Reza Andria Siregar
Fakultas Ilmu Komputer , Universitas Brawijaya

Published : 101 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Pengaruh Tipe Propagasi Two Ray Ground dan Free Space terhadap Konsumsi Energi Protokol Destination Sequenced Distance Vector (DSDV) pada Mobile Ad Hoc Network (MANET) Indra Lesmana Putra; Dany Primanita Kartikasari; Reza Andria Siregar
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 6 No 2 (2022): Februari 2022
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

MANET is a dynamic wireless network. Each node in MANET has a function as a host to connect to the wireless network and also as a router that functions to forward data packets to other nodes. In a MANET system, MANET is expected to have good performance and have a maximum level of energy efficiency. This is because each node on the MANET network requires energy to communicate with each other. In addition, the selection of propagation type can also affect of energy efficiency in MANET. In order to understand how the effect of the propagation type on energy consumption in MANET, we have conducted a study that focuses on energy consumption in MANET using two different propagation types. The two types of propagation that we used are the free space propagation type and the two ray ground propagation type. In this study, we will use the DSDV routing protocol which will regulate the routing of data transmission from the sending node to the receiving node. The DSDV protocol guarantees that there will be no looping in data transmission, so it is very suitable to be applied in this research. To achieve credible results, this study uses four test scenarios based on the number of nodes used. Each scenario will be tested 10 times using Network Simulator 2.
Evaluasi Kinerja Moodle E-learning pada Cluster Docker Swarm di Amazon Web Services Ahmad Aji Santoso; Adhitya Bhawiyuga; Reza Andria Siregar
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 6 No 3 (2022): Mei 2022
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

E-learning is a new way to learning to use electronic media typically involving the internet. E-learning has several advantages where students can access subject matter at any time. One of the most popular e-learning applications is Moodle. In its implementation, Moodle can be done using moodlecloud, on-premise and self-hosted servers. The implementation of the service moodle e-learning in self-hosted or using cloud computing services would be ideal option. The advantages offered by cloud computing services are a strong consideration, where not required financing and do not need to spend in early financing server maintenance. Service selection and deployment model greatly affect the performance of the Moodle application and also the financing from resource used. Moodle requires a service with good performance to cope with the number of users who use it, this becomes a polemic for moodle e-learning service providers, which is how the ideal deployment model to implement moodle e-learning applications on cloud computing services with high levels of performance and scalability and also service financing used. The test is done by providing requests in the form of enrol activities, view courses and quiz on docker swarm clusters built on aws services ec2 t2.medium, t3.medium and t3a.medium services with user rates of 40, 80, 120. The test includes performance testing with test parameters, namely throughput, success ratio, latency, use of cpu and memory resources. Based on the results of testing and cluster analysis, ec2 t3.medium and t2.medium have good performance based on the throughput and latency test values for enrol activities, view courses and quizzes, based on the success ratio test scores, clusters on ec2 t2.medium have good performance with an error value of 0% on enrol activities, 0% on view course activities and 0.1% on quiz activities with 120 user requests.
Implementasi Blockchain berbasis BigchainDB untuk Menjamin Keamanan Data dalam Sistem Pencatatan Rekam Medis Jogi Oliver Yohanes Tampubolon; Adhitya Bhawiyuga; Reza Andria Siregar
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 6 No 3 (2022): Mei 2022
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Increasing interest on digitalization of medical records and also the occurrence of a pandemic, pushes the increase usage of the Electronic Health Record (EHR) system by the health service providers. However, large amount of these systems still implements the centralized architecture that may pose risks such as data corruption, privacy infringement, and limited performance. Hence, blockchain technology are being researched as a substitute to handle data on EHR systems due to its decentralized architecture. The blockchain framework that is being researched in this report is BigchainDB, due to its capabilities on managing large-sized data similar to a conventional database. BigchainDB inherits the blockchain characteristics by also having a decentralized architecture, which means it can communicate its peers by using a peer-to-peer connection. BigchainDB also uses a consensus algorithm for transaction verification. BigchainDB consists of three main components; the “BigchainDB server”, which responsible for transaction handling from the web server to the blockchain, “Tendermint”, which responsible for the blockchain protocol and peer-to-peer communication, and “MongoDB", which responsible for the data storage. The BigchainDB also have data ownership control through the Role Based Access Control (RBAC) feature, which is a subsystem that allows the formation of data hierarchy that consists of roles and permissions for every transaction.
Implementasi Algoritme SPECK pada Wireless Sensor Network menggunakan Media Pengiriman Data nRF24L01 Retno Nizma'urrahmi; Ari Kusyanti; Reza Andria Siregar
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 6 No 5 (2022): Mei 2022
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Wireless Sensor Network (WSN) is a network formed by several sensor nodes and wirelessly connected to each other with the limitations of each node. One of the limitations of the resources contained in the WSN node is the communication media. This causes WSN to require a data communication method with low resource usage. The nRF24L01 module is designed of being implemented in a wireless network that has low resources, so that it can be applied to a WSN network. The nRF24L01 module will broadcast or broadcast at an address to transmit data. Then, to receive data, a listen process is carried out so that it can be received by devices that are at the same address as the sender. This causes a security hole when a device is intended to send data to the desired device only. For this reason it is necessary to have a mechanism that can ensure the security of ongoing data communications. The SPECK algorithm has been tested on both hardware and software by the National Security Agency (NSA). The SPECK algorithm has been optimized to run on the software. Users can implement SPECK Cipher by considering the application and hardware required without compromising performance. The purpose of the SPECK algorithm itself is to provide the flexibility and performance characteristics required by developers. The implementation of the SPECK algorithm on the system makes this system resistant to both passive and active attacks.
Analisis Dampak Serangan Wormhole terhadap Protokol Routing Ad-Hoc On Demand Distance Vector (AODV) pada LoRa Muhamad Ralfi Akbar; Dany Primanita Kartikasari; Reza Andria Siregar
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 6 No 11 (2022): November 2022
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Long Range (LoRa) is one of IoT technology used in a system that require long distance communication and in a need of low cost system. Delivering a packet on LoRa takes time depending on the distance to the destination, the farther the distance, the longer delivery time will take. This makes LoRa network security while delivering packet, vulnerable to attacks. This research analyze packet delivery on LoRa using the AODV routing protocol and the impact of Wormhole attack lon the AODV routing protocol on LoRa. This study uses 3 LoRa nodes and 1 malicous wormhole node. The analysis is reviewed with QoS paramers, namely Troughput, Delay, Jitter, and Packet Loss. The result of the test show that Wormhole attack affects the performance of packet delivery in LoRa. In the non-attack scenario, the average Delay value is 0.171s, Packet Loss is 0%, the average of Troughput is 408,321 kbps, and the average of Jitter is 0.0003ms. In the Wormhole attack scenario, the average Delay values is increased to 0.343s, Packet Loss increased to 70%, Troughput decreases by an average of 204,105 kbps and Jitter increases by an average of 0.05724ms. It can be concluded that Wormhole attack on the AODV routing protocol affects the qualiy of QoS on the delivery of each packet.
Implementasi Algoritme Frequency Based Hashing-S menggunakan Metode Approximate Matching pada File Gambar Rivai Fansuri Nasution; Ari Kusyanti; Reza Andria Siregar
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 6 No 13 (2022): Publikasi Khusus Tahun 2022
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Dipublikasikan di JEPIN (Jurnal Edukasi dan Penelitian Informatika)
Implementasi Congestion Avoidance pada HWMP dengan menggunakan CCNF dan Queue Threshold pada Jaringan VANET Audi Azzura Falaq; Primantara Hari Trisnawan; Reza Andria Siregar
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 6 No 7 (2022): Juli 2022
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Vehicular Ad hoc Network (VANET) is prone to experience congestion problems. The congestion may cause the packet to be stuck, and fails to arrive at its destination. In this study, modifications to the HWMP protocol will be carried out to overcome the congestion problem. The modification made is to apply a threshold to monitor the queue at the node. If a node is starting to get congested, the node will send a Congestion Control Notification Frame (CCNF) to other nodes. The CCNF function is to notify other nodes that the node cannot receive packets for a while. So that an alternative route that excludes the congested node will be formed. Tests will be carried out on 3 different mobility models, namely, the Manhattan model, the Freeway model, and the real map. From those test, 4 parameters such as average end-to-end delay, packet delivery ratio (PDR), throughput, and normalized routing load will be measured. Based on the results of the tests, it is known that the modified protocol is superior in PDR and throughput, but there is a decrease in performance in average end-to-end delay and normalized routing load.
Analisis Karakteristik Transmisi LoRa pada Wilayah Perkotaan Muhammad Muhajir Kurniawan; Kasyful Amron; Reza Andria Siregar
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 6 No 8 (2022): Agustus 2022
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

LoRa is one of the access technologies in Wireless Sensor Networks that has the advantage of a high range of distances. LoRa data transmission is influenced by Spreading Factor, Bandwidth, Transmission Power and Coding Rate. There are studies that observe the characteristics of LoRa by using wite gaussian noise generators as an interference. However, the study was conducted at a distance of 10 meters, so further research needs to be carried out on the capabilities of the LoRa network in real environments. This study focuses on observing the transmission characteristics of LoRa in urban areas. The system consists of 1 sensor node device and 1 gateway device. The implementation and testing process was carried out in the campus area of Universitas Brawijaya, Malang City. The gateway is placed at a height of 45 meters above ground level in a multi-storey building. Node sensors are placed at multiple locations in the campus environment. The test was carried out by observing the Success Ratio, Roundtrip Delay and RSSI. From the results of the analysis carried out, a larger Spreading Factor value and a smaller Bandwidth are suitable for transmission of distances of more than 250 meters with a high Success Ratio value. While the smaller Spreading Factor value and larger Bandwidth are suitable for use in transmission distances of less than 250 meters. A larger Tranmission Power results in better RSSI sensitivity than smaller Transmission Power. The farthest transmission distance that can be reached is 700 meters with a Success Ratio percentage of 73% with a Spreading Factor of 11. Based on the tests that have been carried out, LoRa can be implemented in urban environments with several conditions such as the use of higher Spreading Factor, lower Bandwidth and medium Transmission Power.
Implementasi Pengamanan Protokol MAVLink menggunakan Algoritma Kriptografi SIMECK Ahmad Faiz; Ari Kusyanti; Reza Andria Siregar
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 6 No 10 (2022): Oktober 2022
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

MAVLink stands for Micro Air Vehicle Link which is an unmanned system lightweight message serialization protocol. This protocol is commonly used in autopilot systems, especially ArduPilot and PX4 and provides advanced features not only for monitoring and controlling the mission of unmanned systems but also for integration into the Internet. Since the MAVLink protocol is carried over wireless channels, this makes it vulnerable. against attack-based and also the lack of support in terms of security procedures both in secrecy and the authentication mechanism is not supported natively. This causes the MAVLink protocol to be easily hacked. Therefore, to reduce the security risk, it is necessary to secure the communication protocol between the UAV to the GCS by using the SIMECK algorithm. SIMECK algorithm is a combination of encryption and decryption algorithm between SIMON algorithm and SPECK algorithm. Users can use the SIMECK cipher by considering the software and hardware needed without disturbing the performance of the security system. The purpose of the SIMECK algorithm is to provide security in data transmission and also performance flexibility to be used for developers. The implementation of the SIMECK algorithm on this system makes it resistant to passive attacks and even active attacks.
Pengamanan Protokol MAVLink menggunakan Algoritme Kriptografi Grain-128 Adam Syahputra; Ari Kusyanti; Reza Andria Siregar
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 6 No 10 (2022): Oktober 2022
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Micro Air Vehicle Link or commonly called MAVLink is a communication protocol for UAVs. A document, namely ISO 12100 and ISO 13849 summarized by (Allouch, et al., 2019) states that the MAVLink protocol is a UAV communication protocol that is vulnerable to attacks. The MAVLink protocol vulnerability is known because it does not have a security system support from the confidentiality aspect. To reduce this security risk, it is necessary to make efforts to secure the MAVLink protocol using cryptographic methods to ensure the security of the aspects mentioned above. In this study the Grain-128 cryptographic algorithm was chosen because of its ability to work on low-power devices. In addition to the implementation of the Grain-128 cryptographic algorithm, a security strategy is also implemented, one of which is the IV update system. The purpose of implementing the Grain-128 algorithm and its security strategy is to provide adequate protection for data on the MAVLink protocol. Thus the MAVLink protocol that has been implemented by the security system is resistant to passive attacks and even active attacks.
Co-Authors Abyantara, Za’da Achmad Basuki Achmadi, Adrian Adam Hendra Brata Adam Syahputra Adhitya Bhawiyuga Adhitya Bhawiyuga, Adhitya Aditya Prayudhi Ahmad Aji Santoso Ahmad Faiz Ahmad Hanif AR Ahmad Lutfi Bayu Aji Ahmad Rizal Muttaqin Aladina, Yohanna Fransiska Alldo Raafi'ilman Andi Mohammad Thareq Akbar Annisa Widuri Murti Utami Anugerah Wijaya Ardhian Rizki Ramadhani Ari Kusyanti ari kusyanti Asika Ayu Wandira Asroful Khusna Arifianto Atha, Mochamad Audi Azzura Falaq Audi Fauzan Septano Bangsa, Rehan Putra Chandra Yogi Adhitama Cut Naurah Cassrisa Daffarez Elguska Dahru Wildan Pradanaputra Danny Candra Rumantyo Dany Primanita Kartikasari Dany Primanita Kartikasari Dany Primanita Kartikasari Destyorini, Diah Ratih Donny Kurniawan Dyan Krisyanto Dzaki, Alvin Pradano Ekky Pramudito Setiawan Eko Aditya Ramadianto Eldyto Puspa Laksana Fadhlan Muhammad Fariz Andri Bakhtiar Faruqi, Ibrahim Zhilal Fauzan Pahlawan Fedro Jordie T. H. Simangunsong Fitra Firdaus Gibran Akbaromi Luhkito Haidar Harfi Hadhiansah Heru Nurwarsito Hidayatus Syafa'ah Hilkya Dwima Palembangan Hilmy Riadika I Dewa Gede Ardana Pucanganom I Gede Wahyu Sanjaya I Made Oka Semara Putra Imaduddin, Muhammad Fakhri Imam Nurhidayat Imam Utomo Iman Aidil Nugraha Indra Lesmana Putra Isnaini Isnaini Ivan Faturahman Jaliasmar, Rendy Putra Jogi Oliver Yohanes Tampubolon Julio Dimitri Fredrik Kasyful Amron Kasyful Amron Khalid Hamzah Haza Al Hamami Labib Imam Hidayat Mahardika Yuristyawan Putra Mahendra Data Maxi Luckies Ginanjar Azis Miftaqul Novandi Moh. Ahsani Taqwim Mohammad Harits Mohammad Rizky Dwisaputra Muhamad Ralfi Akbar Muhammad Alfarizi Muhammad Alif Bahari Muhammad Alvian Syahputra Muhammad Ichwan Pradana Muhammad Muhajir Kurniawan Muhammad Reza Wahyu Chrisdyan Muhammad Ryan Firmansyah Muhammad Syaifuddin FP Muhammad Taufiq Aryadi Mulyadi, Yonathan Fanuel Nur Cahyo Utomo Nurovi Andiyani Nurudin Santoso Nurul Hidayat Pramukantoro, Eko Sakti Prasetyo Eko Yulianto Primantara Hari Trisnawan Puspita Ainunnazahah Ragil Setyo Utomo Rakhmadhany Primananda Rakhmadhany Primananda, Rakhmadhany Rakhmashany Primananda Ravy Agistya Alkamaly Retno Nizma'urrahmi Rian Bayu Pambudi Risqi Nuril Aimah Rivai Fansuri Nasution Rizky Suhaimi Robbani, Dwindra Helmi Rozali Syahputra Ryan Eko Listyanto Selma Aulia Sekarrizky Siska Irawati Sutrisno, Bagasdio Tasrahmiati Istiqomah Thelemanica Wicaksana Tiara Erlinda Tommy Bona Hamonangan Sitorus Trisnawan, Primantara Hari Tsany Afif Ula Auliya Ilham Irsahnda Widhi Yahya Widhi Yahya Yanuar Alfianus Yosephan Raharjo Yosua Tito Sumbogo Yudhanto, Alif Alamsyah