cover
Contact Name
Purwanto
Contact Email
garuda@apji.org
Phone
+6285642100292
Journal Mail Official
fatqurizki@apji.org
Editorial Address
Perum Cluster G11 Nomor 17 Jl. Plamongan Indah, Kadungwringin, Pedurungan, Semarang, Provinsi Jawa Tengah, 50195
Location
Kota semarang,
Jawa tengah
INDONESIA
International Journal of Computer Technology and Science
ISSN : 30481899     EISSN : 30481961     DOI : 10.62951
Core Subject : Science,
This Journal accepts manuscripts based on empirical research, both quantitative and qualitative. The scope of the this Journal covers the fields of Computer Technology and Science. This journal is a means of publication and a place to share research and development work in the field of technology.
Articles 5 Documents
Search results for , issue "Vol. 1 No. 3 (2024): July : International Journal of Computer Technology and Science" : 5 Documents clear
Securing Industrial IoT: Blockchain-Integrated Solutions for Enhanced Privacy, Authentication, and Efficiency Derrick Lim Kin Yeap; Jason Jong Sheng Tat; Jason Ng Yong Xing; Joan Sia Yuk Ting; Mildred Lim Pei Chin; Muhammad Faisa
International Journal of Computer Technology and Science Vol. 1 No. 3 (2024): July : International Journal of Computer Technology and Science
Publisher : Asosiasi Riset Teknik Elektro dan Infomatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62951/ijcts.v1i3.18

Abstract

The Industrial Internet of Things (IIoT) enhances the connectivity and efficiency of living lifestyles. However, it also comes with significant security vulnerabilities. Traditional authentication methods are often inadequate, leading to IIoT devices opened to security threats. This paper proposes a comprehensive security framework integrating blockchain, cryptographic techniques, smart contracts, and deep learning-based Intrusion Detection Systems (IDS) to tackle the mentioned issue. Blockchain ensures data integrity and prevents tampering through a decentralized ledger. A decentralized device identity management system enhances user verification, while secure communication protocols using Hash-based Message Authentication Codes (HMAC) safeguard data integrity. Smart contracts automate transactions, providing transparent, secure record-keeping without a central authority. The deep learning-based IDS, utilizing Contractive Sparse Autoencoder (CSAE) and Attention-Based Bidirectional Long Short-Term Memory (ABiLSTM) networks, effectively detects cyber threats. Evaluation metrics, including precision, recall, F1-score, and False Acceptance Rate (FAR), demonstrate high accuracy and low false alarm rates across datasets. This framework addresses the need for secure, efficient, and scalable authentication in IIoT, combining blockchain's security features with advanced cryptographic and anomaly detection techniques, offering robust defence against cyber threats.
Enhancing IIoT Security: AI-Driven Blockchain-Based Authentication Scheme Azreen Shafieqah Asri; Faizatul Fitri Boestamam; Harith Zakwan Bin Zakaria; Mohammad Amir Alam Rahim Omar; Mohammad Hamka Izzuddin Bin Mohamad Yahya; Muhammad Faisal
International Journal of Computer Technology and Science Vol. 1 No. 3 (2024): July : International Journal of Computer Technology and Science
Publisher : Asosiasi Riset Teknik Elektro dan Infomatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62951/ijcts.v1i3.19

Abstract

With the rapid expansion of the Industrial Internet of Things (IIoT), integrating devices, machines, and systems to optimize operations and enable data-driven decision-making, ensuring robust security measures is essential. While blockchain has shown the potential to upgrade traditional authentication methods in IIoT environments, vulnerabilities persist. This paper introduces two innovative methods to enhance blockchain-based authentication in IIoT: first, integrating AI-driven anomaly and threat detection into the blockchain authentication scheme; second, implementing Ethereum smart contracts for enhanced authentication with a two-factor authentication (2FA) system and GFE algorithms. By combining AI for anomaly detection with decentralized smart contracts and blockchain-based 2FA, and leveraging GFE algorithms to enhance blockchain capabilities, the proposed scheme aims to significantly fortify security measures. This integration offers a resilient defense against evolving threats, ensuring transparency, adaptability, and heightened security in IIoT applications.
Multi-Factor Authentication Using Blockchain: Enhancing Privacy, Security and Usability Irenna Wanisha; James, Jaymaxcklien Bravyain; Witeno, Jeremy Silas; Mohammad Bakery, Luqmanul Hakim; Samuel, Melvianna; Muhammad Faisal
International Journal of Computer Technology and Science Vol. 1 No. 3 (2024): July : International Journal of Computer Technology and Science
Publisher : Asosiasi Riset Teknik Elektro dan Infomatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62951/ijcts.v1i3.24

Abstract

In the ever-changing digital world, strong security protocols are essential. As a vital line of defence against unwanted access, blockchain uses several verification techniques to boost security. This article investigates the use of blockchain technology to tackle privacy, security, and usability issues. By reducing the dangers associated with conventional centralised systems, blockchain's decentralised and immutable structure offers a secure platform for storing and verifying authentication credentials. This method increases user trust by using smart contracts to guarantee transparent and unchangeable authentication procedures. The suggested blockchain-based method strengthens security and enhances privacy by removing sources of failure and decreasing dependence on outside verification. Furthermore, user-centric design and expedited procedures improve the system's usability by making secure authentication more approachable and less obtrusive. This paper offers a thorough examination of the suggested system, stressing its benefits, possible drawbacks, and directions for future investigation. The results indicate that blockchain technology presents a viable solution to ensure that digital authentication frameworks combine privacy, security, and usability.
Enhancing Authentication Security: Analyzing Time-Based One-Time Password Systems Asyura Binti Sofian; Ayu Fitri Alafiah Binti Peradus; Fidel Yong; Irvine Shearer; Nurrul Nazwa Binti Ismail; Yugendran A/L Mahendran; Muhammad Faisal
International Journal of Computer Technology and Science Vol. 1 No. 3 (2024): July : International Journal of Computer Technology and Science
Publisher : Asosiasi Riset Teknik Elektro dan Infomatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62951/ijcts.v1i3.25

Abstract

This paper explores the Time-Based One-Time Password (TOTP) authentication mechanism enhanced with lightweight cryptographic algorithms, presenting it as an advanced solution to the limitations of traditional OTP systems. There are a lot of applications and systems where this mechanism is applied. For example, bank applications, e-commerce websites, access control system, healthcare system, etc. TOTP generates dynamic, time-sensitive passwords using the current time and a secret key processed through a cryptographic hash function, significantly improving security by reducing vulnerabilities to code reused and interception. The adoption of lightweight algorithms ensures that TOTP can be efficiently implemented on resource-constrained devices, such as those on the Internet of Things (IoT) ecosystem. Despite its benefits, TOTP faces challenges including synchronization issues between client devices and servers, and a trade-off between computational efficiency and security strength. This paper discusses the implications of these challenges and evaluates how TOTP, with appropriate design considerations, can provide a robust, secure, and efficient authentication method suitable for various applications, from digital banking to IoT environments.
Advancements in Multi-Factor Authentication: A Quantum-Resilient and Federated Approach for Enhanced Security Nur Syahrina Binti Juni; Grasila Huney Wan; Siti Aisyah Nabilah Binti Banchi; Estella Blessings; Venetha A/P Loganathan; Muhammad Faisal
International Journal of Computer Technology and Science Vol. 1 No. 3 (2024): July : International Journal of Computer Technology and Science
Publisher : Asosiasi Riset Teknik Elektro dan Infomatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62951/ijcts.v1i3.26

Abstract

The Internet of Things (IoT) phenomenon is centered around linking various devices and objects to the Internet, enabling them to communicate, collect, and exchange data [1]. The IoT needs strong, lightweight, and secure authorization schemes to regulate many devices with varying levels of ability. Quantum-resilient federated Multi-Factor Authentication (QRF-MFA) is a solution presented in this paper to address the above-discussed issues. Featuring quantum-resistant cryptographic protocols, high-speed and low-energy Physically Unclonable Functions (PUFs), decentralized identity management, and optimized communication protocols, QRF-MFA provides a complete solution for secure cross-domain device identification and authentication. This is done by leveraging blockchain technology for immutable and transparent management of identities yet limiting on-chain storage overhead. It also provides secure, lightweight communication well-suited for resource constrained IIoT devices, and it is designed for fog and edge computing environments as well. QRF-MFA eliminates the challenges of current methods by combining security, efficiency, and scalability and delivering a resilient and future-ready solution to secure IIoT authentication.  

Page 1 of 1 | Total Record : 5