Reza Andria Siregar
Fakultas Ilmu Komputer , Universitas Brawijaya

Published : 101 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Implementasi Man In The Middle Attack Pada Algoritme Blake2s Berbasis Lora Nurovi Andiyani; Ari Kusyanti; Reza Andria Siregar
ikraith-informatika Vol 6 No 2 (2022): IKRAITH-INFORMATIKA Vol 6 No 2 Juli 2022
Publisher : Fakultas Teknik Universitas Persada Indonesia YAI

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1743.752 KB)

Abstract

Long Range (LoRa) merupakan teknologi Low Power Wide Arean Network (LPWAN) yang digunakanuntuk transmisi menggunakan spectrum gelombang radio dengan transmisi jangkauan jarak yang jauhdan konsumsi daya yang rendah. Data yang ditransmisikan belum memiliki keamanan sehinggaintegritasnya tidak terjamin. Metode yang telah digunakan untuk keamanan integritas data yaitualgoritme SHA-256 yang sudah tidak aman untuk digunakan karena serangan collison attack dan secondpreimage. Oleh karena itu, algoritme BLAKE2S digunakan sebagai alternatif untuk menjaga integritasdata yang ditransmisikan. BLAKE2S telah terbukti sebagai algoritme yang memiliki tingat keamananyang lebih baik. Dari penelitian yang dihasilkan, algoritme BLAKE2S berhasil melakukan keamananyang diimplementasikan untuk menjamin keamanan data pada LoRa. Pengamanan data dilakukandengan mengubah menjadi message digest melalui proses hashing. Keamanan data dengan pengujianserangan aktif menggunakan teknik Man In The Middle Attack berhasil dilakukan. Ketika attackermelakukan serangan, gateway mampu melakukan pengecekan terhadap data dari node asli dan attackeryang dicocokan dengan data dari gateway sehingga menghasilkan data yang tidak valid yang berartiintegritas datanya terjamin.
Design of Soil Moisture Telemetry System Using cluster-based Wireless Sensor Networks Annisa Widuri Murti Utami; Dany Primanita Kartikasari; Adhitya Bhawiyuga; Reza Andria Siregar; Fariz Andri Bakhtiar
Journal of Information Technology and Computer Science Vol. 7 No. 3: December 2022
Publisher : Faculty of Computer Science (FILKOM) Brawijaya University

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Agriculture is an art and science used to cultivate the land, grow crops, and raise livestock. Agricultural land in Indonesia has different soil quality in each region. Soil quality for agriculture can have an impact on crops. Therefore, a Wireless Sensor Network (WSN) was created to make it easier to determine soil moisture. This system can help to monitor the condition of soil moisture content. WSN applies a Cluster-Based Algorithm, and the protocol used in WSN is a Low Energy Adaptive Clustering Hierarchy (LEACH). WSN will search for the cluster head, and then the sensor node will send the results of soil moisture sensing data to the cluster head for further data aggregation. Then, the results of the aggregation data will be sent to the sink node and then forwarded to the cloud. Data aggregation can make the sink stay longer than 30 minutes than the sink node that receives data without aggregation. Sink nodes that do not receive aggregation data also use more load current than sinks that receive aggregation data. The test results of the average response time to find new cluster heads have an average time of 6023.4 milliseconds. The maximum distance between nodes to transmit data to each other is 100 meters.
Implementasi Network Slicing dengan menggunakan Flowvisor untuk Mengontrol Traffic Data Packet pada Jaringan Software Defined Network Ahmad Rizal Muttaqin; Widhi Yahya; Reza Andria Siregar
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 2 (2018): Februari 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1071.399 KB)

Abstract

The rapid network growth resulted in SDN Networks will encounter heavy traffic or network traffic from various types of data packets. The density of network traffic and the different data packets will result in decreased network quality. This is due to differences in data packets that flood the network has different communication characteristics as well as the Transmission Control Protocol (TCP) packet and the User Datagram Protocol (UDP) package. The more dense and the difference of packet characteristics on network traffic, it is necessary to implement network slicing by using flowvisor to overcome the problem of decreasing SDN network performance. Through the implementation of this system obtained QOS test results throuhput TCP, throughput UDP, packet loss, and jitter. Implementation of network slicing with flowvisor has a distance average value of TCP and UDP througput better than the normal SDN network that is 380.359 and 0.535 Mbits / sec. The mean distance of packet loss and jitter value of network slicing implementation also has better value than normal SDN network that is 908,546 bytes on packet loss and 0.138 ms on jitter.
Implementasi Protokol Websocket Pada Perangkat Non IP Berbasis NRF24L01 (Studi Kasus: Sistem Monitoring Suhu dan Kontroling Lampu LED) Labib Imam Hidayat; Adhitya Bhawiyuga; Reza Andria Siregar
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 6 (2018): Juni 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1128.887 KB)

Abstract

In the current era of technology, the development of IOT (Internet of Things) Architecture has been growing very rapidly. With the increasing number of IOT devices, there are differences between the application layer protocol of the IOT devices. Which causes each devices to have their own application or can be called with the term “one device one app”. To resolve this problem, the use of web protocol to configure the entire application layer protocol or so-called WOT (Web of Things) is a great solution because of the characteristic of the web protocol which is universal. The previous concept of “one device one app” can be changed into “many device one app” which means many devices can be controlled by one application. The problem that arise next is some IOT devices that require real time connections and use radio communications as a method of sending and receiving data. One of the web protocols that supports real time communication is websocket. In radio communications, many devices are used as a choice of radio communication modules. One of the most widely used radio communication module is NRF24L01. By connecting IP protocols with non-IP radio devices, it takes a bridging device that bridges the difference so that data can be transmitted properly. Therefore, the authors conduct research for the implementation of websocket protocol as a web protocol on radio or non-IP devices with case studies of controlling and monitoring systems. The testing result of the sistem is the average time for data transmission of less than one second.
Perbandingan Kinerja Pengiriman Data Skema Routing Single-Copy dan Multi-Copy pada Jaringan Delay Tolerant Network (DTN) Fedro Jordie T. H. Simangunsong; Heru Nurwarsito; Reza Andria Siregar
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 8 (2018): Agustus 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1219.771 KB)

Abstract

Nowadays the Internet become the most popular way to get and share information. But not all regions in Indonesia have an uninterrupted Internet connection. Rural, mountain climbing, and marine are examples of areas having interrupted Internet connections. These problems can be solved by adapting Delay Tolerant Network (DTN) technology. In this research, the DTN Network was simulated in The ONE Simulator to compare performance of DTN routing scheme with buffer size, message size, and different geographical location. Routing protocols that used are Direct Delivery and First Contact for Single-copy routing schemes, and MaxProp, Spray and Wait, and Epidemic for Multi-copy routing schemes. The results show that the performance of Multi-copy routing scheme is better than Single-copy routing scheme, especially on the Delivery Probability and Average Latency value. With the highest Delivery Probability value of 98.08% compared to 88.56% of Single Copy, the lowest Average Latency value is 40.3138s, compared to 41.2028s of Single-copy, the lowest Overhead Ratio is 367.66%, compared to 0% of Single-copy. MaxProp routing protocol generated the best Delivery Probability value. While, the best Average Latency value generated by Spray and Wait routing protocol. And Direct Delivery generated the best Overhead Ratio value.
Analisis Pengaruh Serangan Black Hole Terhadap Protokol AODV Pada Mobile Ad Hoc Network dengan Lingkungan Pergerakan Dinamis Daffarez Elguska; Reza Andria Siregar; Rakhmashany Primananda
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 8 (2018): Agustus 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (913.019 KB)

Abstract

MANET is one of the wireless technologies that consists of several mobile nodes that are composed without a fixed infrastructure. This technology has issues in the security aspect because it is built without a fixed infrastructure. One of the attacks on the MANET network that is often encountered is a black hole attack. A black hole attack is an attack that can drag all data streams in a network by sending fake reply messages to the data sending node stating that the black hole node is the fastest route node to the destination node then data is retrieved by the black hole and the data being dropped. In this study the authors use AODV routing protocol, Random Based Mobility (Random Waypoint, Random Walk, Random Direction) and simulation parameters of different nodes (10, 25, 50) with black hole nodes placed in 5 different positions. This study will analyze the impact caused by the attack of a black hole with the testing parameters of packet delivery ratio. The study was conducted using the NS3 simulator and animated on NetAnim. The test results showed the black hole attack is significant work on all mobility models and all number of nodes with mostly packet delivery ratio value is 0% in all positions of the black hole node.
Implementasi Access Control List Berbasis Protokol MQTT pada Perangkat NodeMCU Ardhian Rizki Ramadhani; Adhitya Bhawiyuga; Reza Andria Siregar
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 8 (2018): Agustus 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1346.867 KB)

Abstract

Message Queuing Telemetry Transport (MQTT) is a light-weight Internet-of-Things protocol based of topic-based publish-subscribe mechanism that is suitable for constrained devices. MQTT has a security problem in terms of privacy, to ensure client's identity which access MQTT protocol required an authentication and authorization mechanisms, that can be achieved by applying Access Control List (ACLs) to the broker that will govern the rights of client to access certain topic on system, such as publish/subscribe. This research will be conducted to find out about how to implement authorization mechanisms using ACLs on MQTT-based system that use nodeMCU and how it affects the security and performance. This research will be conducted using mosquito-broker that implements auth-plug plugin as authentication and authorization mechanism, the ACLs will be designed on MySQL database and to be accessed by auth-server. Brokers and auth-server will communicate to check the identity and permissions of client, the client's identity will be encoded using JSON Web Token (JWT), and ACLs will be designed based on roles. From the test results, the ACLs managed to secure MQTT protocol-based systems with nodeMCU devices by performing authentication mechanisms using JWT and authorization mechanisms based on client's roles successfully, also successfully handle message with total of 141 each seconds with average time needed to publish each message in the course of 0,7092 seconds.
Implementasi Node Sensor untuk Sistem Pengamatan pH Air Pada Budidaya Ikan Air Tawar Rian Bayu Pambudi; Widhi Yahya; Reza Andria Siregar
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 8 (2018): Agustus 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (823.823 KB)

Abstract

The information on water conditions in the aquatic field can be beneficial to maintain a good water quality. It can provide benefits especially in fish cultivation water. There are several parameters that affect water quality in freshwater fish culture where one of the parameters is pH or acidity level in water. One study explains that living freshwater organisms can only live at a pH between 6.8 to 8.0 and pH changes can occur at any time. At this time, a device that can measure the pH value or water acidity is a colorimeter, pH indicator and pH meter. The pH observations on these three devices can only perform one time data retrieval so that when used for continuous observations it is less efficient. Realtime monitoring systems can be built by implementing monitoring functions on the Internet of Things where they use sensors and actuators. In this study the authors use Probe Sensor SEN1069 as part of the system that performs data retrieval and Arduino microcontroller as part of the system that controls the sensor. Sensors and microcontrollers take pH data and then process pH data and send it to a server using Websocket communication mechanism. From the test results, the performance of system computing time is 2.505 seconds for computing 1000 data of acid solution or alkaline solution, 16 seconds to observe the change from pH 7.00 to acid solution and 8 seconds from pH 7.00 to alkaline solution.
Implementasi Smart Identification Menggunakan Perangkat Smartphone dengan Raspberry PI (Studi Kasus : SMAN 2 Balikpapan) Muhammad Alfarizi; Rakhmadhany Primananda; Reza Andria Siregar
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 8 (2018): Agustus 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1415.307 KB)

Abstract

Information Communication Technology (ICT) that is now supposed to be implemented to realize smart school needs more efficient services to achieve the transformation stage of change on ICT. Smart school is to optimize the technology used by students and schools to connect each other like attendance system which now no longer have to fill in written or manual signature. Therefore built smart identification system to integrate the server with mobile devices that students use by utilizing wireless technology. This Smart Identification will identify the mac address contained in the mobile device used by the students, as it will be more efficient for the attendance system that is only sufficiently connected with the access point with the result of stress test test using siege from 20 virtual users with elapsed time 59.65 second, average transaction rate 191.28 trans / sec, throughput 0.05 MB / sec, data transferred 2.98 Megabyte and percentage performance of Central Processing Unit ( CPU) in the range 85 to 95 percent but the system is still able to run well with no lag, system eror or failed transactions. Smart schools that support the smart identification system will be the basis of data user that will later be integrated into other systems.
Analisis Pemakaian Energi Pada Sensor Node Dengan Protokol Komunikasi Zigbee Menggunakan Solar Cell Nur Cahyo Utomo; Rakhmadhany Primananda; Reza Andria Siregar
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 9 (2018): September 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1037.924 KB)

Abstract

Communication protocol on OSI Layer standardization, divided into several layers among them is data link layer. This layer divided into sub layers, one of which is MAC (Medium Access Control) used to transmit signals owned by nodes connected to the network without any conflict. Zigbee is one of the standardized communication protocols on the MAC sub layer that are known to be reliable and low power. With zigbee, the researcher has the idea of ​​analyzing the power consumption level when this protocols are communicates. The communication system between the nodes was tested using xbee s-1 with arduino uno as microcontroller, and because xbee s-1 low power researchers gave solar cells as resources. Solar cells are used because they have self charging capabilities. System testing includes, changes in environmental conditions when nodes communicate. The last step in this research is to analyze the result data from the test to conclude the result of the research. The result of this research is zigbee communication using solar cell resources can be used in areas where the air temperature is stable and there are heat sources. The power of calor can provide arduino microcontroller power and xbee s-1 module to be used in communicating. Changes in working environment in the form of distance, delivery of packets, temperature, and time intervals applied by researchers can affect the level of power consumption. Researchers recommend environmental conditions that are used so that the system can be run optimally. The use of the zigbee protocol would be optimal if used at a distance of 60-70 m, data transmission by 60 - 80 bytes, temperatures at <30 and> 20 ° celcius, and time intervals 25-35 seconds.
Co-Authors Abyantara, Za’da Achmad Basuki Achmadi, Adrian Adam Hendra Brata Adam Syahputra Adhitya Bhawiyuga Adhitya Bhawiyuga, Adhitya Aditya Prayudhi Ahmad Aji Santoso Ahmad Faiz Ahmad Hanif AR Ahmad Lutfi Bayu Aji Ahmad Rizal Muttaqin Aladina, Yohanna Fransiska Alldo Raafi&#039;ilman Andi Mohammad Thareq Akbar Annisa Widuri Murti Utami Anugerah Wijaya Ardhian Rizki Ramadhani ari kusyanti Ari Kusyanti Asika Ayu Wandira Asroful Khusna Arifianto Atha, Mochamad Audi Azzura Falaq Audi Fauzan Septano Bangsa, Rehan Putra Chandra Yogi Adhitama Cut Naurah Cassrisa Daffarez Elguska Dahru Wildan Pradanaputra Danny Candra Rumantyo Dany Primanita Kartikasari Dany Primanita Kartikasari Dany Primanita Kartikasari Destyorini, Diah Ratih Donny Kurniawan Dyan Krisyanto Dzaki, Alvin Pradano Ekky Pramudito Setiawan Eko Aditya Ramadianto Eldyto Puspa Laksana Fadhlan Muhammad Fariz Andri Bakhtiar Faruqi, Ibrahim Zhilal Fauzan Pahlawan Fedro Jordie T. H. Simangunsong Fitra Firdaus Gibran Akbaromi Luhkito Haidar Harfi Hadhiansah Heru Nurwarsito Hidayatus Syafa&#039;ah Hilkya Dwima Palembangan Hilmy Riadika I Dewa Gede Ardana Pucanganom I Gede Wahyu Sanjaya I Made Oka Semara Putra Imaduddin, Muhammad Fakhri Imam Nurhidayat Imam Utomo Iman Aidil Nugraha Indra Lesmana Putra Isnaini Isnaini Ivan Faturahman Jaliasmar, Rendy Putra Jogi Oliver Yohanes Tampubolon Julio Dimitri Fredrik Kasyful Amron Kasyful Amron Khalid Hamzah Haza Al Hamami Labib Imam Hidayat Mahardika Yuristyawan Putra Mahendra Data Maxi Luckies Ginanjar Azis Miftaqul Novandi Moh. Ahsani Taqwim Mohammad Harits Mohammad Rizky Dwisaputra Muhamad Ralfi Akbar Muhammad Alfarizi Muhammad Alif Bahari Muhammad Alvian Syahputra Muhammad Ichwan Pradana Muhammad Muhajir Kurniawan Muhammad Reza Wahyu Chrisdyan Muhammad Ryan Firmansyah Muhammad Syaifuddin FP Muhammad Taufiq Aryadi Mulyadi, Yonathan Fanuel Nur Cahyo Utomo Nurovi Andiyani Nurudin Santoso Nurul Hidayat Pramukantoro, Eko Sakti Prasetyo Eko Yulianto Primantara Hari Trisnawan Puspita Ainunnazahah Ragil Setyo Utomo Rakhmadhany Primananda Rakhmadhany Primananda, Rakhmadhany Rakhmashany Primananda Ravy Agistya Alkamaly Retno Nizma&#039;urrahmi Rian Bayu Pambudi Risqi Nuril Aimah Rivai Fansuri Nasution Rizky Suhaimi Robbani, Dwindra Helmi Rozali Syahputra Ryan Eko Listyanto Selma Aulia Sekarrizky Siska Irawati Sutrisno, Bagasdio Tasrahmiati Istiqomah Thelemanica Wicaksana Tiara Erlinda Tommy Bona Hamonangan Sitorus Trisnawan, Primantara Hari Tsany Afif Ula Auliya Ilham Irsahnda Widhi Yahya Widhi Yahya Yanuar Alfianus Yosephan Raharjo Yosua Tito Sumbogo Yudhanto, Alif Alamsyah