cover
Contact Name
Yuliah Qotimah
Contact Email
yuliah@lppm.itb.ac.id
Phone
+622286010080
Journal Mail Official
jictra@lppm.itb.ac.id
Editorial Address
LPPM - ITB Center for Research and Community Services (CRCS) Building Floor 6th Jl. Ganesha No. 10 Bandung 40132, Indonesia Telp. +62-22-86010080 Fax. +62-22-86010051
Location
Kota bandung,
Jawa barat
INDONESIA
Journal of ICT Research and Applications
ISSN : 23375787     EISSN : 23385499     DOI : https://doi.org/10.5614/itbj.ict.res.appl.
Core Subject : Science,
Journal of ICT Research and Applications welcomes full research articles in the area of Information and Communication Technology from the following subject areas: Information Theory, Signal Processing, Electronics, Computer Network, Telecommunication, Wireless & Mobile Computing, Internet Technology, Multimedia, Software Engineering, Computer Science, Information System and Knowledge Management.
Articles 302 Documents
ACAFD: Secure and Scalable Access Control with Assured File Deletion for Outsourced Data in Cloud Sudha Senthilkumar; Madhu Viswanatham
Journal of ICT Research and Applications Vol. 8 No. 1 (2014)
Publisher : LPPM ITB

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.5614/itbj.ict.res.appl.2014.8.1.2

Abstract

Cloud storage has emerged as a popular paradigm to outsource data to third party and share it with the collaborators. While this new paradigm enables users to outsource their sensitive data and reduces data management costs, it brings forth the new challenges to the user to keep their data secure. Data storage security and access control in the cloud is one of the challenging ongoing research works to alleviate the data leakage problem from unauthorized users. Existing solutions that use pure cryptographic techniques suffers from heavy computation work with respect to key management and key distribution.  Attribute based encryption is an alternative solution that map the user access structure with the data file attributes to control the data access. However any of the existing schemes doesn't address the access control with assured deletion of the files upon revocation of user access. This article addresses this open issue using a trusted authority that manages the access control list and takes care of key management and key distribution and file deletion upon user revocation. The prototype of model has been presented and analyzed the security features over existing scheme.
Regressive Prediction Approach to Vertical Handover in Fourth Generation Wireless Networks Abubakar M. Miyim; Mahamod Ismail; Rosdiadee Nordin; M. Taha Ismail
Journal of ICT Research and Applications Vol. 8 No. 1 (2014)
Publisher : LPPM ITB

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.5614/itbj.ict.res.appl.2014.8.1.3

Abstract

The over increasing demand for deployment of wireless access networks has made wireless mobile devices to face so many challenges in choosing the best suitable network from a set of available access networks. Some of the weighty issues in 4G wireless networks are fastness and seamlessness in handover process. This paper therefore, proposes a handover technique based on movement prediction in wireless mobile (WiMAX and LTE-A) environment. The technique enables the system to predict signal quality between the UE and Radio Base Stations (RBS)/Access Points (APs) in two different networks. Prediction is achieved by employing the Markov Decision Process Model (MDPM) where the movement of the UE is dynamically estimated and averaged to keep track of the signal strength of mobile users. With the help of the prediction, layer-3 handover activities are able to occur prior to layer-2 handover, and therefore, total handover latency can be reduced. The performances of various handover approaches influenced by different metrics (mobility velocities) were evaluated. The results presented demonstrate good accuracy the proposed method was able to achieve in predicting the next signal level by reducing the total handover latency.
Performance Analysis of Genetic Zone Routing Protocol Combined With Vertical Handover Algorithm for 3G-WiFi Offload Setiyo Budiyanto; Muhammad Asvial; Dadang Gunawan
Journal of ICT Research and Applications Vol. 8 No. 1 (2014)
Publisher : LPPM ITB

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.5614/itbj.ict.res.appl.2014.8.1.4

Abstract

In the deployment scenario of multiple base stations there is usually a deficiency in the routing protocols for load balancing in the wireless network. In this study, we propose a routing algorithm that can be implemented inMobile Adhoc Networks (MANETs) as well as third-generation (3G)"“Wireless Fidelity (WiFi) offload networks. We combined the Genetic Zone Routing Protocol (GZRP) with the Vertical Handover (VHO) algorithm in a 3G"“WiFioffload network with multiple base stations. Simulationresults show thatthe proposed algorithm yields improvement in the received signal strength(which is increased up to 25 dBm), user throughput (which is approximately 1 Mbps-2.5 Mbps), and data rate (which is increased up to 2.5 Mbps).
CINR Performance of Downlink Mobile WiMAX IEEE 802.16e Deployed Using Coexistence Cellular Terrestrial and HAPS I. Iskandar; Andi Wahyudi
Journal of ICT Research and Applications Vol. 8 No. 1 (2014)
Publisher : LPPM ITB

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.5614/itbj.ict.res.appl.2014.8.1.5

Abstract

Deploying WiMAX through High Altitude Platform Station (HAPS) system is a new means of wireless delivery method and thus attracting much the attention in a telecommunication society. However delivering WiMAX through the terrestrial network has already been started a few years ago. Therefore, we need to look at the scenario of coexistence system both of HAPS and terrestrial in delivering WiMAX services. This paper evaluates the performance of coexistence system between cellular HAPS and terrestrial for the downlink scenario when they are transmitting WiMAX mobile 802.16e services. Our evaluation is based on the performance simulation of coexistence model using two methods. First method is a footprint exchange between the two systems.The second method is a combination of footprint exchange and HAPS footprint enhancement. The proposed methodsare then evaluated by computer simulation in terms of carrier to interference plus noise ratio (CINR) performance. In general, both methods resulting performance enhancement in CINR quality compared with coexistence deployment with normal scenario of the cell configuration used by HAPS and terrestrial. The method of combining footprint exchange and HAPS footprint enhancement is able to improve CINR more than 10 dB compared with the normal footprint configuration for all users location inside the coverage.
Modeling Marine Electromagnetic Survey with Radial Basis Function Networks Agus Arif; Vijanth S. Asirvadam; M.N. Karsiti
Journal of ICT Research and Applications Vol. 5 No. 2 (2011)
Publisher : LPPM ITB

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.5614/itbj.ict.2011.5.2.5

Abstract

A marine electromagnetic survey is an engineering endeavour to discover the location and dimension of a hydrocarbon layer under an ocean floor. In this kind of survey, an array of electric and magnetic receivers are located on the sea floor and record the scattered, refracted and reflected electromagnetic wave, which has been transmitted by an electric dipole antenna towed by a vessel. The data recorded in receivers must be processed and further analysed to estimate the hydrocarbon location and dimension. To conduct those analyses successfuly, a radial basis function (RBF) network could be employed to become a forward model of the input-output relationship of the data from a marine electromagnetic survey. This type of neural networks is working based on distances between its inputs and predetermined centres of some basis functions. A previous research had been conducted to model the same marine electromagnetic survey using another type of neural networks, which is a multi layer perceptron (MLP) network. By comparing their validation and training performances (mean-squared errors and correlation coefficients), it is concluded that, in this case, the MLP network is comparatively better than the RBF network[1].[1] This manuscript is an extended version of our previous paper, entitled Radial Basis Function Networks for Modeling Marine Electromagnetic Survey, which had been presented on 2011 International Conference on Electrical Engineering and Informatics, 17-19 July 2011, Bandung, Indonesia.
Design of Chebychev’s Low Pass Filters Using Nonuniform Transmission Lines Said Attamimi; Mudrik Alaydrus
Journal of ICT Research and Applications Vol. 9 No. 3 (2015)
Publisher : LPPM ITB

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.5614/itbj.ict.res.appl.2015.9.3.1

Abstract

Transmission lines are utilized in many applications to convey energy as well as information. Nonuniform transmission lines (NTLs) are obtained through variation of the characteristic quantities along the axial direction. Such NTLs can be used to design network elements, like matching circuits, delay equalizers, filters, VLSI interconnections, etc. In this work, NTLs were analyzed with a numerical method based on the implementation of method of moment. In order to approximate the voltage and current distribution along the transmission line, a sum of basis functions with unknown amplitudes was introduced. As basis function, a constant function was used. In this work, we observed several cases such as lossless and lossy uniform transmission lines with matching and arbitrary load. These cases verified the algorithm developed in this work. The second example consists of nonuniform transmission lines in the form of abruptly changing transmission lines. This structure was used to design a Chebychev’s low pass filter. The calculated reflection and transmission factors of the filters showed some coincidences with the measurements.
DIDS Using Cooperative Agents Based on Ant Colony Clustering Muhammad Nur Kholish Abdurrazaq; Bambang Riyanto Trilaksono; Budi Rahardjo
Journal of ICT Research and Applications Vol. 8 No. 3 (2015)
Publisher : LPPM ITB

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.5614/itbj.ict.res.appl.2015.8.3.3

Abstract

Intrusion detection systems (IDS) play an important role in information security. Two major problems in the development of IDSs are the computational aspect and the architectural aspect. The computational or algorithmic problems include lacking ability of novel-attack detection and computation overload caused by large data traffic. The architectural problems are related to the communication between components of detection, including difficulties to overcome distributed and coordinated attacks because of the need of large amounts of distributed information and synchronization between detection components. This paper proposes a multi-agent architecture for a distributed intrusion detection system (DIDS) based on ant-colony clustering (ACC), for recognizing new and coordinated attacks, handling large data traffic, synchronization, co-operation between components without the presence of centralized computation, and good detection performance in real-time with immediate alarm notification. Feature selection based on principal component analysis (PCA) is used for dimensional reduction of NSL-KDD. Initial features are transformed to new features in smaller dimensions, where probing attacks (Ra-Probe) have a characteristic sign in their average value that is different from that of normal activity. Selection is based on the characteristics of these factors, resulting in a two-dimensional subset of the 75% data reduction.
Improving Intrusion Detection System Based on Snort Rules for Network Probe Attacks Detection with Association Rules Technique of Data Mining Nattawat Khamphakdee; Nunnapus Benjamas; Saiyan Saiyod
Journal of ICT Research and Applications Vol. 8 No. 3 (2015)
Publisher : LPPM ITB

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.5614/itbj.ict.res.appl.2015.8.3.4

Abstract

The intrusion detection system (IDS) is an important network security tool for securing computer and network systems. It is able to detect and monitor network traffic data. Snort IDS is an open-source network security tool. It can search and match rules with network traffic data in order to detect attacks, and generate an alert. However, the Snort IDS  can detect only known attacks. Therefore, we have proposed a procedure for improving Snort IDS rules, based on the association rules data mining technique for detection of network probe attacks.  We employed the MIT-DARPA 1999 data set for the experimental evaluation. Since behavior pattern traffic data are both normal and abnormal, the abnormal behavior data is detected by way of the Snort IDS. The experimental results showed that the proposed Snort IDS rules, based on data mining detection of network probe attacks, proved more efficient than the original Snort IDS rules, as well as icmp.rules and icmp-info.rules of Snort IDS.  The suitable parameters for the proposed Snort IDS rules are defined as follows: Min_sup set to 10%, and Min_conf set to 100%, and through the application of eight variable attributes. As more suitable parameters are applied, higher accuracy is achieved.
Fuzzy MADM Approach for Rating of Process-Based Fraud Solichul Huda; Riyanarto Sarno; Tohari Ahmad
Journal of ICT Research and Applications Vol. 9 No. 2 (2015)
Publisher : LPPM ITB

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.5614/itbj.ict.res.appl.2015.9.2.1

Abstract

Process-Based Fraud (PBF) is fraud enabled by process deviations that occur in business processes. Several studies have proposed PBF detection methods; however, false decisions are still often made because of cases with low deviation. Low deviation is caused by ambiguity in determining fraud attribute values and low frequency of occurrence. This paper proposes a method of detecting PBF with low deviation in order to correctly detect fraudulent cases. Firstly, the fraudulence attributes are established, then a fuzzy approach is utilized to weigh the importance of the fraud attributes. Further, multi-attribute decision making (MADM) is employed to obtain a PBF rating according to attribute values and attribute importance weights. Finally, a decision is made whether the deviation is fraudulent or not, based on the PBF rating. Experimental validation showed that the accuracy and false discovery rate of the method were 0.92 and 0.33, respectively.
A HOS-Based Blind Spectrum Sensing in Noise Uncertainty Agus Subekti; Sugihartono Sugihartono; Nana Rachmana Syambas; Andriyan Bayu Suksmono
Journal of ICT Research and Applications Vol. 9 No. 1 (2015)
Publisher : LPPM ITB

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.5614/itbj.ict.res.appl.2015.9.1.2

Abstract

Spectrum sensing for cognitive radio is a challenging task since it has to be able to detect the primary signal at a low signal to noise ratio (SNR). At a low SNR, the variance of noise fluctuates due to noise uncertainty. Detection of the primary signal will be difficult especially for blind spectrum sensing methods that rely on the variance of noise for their threshold setting, such as energy detection. Instead of using the energy difference, we propose a spectrum sensing method based on the distribution difference. When the channel is occupied, the distribution of the received signal, which propagates under a wireless fading channel, will have a non-Gaussian distribution. This will be different from the  Gaussian noise when the channel is vacant. Kurtosis, a higher order statistic (HOS) of  the  4th order,  is used as normality test for the test statistic. We measured the detection rate of the proposed method by performing a simulation of the detection process. Our proposed method's performance proved superior in detecting a real digital TV signal in noise uncertainty.