Claim Missing Document
Check
Articles

Found 3 Documents
Search

Exploring IoT Applications for Transforming University Education: Smart Classrooms, Student Engagement, and Innovations in Teacher and Student-focused Technologies Ţălu, Mircea
Buletin Ilmiah Sarjana Teknik Elektro Vol. 7 No. 1 (2025): March
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/biste.v7i1.12361

Abstract

This review examines the integration of smart management systems in universities through the Internet of Things (IoT), emphasizing its transformative potential to enhance administrative efficiency, improve student engagement, and address critical challenges such as data security and ethical concerns. Using a structured review methodology, we analyzed studies focused on IoT-driven innovations in areas such as energy management, personalized learning environments, and attendance systems. Insights from global case studies, including detailed examples from The Technical University of Cluj-Napoca, Romania, were synthesized to explore the generalizability and applicability of these solutions across diverse institutional contexts. The review followed a systematic approach, selecting studies from reputable academic databases and adhering to predefined criteria for examining IoT integration within university environments. While the findings highlight the significant benefits of IoT for educational management and teaching practices, challenges such as data privacy, system interoperability, and cost barriers remain critical considerations. This comprehensive review aims to guide future research and support the practical implementation of IoT solutions in higher education.
DNA-based Cryptography for Internet of Things Security: Concepts, Methods, Applications, and Emerging Trends Ţălu, Mircea
Buletin Ilmiah Sarjana Teknik Elektro Vol. 7 No. 2 (2025): June
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/biste.v7i2.12942

Abstract

DNA-based cryptography is an emerging field that combines molecular biology and computational security to develop novel encryption, secure data storage, and steganographic techniques. It offers a promising alternative to traditional cryptographic systems, addressing challenges like storage efficiency, robustness, and resistance to computational attacks. In the era of the Internet of Things (IoT), where massive networks of interconnected devices continuously generate and exchange sensitive data, ensuring secure communication and storage has become a critical challenge. DNA-based cryptography presents a unique opportunity to enhance IoT security by offering ultra-secure encryption methods that exploit DNA’s vast information density and inherent randomness. These encryption methods leverage the complexity of DNA encoding - such as nucleotide substitution, DNA strand pairing, and biological operations like splicing and amplification - to create security layers that are difficult to decipher using conventional computational techniques. Recent advancements in DNA synthesis, sequencing, and encoding methodologies have facilitated the development of encryption schemes tailored for IoT applications, enabling lightweight, high-capacity security solutions that outperform traditional cryptographic methods. Beyond IoT, DNA-based cryptography also holds potential in areas such as secure biomedical data storage, digital rights management, and archival of sensitive governmental or historical information, demonstrating its broader applicability across diverse domains. Future research should optimize DNA encoding, improve storage technologies, and harness artificial intelligence for real-time threat detection, automated encryption, and adaptive security in IoT systems. This review analyzes DNA-based cryptographic methods, including natural and pseudo-DNA encryption, DNA-based steganography, and hybrid models, while uniquely exploring their IoT applications, emerging trends, practical implementations, key advantages, challenges, and future research directions.
DDoS Mitigation in Kubernetes: A Review of ExtendedBerkeley Packet Filtering and eXpress Data Path Technologies Ţălu, Mircea
JUTI: Jurnal Ilmiah Teknologi Informasi Vol.23, No.2, July 2025
Publisher : Department of Informatics, Institut Teknologi Sepuluh Nopember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12962/j24068535.v23i2.a1268

Abstract

Kubernetes, as a widely adopted container orchestration platform, is increasingly targeted by sophisticated cyber threats, including Distributed Denial of Service (DDoS) attacks, which can severely compromise the stability, availability, and operational integrity of Kubernetes clusters by overwhelming the cluster’s control plane, disrupting pod scheduling, or saturating network resources. Emerging Linux kernel technologies, such as the Extended Berkeley Packet Filter (eBPF) and eXpress Data Path (XDP), offer innovative and efficient solutions to mitigate these challenges by enabling high-performance packet filtering, real-time traffic monitoring, and advanced intrusion detection directly within the kernel. These capabilities help reduce latency, enhance resource efficiency, and strengthen the security posture of modern cloud-native environments. This review explores advancements in network security by examining the integration of eBPF and XDP for defending Kubernetes environments against DDoS attacks. By analyzing existing studies and identifying their limitations, this review highlights the potential of these technologies to establish efficient, scalable, and adaptive mitigation frameworks. The insights gained from this research can guide the development of robust security policies tailored for modern containerized infrastructures.