Claim Missing Document
Check
Articles

Found 18 Documents
Search

Penerapan dan Pelatihan Sistem Smart Aquaculture untuk Budidaya Ikan dalam Biofloc di SEIN Farm Kota Bandung Parman Sukarno; Hilal Hudan Nuha; Novian Anggis Suwastika; Muhammad Al Makky; Dita Oktaria; Rio Guntur Utomo; Rahmat Yasirandi
Aksiologiya: Jurnal Pengabdian Kepada Masyarakat Vol 7 No 2 (2023): Mei
Publisher : Universitas Muhammadiyah Surabaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30651/aks.v7i2.11532

Abstract

Sekemala Integrated Farm (Sein Farm) merupakan bagian dari Unit Pelaksana Teknis (UPT) Pembibitan Tanaman Pangan, Hortikultura, dan Peternakan,  Dinas Ketahanan Pangan dan Pertanian (DKPP) Kota Bandung yang memiliki fungsi sebagai laboratorium umum (masyarakat) untuk kegiatan urban farming. Salah satu kegiatan urban farming adalah budidaya ikan dalam biofloc. Sein Farm memiliki biofloc sebanyak 55 unit untuk budidaya ikan tawar. Menjaga kualitas air dalam biofloc memiliki peran yang sangat krusial dalam keberhasilan budidaya ikan. Permasalahan yang dihadapi Sein Farm dalam budidaya ikan di biofloc adalah dengan keterbasan jumlah karyawan dalam kegiatan operasional sehari-hari untuk menjaga kualitas air. Integrasi teknologi Internet of Things (IoT) dan Artificial Intelligence (AI) memberikan solusi untuk otomatisasi kegiatan akuakultur termasuk untuk menjaga kualitas air, yang juga dikenal sebagai smart aquaculture. Dalam kegiatan pengabdian kepada masyarakat tim dari Fakultas Informatika Universitas Telkom membangun, menerapkan, melakukan alih teknologi, dan mengukur penerimaan solusi berbasis smart aquaculture kepada 16 pegawai operasional di Sein Farm. Dari hasil kegiatan tersebut, tujuan dari kegiatan masyarakat berhasil capai, yaitu berhasil membangun dan menerapkan smart aquaculture di Sein Farm, melakukan pelatihan untuk pengoperasian sistem, dan melakukan survey untuk penerimaan teknologi. Hasil dari survei menunjukkan 95% menjawab “setuju” dan “sangat setuju” terhadap penerapan smart aquaculture dalam membantu kegiatan operasional untuk menjaga kualitas air dalam budidaya ikan di biofloc.
Implementation of Event-Based Dynamic Authentication on MQTT Protocol Rizka Reza Pahlevi; Parman Sukarno; Bayu Erfianto
Jurnal Rekayasa Elektrika Vol 15, No 2 (2019)
Publisher : Universitas Syiah Kuala

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (734.611 KB) | DOI: 10.17529/jre.v15i2.13963

Abstract

This paper proposes an authentication mechanism on the MQ Telemetry Transport (MQTT) protocol. The exchange of data in the IoT system became an important activity. The MQTT protocol is a fast and lightweight communication protocol for IoT. One of the problems with the MQTT protocol is that there is no security mechanism in the initial setup. One security attack may occur during the client registration phase. The client registration phase has a vulnerability to accept false clients due to the absence of an authentication mechanism. An authentication mechanism has been previously made using Transport Layer Security (TLS). However, the TLS mechanism consumes more than 100 KB of data memory and is not suitable for devices that have limitations. Therefore, a suitable authentication mechanism for constraint devices is required. This paper proposes a protocol for authentication mechanisms using dynamic and event-based authentication for the MQTT protocol. The eventbased is used to reduce the computing burden of constraint devices. Dynamic usage is intended to provide different authentication properties for each session so that it can improve authentication security. As results, the applied of the event-based dynamic authentication protocol was successful in the constraint devices of  microcontrollers and broker. The microcontroller, as a client, is able to process the proposed protocol. The client uses 52% of the memory for the proposed protocol and only consumes 2% higher than the protocol without security. The broker can find authentic clients and constraint devices capable of computing to carry out mutual authentication processes to clients. The broker uses a maximum of 4.3 MB of real memory and a maximum CPU usage of 3.7%.
Secure MQTT PUF-Based Key Exchange Protocol for Smart Healthcare Rizka Reza Pahlevi; Parman Sukarno; Bayu Erfianto
Jurnal Rekayasa Elektrika Vol 17, No 2 (2021)
Publisher : Universitas Syiah Kuala

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (497.867 KB) | DOI: 10.17529/jre.v17i2.20428

Abstract

Replay and eavesdropping attacks threaten the information security that is held by smart healthcare devices. An authenticated key exchange method to provide cryptography sessions is the best way to provide information security and secure authentication. However, smart healthcare devices do not have sufficient computation to perform heavy cryptography processes due to the limitations of the embedded devices used. We propose an authenticated key exchange protocol based on a physical unclonable function (PUF). The proposed protocol aimed to countermeasure from replay and eavesdropping attacks. We designed our protocol with one handshake process and three authentication processes. We evaluated our proposed protocol using Tamarin Prover. From the results of the evaluation, our proposed protocol can exchange properties correctly between communication actors and is valid in proving each lemma in eavesdropping and replay attacks.
Access Control and File Distribution Management for Electronic Diploma and Transcript using Ethereum Smart Contract and InterPlanetary File System Muhammad Danil Muis; Muhammad Rifki Fauzan; Parman Sukarno; Aulia Arif Wardana
Jurnal Sistem Informasi Vol. 17 No. 2 (2021): Jurnal Sistem Informasi (Journal of Information System)
Publisher : Faculty of Computer Science Universitas Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (575.083 KB) | DOI: 10.21609/jsi.v17i2.1093

Abstract

This reserach build access control and file distribution management system for electronic diploma and transcript using ethereum smart contract and InterPlanetary File System (IPFS). The falsification of diplomas/transcripts is one of the problems in education. In Indonesia, falsification of diplomas/transcripts is a form of criminal act of falsifying letters. In addition, diplomas/transcripts that have not been digitalized make them easily damaged, lost, and difficult to manage. Therefore, this research developed digital diploma/transcript as digital twin from the hardcopy of diploma/tramscript. This research used IPFS to store data in a distributed system and Smart Contracts Blockchain to store and protect the digital diploma/transcript. The system also comes with access control to create and give approval for diplomas or transcripts to be published and saved into the system. Access control settings will be saved using the blockchain. This research using Quality of Service test method for measurethroughput, packet loss, and delay. Beside that, tis research also analysis the usage of Central Processing Unit and Random Access Memory from the system. Based on the test that has been done, the fake diploma/transcript detection system can be run properly by using 1 node to 5 nodes. The best throughput value during the process of making and validating the diploma/transcript is to use 1 node. The value of packet loss in the process of making and validating the certificate/transcript has a very good category. The value of delay in the process of making and validating the diploma/transcript has a very good category.
Customer satisfaction of urban farming application services: “e-Buruan Sae” Parman Sukarno; Rio Guntur Utomo; Rahmat Yasirandi; Novian Anggis Suwastika
JURNAL INFOTEL Vol 14 No 4 (2022): November 2022
Publisher : LPPM INSTITUT TEKNOLOGI TELKOM PURWOKERTO

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20895/infotel.v14i4.846

Abstract

This study evaluates the customer satisfaction model in adopting the Web 2.0-based e-Buruan Sae application. The e-Buruan Sae application is an interactive Web 2.0-based application used by the government and the people of Bandung City to manage urban farming activities. This research is quantitative correlational research and applies a research method based on Design Research Methodology (DRM). The stages of this research are the literature review stage with the output of research objectives, the initial empirical analysis stage with the outputs of the hypothesis and research model, the experimental stage for data collection, and the final empirical analysis stage with the output of the data analysis results. This study uses six variables to measure customer satisfaction: ease of use, service quality, interactivity, trust, customer satisfaction, and IT development. The results of empirical testing show that the ease of use and IT development variables do not affect the customer satisfaction variable. In contrast, the remaining variables have a positive effect on customer satisfaction. This research produces measurements to evaluate customer satisfaction on the Web 2.0-based urban farming application.
Secure MQTT PUF-Based Key Exchange Protocol for Smart Healthcare Rizka Reza Pahlevi; Parman Sukarno; Bayu Erfianto
Jurnal Rekayasa Elektrika Vol 17, No 2 (2021)
Publisher : Universitas Syiah Kuala

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.17529/jre.v17i2.20428

Abstract

Replay and eavesdropping attacks threaten the information security that is held by smart healthcare devices. An authenticated key exchange method to provide cryptography sessions is the best way to provide information security and secure authentication. However, smart healthcare devices do not have sufficient computation to perform heavy cryptography processes due to the limitations of the embedded devices used. We propose an authenticated key exchange protocol based on a physical unclonable function (PUF). The proposed protocol aimed to countermeasure from replay and eavesdropping attacks. We designed our protocol with one handshake process and three authentication processes. We evaluated our proposed protocol using Tamarin Prover. From the results of the evaluation, our proposed protocol can exchange properties correctly between communication actors and is valid in proving each lemma in eavesdropping and replay attacks.
Implementation of Event-Based Dynamic Authentication on MQTT Protocol Rizka Reza Pahlevi; Parman Sukarno; Bayu Erfianto
Jurnal Rekayasa Elektrika Vol 15, No 2 (2019)
Publisher : Universitas Syiah Kuala

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.17529/jre.v15i2.13963

Abstract

This paper proposes an authentication mechanism on the MQ Telemetry Transport (MQTT) protocol. The exchange of data in the IoT system became an important activity. The MQTT protocol is a fast and lightweight communication protocol for IoT. One of the problems with the MQTT protocol is that there is no security mechanism in the initial setup. One security attack may occur during the client registration phase. The client registration phase has a vulnerability to accept false clients due to the absence of an authentication mechanism. An authentication mechanism has been previously made using Transport Layer Security (TLS). However, the TLS mechanism consumes more than 100 KB of data memory and is not suitable for devices that have limitations. Therefore, a suitable authentication mechanism for constraint devices is required. This paper proposes a protocol for authentication mechanisms using dynamic and event-based authentication for the MQTT protocol. The eventbased is used to reduce the computing burden of constraint devices. Dynamic usage is intended to provide different authentication properties for each session so that it can improve authentication security. As results, the applied of the event-based dynamic authentication protocol was successful in the constraint devices of  microcontrollers and broker. The microcontroller, as a client, is able to process the proposed protocol. The client uses 52% of the memory for the proposed protocol and only consumes 2% higher than the protocol without security. The broker can find authentic clients and constraint devices capable of computing to carry out mutual authentication processes to clients. The broker uses a maximum of 4.3 MB of real memory and a maximum CPU usage of 3.7%.
Perancangan dan Analisis Crowdsec Sebagai Intrusion Prevention System pada Infrastruktur Server Muhammad Thariq Sunu Rendratama; Parman Sukarno; Aulia Arif Wardana
eProceedings of Engineering Vol 10, No 2 (2023): April 2023
Publisher : eProceedings of Engineering

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Abstrak-Belakangan ini perkembangan teknologi semakin membesar, industri - industri Technology Information (IT) banyak menerapkan dan membangun teknologi - teknologi baru tersebut ke dalam bisnis perusahaannya, salah satunya bisnis Financial Technology atau biasa disebut Fintech. Fintech ini merupakan sebuah industri perusahaan yang berbasis finansial atau keuangan, dimana mereka ingin memberikan layanan dalam mengelola uang kepada masyarakat agar lebih efisien dan juga mudah. Banyak dari Fintech ini memberikan layanan keuangan misalkan payment, assest management, dan juga financing [2] secara daring tersebut. Dari banyak hal Fintech tersebut maka akan semakin banyak juga kejahatan siber di internet yang mengincar perusahan tersebut, untuk itu orang - orang yang berada di dalam sektor tersebut perlu meningkatkan sistem keamanan yang sangat ekstra guna menangkal serangan - serangan yang ada. Dan salah satu cara yang paling ampuh digunakan adalah memblokir akses pengguna ke dalam sistem bagi pengguna yang dinilai bersifat membayakan, dan tool yang akan digunakan pada penelitian ini yaitu Crowdsec. Crowdsec merupakan sebuah Intrusion Detection and Prevention System (IDPS) untuk mendeteksi dan juga mencegah sistem dari ancaman siber yang ada, teknisnya adalah dia akan mem-ban atau memblokir akses pengguna melalui IP address yang dibacanya sebagai akses mencurigakan atau gagal.Kata Kunci- fintech, blockchain, cryptocurrentcy crowdsec, pengguna, sistem.