted using the user's key. The validated OTP is then deleted to avoid duplicate OTPs. The testing of sniffing and KPA attack that was done to OTP was successfully prevented using SPECK algorithm. We can conclude that the result is invisible in sniffing attack testing, and the plaintext generated from KPA didn't match the main plaintext. The validation of the SPECK data is also true because it matches the test vector.
Implementasi Cross Site Scripting Vulnerability Assessment Tools berdasarkan OWASP Code Review Muhammad Isfa Hany; Aditya Bhawiyuga; Ari Kusyanti
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 5 No 9 (2021): September 2021
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Cross site scripting (XSS) attacks is one of the most discovered vulnerabilities in the web application. Unfortunately, not all software engineer and security engineering team fluent aganist all of the web vulnerabilities (Khan et al., 2017). OWASP Code review is a written document explaining about principles, rules, and standards about web application source code analysis. Furthermore, vulnerability assessment process can also aid in more efficient web application vulnerability discoveries. This research will also build a system that can perform vulnerability assessment according to OWASP Code Review. In the system design phase, there are seven regular expression patterns that can help to identify security violation from the chunk of source code and two main regular expressions patterns to find vulnerabilities. Moreover, there are five algorithm design in order to understands how the system will be implemented. The system is implemented with Django Framework and have been tested based on validity, cpu usage, and response time. According to the test result, the system built is better than discovering cross site scripting
Implementasi Algoritma Enkripsi Snow-V pada Wireless Sensor Network (WSN) Yulius Adi Pratama; Agung Setia Budi; Ari Kusyanti
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 5 No 10 (2021): Oktober 2021
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Wireless sensor network (WSN) is a technology consisting of a collection of nodes that are spread out within the scope of the system that can be used for monitoring, tracking and controlling equipment. Each node on the WSN uses a wireless network in exchanging data so that it allows data to be seen and collected by other parties by eavesdropping on the data exchange path between nodes. The data seen and collected by other parties may contain sensitive information such as identity, location, etc. In this study the author uses the streamciper method in securing data with the Snow-v algorithm. Streamciper was chosen because of its simplicity in securing data and its speed. The Snow-v algorithm is a new algorithm that offers speed and lightness in running the algorithm. The Snow-v algorithm is also a proposal in the encryption of perimits in 5G systems. In this study, the snow-v algorithm is used as a keystream generator in the streamciper. In this study, using nRF24L01 as a communication module for data exchange between nodes using radio frequency media and Arduino Uno as a tool used as a medium to run the Streamciper method and the Snow-v algorithm. From the research results, the data cannot be read by other pilaks who are eavesdropping on the exchange of data between nodes. In this study, the average time required for the node to encrypt is 241 ms and the time required to decrypt the data is 185 ms.
Implementasi Autentikasi pada Protokol CoAP dan MQTT menggunakan Oblivious Transfer pada Perangkat IoT Puspita Ainunnazahah; Ari Kusyanti; Reza Andria Siregar
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 6 No 13 (2022): Publikasi Khusus Tahun 2022
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Dipublikasikan di JEPIN (Jurnal Edukasi dan Penelitian Informatika)
Implementasi Algoritma Chaskey-12 Cipher untuk Mengamankan Data Sensor pada Komunikasi antara Node Sensor, Gateway dan Cloud Fanny Aulia Rifki; Adhitya Bhawiyuga; Ari Kusyanti
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 6 No 3 (2022): Mei 2022
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Data is one of the objects in a technology that is vulnerable to attacks on cryptographic aspects of confidentiality and integrity. Attacks on confidentiality and integrity aspects can be prevented by building a data security mechanism that implements cryptographic algorithms. However, not all technologies have data security mechanisms because the devices used have limited resources. So in this study, the authors build a data security mechanism on communication between sensor nodes, gateways, and the cloud using the Chaskey-12 cipher algorithm which is suitable for devices with limited resources. The author implements the Chaskey-12 cipher algorithm with CBC operating mode in the encryption and decryption process to ensure the confidentiality of sensor data. Meanwhile, to ensure the integrity of sensor data, the author implements the Chaskey-12 cipher algorithm in the process of tag formation and tag verification. Based on several test results in this study, it is known that the sensor, gateway, and cloud nodes successfully implement the Chaskey-12 cipher algorithm and carry out their functions in securing sensor data. The test vector test results show that the Chaskey-12 cipher algorithm in this study has been implemented according to the paper of the Chaskey-12 cipher algorithm creator. The performance test results show that node sensor, gateways, and cloud require a low average execution time with a high throughput value. The security test results show that the Chaskey-12 cipher algorithm implemented by the author succeeded in guaranteeing the confidentiality and integrity aspects of the sensor data security mechanism.
Implementasi Algoritme SPECK pada Wireless Sensor Network menggunakan Media Pengiriman Data nRF24L01 Retno Nizma'urrahmi; Ari Kusyanti; Reza Andria Siregar
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 6 No 5 (2022): Mei 2022
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Wireless Sensor Network (WSN) is a network formed by several sensor nodes and wirelessly connected to each other with the limitations of each node. One of the limitations of the resources contained in the WSN node is the communication media. This causes WSN to require a data communication method with low resource usage. The nRF24L01 module is designed of being implemented in a wireless network that has low resources, so that it can be applied to a WSN network. The nRF24L01 module will broadcast or broadcast at an address to transmit data. Then, to receive data, a listen process is carried out so that it can be received by devices that are at the same address as the sender. This causes a security hole when a device is intended to send data to the desired device only. For this reason it is necessary to have a mechanism that can ensure the security of ongoing data communications. The SPECK algorithm has been tested on both hardware and software by the National Security Agency (NSA). The SPECK algorithm has been optimized to run on the software. Users can implement SPECK Cipher by considering the application and hardware required without compromising performance. The purpose of the SPECK algorithm itself is to provide the flexibility and performance characteristics required by developers. The implementation of the SPECK algorithm on the system makes this system resistant to both passive and active attacks.
Co-Authors Adam Syahputra Adhitya Bhawiyuga Aditya Bhawiyuga Aditya Rachmadi Admaja Dwi Herlambang Agung Pambudi Agung Setia Budi Ahmad Faiz Ajeng Nurrohmah Alan Maulana Hamid Aldila Amalia Saufika Alex Sandro Irawan Ali Arifin Ami Fajar Hikmah Andhika Brahmana Putra Andi Reza` Perdanakusuma Andy Jaya Hartanto Angger Ramadhan Aniela Cahya Ningroem Apriyanto Tobing Arimbi Dewayanti Arsana Yudistira Arya Seta Bagaswara Aryo Pinandito Atika Baladina Audi Fauzan Septano Aulia Rizqy Pratama Bagus Priyambada Bagus Satria Wiguna Bhaskara Vito Tarigan Candra Emelia Fransisca Cindy Farah Safira Dany P Kartikasari Dany Primanita Kartikasari David Christanto Dian Astika Rini Dimas Dwi Radhityo Dita Nurina Malinda Dwi Qunita Putri Ambeq Paramarta Enrico Dimas Darmawan Evi Oktavia Kurniawati Fairuz Risky Yusniasari Fani Madina Fanny Aulia Rifki Fariz Andri Bachtiar Fariz Andri Bakhtiar Fida Royani Firlhi Kurniawan Firman Eko Purnomo Fitra Abdurrachman Bachtiar Fitra Firdaus Fredianto Fredianto Gibran Akbaromi Luhkito Hadyan El Aufar Halimah Septya Mikayla Hanaria Rotua Tampubolon Harin Puspa Ayu Catherina Helmy Rafi Nawawi Heru Nurwarsito Hilman Adi Kartika Himawat Aryadita I Putu Agrahita Wiguna Indriyana Liliasari Rahma Yusvi Irfan Arif Afandi Iskar Maulana Ismiarta Aknuranda Ivan Faturahman Iwi Suharti Izzati Dalilah Jihad Kamilullah Julio Dimitri Fredrik Kalbuadi Joyoputro Karmila Dewi Sulistyowati Kasyful Amron Kasyful Amron Khusnatul Mukaromah Lina Andreina Luqman Hakim Yumnun Lutfi Fanani Luthfi Maulana M. Ali Fauzi Mabda Amnesti Hananto Maharani Essraningtiyas Mahendra Data Mega Noviany Mega Shero Gayatrie Mochamad Chandra Saputra Mochammad Hannats Hanafi Ichsan Mochammad Valdi Fuadi Moh. Afif Ma'ruf Moh. Ahsani Taqwim Mohammad Fachry Muhammad Adi Wijaya Muhammad Alvian Syahputra Muhammad Faizal Ismail Muhammad Iqbal Rofi'i Muhammad Isfa Hany Muhammad Khatib Barokah Muhammad Nurul Fanani Muhammad Thareq Parsaulian Beyri Muhammad Wahyu Rizqi Pratama Muhammad Zainul Mubarok Nadya Puspitasari Ngr. Putu Raka Novandra Asta Nico F. Sitorus Niken Hendrakusma Wardani Ninscha Adisti Oktivianet Novia Dwi Setyaningrum Novita Krisma Diarti Nungki Dwi Prastanti Nur Azizah Mutmainnah Nuretha Hevy Purwaningtyas Nurjannah Nurjannah Nurma Abadi Firjatulloh Nurovi Andiyani Nurul Syamsi Ekowati Odytri Caesar Mahayani Okta Dwi Ariska Olivia Very Noorlinda Panji Mansyur Ansyah Pramasita Gustiarum Pramukantoro, Eko Sakti Primantara Hari Trisnawan Puspita Ainunnazahah Rafi Fajar Hidayat Raka Kurnia Novriantama Rakhmadhany Primananda Randyka Rusniantoro Ratna Khansa Anantika Retno Indah Rokhmawati Retno Nizma'urrahmi Reza Andria Siregar Reza Andria Siregar Richie Mahfud Ahmed Sambora Rifa Izza Nurlita Rika Mardatilla Rivai Fansuri Nasution Rizal Dismantoro Rizka Amalia Kurniawati Rizki Nanda Mustaqim Rohbi Visdya Harris Chandra Sabriansyah Rizqika Akbar Sandy Ramadhan Wijaya Sara Yosephina Sartika Amalia Sastra Ginata Sepdiyah Ayu Ningrum Septian Visiano Handoko Suhadak Akbar Supraptoa Supraptoa Syahifudin Shahid Syahmi Rifqi Hudha Perwira Tista Pamungkas Ragil Alit Widhi Yahya Wijaya Kurniawan Winda Ayu Safitri Yazid Yazid Yoga Rizwan Priyatna Yogi Anugrah Yohanes Heryka Febriarso Yulius Adi Pratama Yuniar Siska Fatmala Yusi Tyroni Mursityo Yustiyana April Lia Sari Zuroul Mufarokah