Claim Missing Document
Check
Articles

Found 9 Documents
Search

END TO END ENKRIPSI MENGGUNAKAN ADVANCED ENCRYPTION STANDARD PADA PERANGKAT INTERNET OF THINGS Noprianto, Noprianto; Wijayaningrum, Vivi Nur
Jurnal Sistem Informasi dan Bisnis Cerdas Vol 14, No 2 (2021): JURNAL SISTEM INFORMASI DAN BISNIS CERDAS (SIBC) AGUSTUS 2021
Publisher : Program Studi Sistem Informasi, Fakultas Ilmu Komputer, UPN "Veteran" Jawa Timur

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33005/sibc.v14i2.2734

Abstract

Penerapan teknologi Internet of Things (IoT) di berbagai bidang di dalam kehidupan sehari-hari menyebabkan diperlukannya sebuah teknik pengamanan data untuk mencegah terjadinya tindak kejahatan yang dapat merugikan pengguna. Penggunaan algoritma kriptografi Advanced Encryption Standard (AES) dapat dimanfaatkan untuk mengamankan data yang tersimpan pada perangkat IoT sehingga data tersebut tetap dalam keadaan aman pada saat proses pengiriman dilakukan dengan perangkat IoT lainnya. Penerapan AES dilakukan pada sistem IoT dengan menguji mekanisme monitoring dan controlling untuk memastikan keamanan data. Hasil pengujian menunjukkan bahwa penggunaan AES mode Cipher Block Chaining (CBC) dapat memberikan pengamanan data saat melakukan proses pengiriman data dari perangkat IoT sampai dengan aplikasi dashboard monitoring.  DOI : https://doi.org/10.33005/sibc.v14i2.2734
DESAIN SISTEM SMART ATTENDANCE MENGGUNAKAN KOMBINASI SMART CARD DAN SIDIK JARI Ahmadi Yuli Ananta; N Noprianto; Vivi Nur Wijayaningrum
Sistemasi: Jurnal Sistem Informasi Vol 9, No 3 (2020): Sistemasi: Jurnal Sistem Informasi
Publisher : Program Studi Sistem Informasi Fakultas Teknik dan Ilmu Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (723.269 KB) | DOI: 10.32520/stmsi.v9i3.874

Abstract

ABSTRACTMonitoring student attendance during class hours required by each university due to the presence of the students proved to have a positive correlation with the performance of students during their studies. Most universities still use conventional techniques to record student attendance during teaching and learning in the classroom. Conventional techniques are inefficient and ineffective because they tend to spend a lot of time to record attendance and fraud appeared in the form of false presence. In this study a system that combines smart card and fingerprint technology is proposed to reduce fraud during the process of recording attendance in class, as well as making it easier for academics to manage attendance data. This system consists of card personalization applications, card reading applications, and attendance monitoring applications. The test results show that all three applications in this system give the expected results. In addition, the system is proven to be able to reduce frauds that occur in the classroom because there are two validation processes at the time of recording attendance namely smart card and fingerprint validation. With fingerprint validation, students cannot commit fraud because fingerprints are difficult to be manipulated or duplicated.Keywords: attendance, fraud,identification, illegal attendance , near field communicationABSTRAKPemantauan kehadiran mahasiswa selama jam perkuliahan di kelas sangat perlu dilakukan oleh setiap perguruan tinggi karena kehadiran mahasiswa terbukti mempunyai korelasi positif terhadap kinerja mahasiswa tersebut selama masa studinya. Sebagian besar perguruan tinggi masih menggunakan teknik konvensional untuk mencatat kehadiran mahasiswa selama proses belajar mengajar di kelas. Teknik konvensional tersebut tidak efisien dan tidak efektif karena cenderung menghabiskan banyak waktu untuk pencatatan kehadiran dan muncul tindak kecurangan berupa kehadiran palsu. Penelitian ini mengusulkan sebuah sistem yang mengombinasikan teknologi smart card dan sidik jari untuk mengurangi tindakan kecurangan pada saat proses pencatatan kehadiran di kelas, serta memudahkan pihak akademik untuk mengelola data kehadiran. Sistem ini terdiri dari aplikasi personalisasi kartu, aplikasi pembacaan kartu, dan aplikasi monitoring kehadiran. Hasil pengujian menunjukkan bahwa ketiga aplikasi di dalam sistem ini memberikan hasil sesuai yang diharapkan. Selain itu, sistem terbukti dapat mengurangi tindakan kecurangan yang terjadi di dalam kelas karena adanya dua kali proses validasi pada saat pencatatan kehadiran yaitu validasi smart card dan sidik jari. Dengan adanya validasi sidik jari, mahasiswa tidak dapat melakukan titip absen karena sidik jari sulit untuk dimanipulasi atau diduplikasi.Kata Kunci: kehadiran, kecurangan, identifikasi, titip absen, near field communication
Pemanfaatan AES dengan Key Dinamis sebagai Metode Pengamanan Data pada Smart Card Noprianto Noprianto; Vivi Nur Wijayaningrum; Rudy Ariyanto
Sistemasi: Jurnal Sistem Informasi Vol 10, No 3 (2021): Sistemasi: Jurnal Sistem Informasi
Publisher : Program Studi Sistem Informasi Fakultas Teknik dan Ilmu Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (514.538 KB) | DOI: 10.32520/stmsi.v10i3.1413

Abstract

AbstrakTerjadinya pandemi Covid-19 di hampir seluruh belahan dunia, termasuk Indonesia, menjadikan masyarakat mempunyai gaya hidup baru dalam bertransaksi untuk mencegah penularan virus sesuai anjuran Pemerintah. Semua transaksi cenderung dilakukan secara non tunai dengan memanfaatkan teknologi smart card untuk menghindari adanya kontak fisik dengan orang lain. Tingginya penggunaan smart card pada berbagai bidang untuk mendukung aktivitas sehari-hari menyebabkan rawannya terjadi pencurian data di dalam smart card oleh pihak yang tidak bertanggung jawab. AES sebagai algoritma kriptografi dapat digunakan untuk mengamankan data di dalam smart card dengan melakukan enkripsi data sebelum data yang bersifat rahasia tersebut disimpan ke dalam smart card. Untuk meningkatkan keamanan data, diusulkan sebuah mekanisme penggunaan key yang bersifat dinamis dengan memanfaatkan Unique Identifier (UID) setiap smart card. Dengan demikian, key yang digunakan untuk melakukan enkripsi dan dekripsi data dibentuk berdasarkan UID dan berbeda-beda untuk setiap smart card. Hasil pengujian menunjukkan bahwa penggunaan AES dengan key yang bersifat dinamis ini mampu mengamankan data 40 byte plainteks menjadi 48 byte cipherteks, dengan rata-rata waktu komputasi sebesar 71.2 ms untuk penulisan data dan 89.4 ms untuk pembacaan data menggunakan key 128 bit, 70.8 ms untuk penulisan data dan 88 ms untuk pembacaan data menggunakan key 192 bit, dan 72 ms untuk penulisan data dan 88.4 ms untuk pembacaan data menggunakan key 256 bit. Waktu komputasi ini hanya mempunyai selisih sekitar 2 ms dibandingkan dengan penulisan dan pembacaan data tanpa mekanisme enkripsi dan dekripsi.Kata kunci: covid-19, dekripsi, enkripsi, keamanan, kriptografi AbstractThe occurrence of the Covid-19 pandemic in almost all parts of the world, including Indonesia, has made people have a new lifestyle in transactions to prevent transmission of the virus as recommended by the Government. All transactions tend to be carried out in non-cash using smart card technology to avoid physical contact with other people. The high use of smart cards in various fields to support daily activities makes it prone to data theft on the smart card by irresponsible parties. AES as a cryptographic algorithm can be used to secure data on the smart card by encrypting the data before the confidential data is stored on the smart card. To improve data security, a dynamic key usage mechanism is proposed by utilizing the Unique Identifier (UID) of each smart card. Thus, the key used to encrypt and decrypt data is formed based on the UID and is different for each smart card. The test results show that the use of AES with a dynamic key is able to secure 40 bytes of plaintext to 48 bytes of ciphertext, with an average computation time of 71.2 ms for writing data and 89.4 ms for reading data using 128-bit keys, 70.8 ms for writing data and 88 ms for reading data using a 192-bit key, and 72 ms for writing data and 88.4 ms for reading data using a 256-bit key. This computation time only has a difference of about 2 ms compared to writing and reading data without encryption and decryption mechanisms.Keywords: covid-19, decryption, encryption, security, cryptography  dan pembacaan data tanpa mekanisme enkripsi dan dekripsi.
Development of smart parking system using internet of things concept Dwi Puspitasari; Noprianto Noprianto; Muhammad Afif Hendrawan; Rosa Andrie Asmara
Indonesian Journal of Electrical Engineering and Computer Science Vol 24, No 1: October 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v24.i1.pp611-620

Abstract

The growing number of vehicles in developing countries causes a slew of issues, including the parking system.The current parking system is mostly manual, requires human intervention as a security system, and does not provide information about available parking areas.Their problems cause nonoptimal parking management. Furthermore, it can lead to income loss and criminal acts. This study addresses one of the possible solutions by using the internet of things (IoT) concept. The parking system is built by utilizing a smart card, machine-to-machine (M2M) communication, and cloud monitoring. As a result, the smart parking system prototype has been provided. The parking system business process can be done automatically, and it provides a more secure parking security system. The proposed parking system architecture also provides a practical system. The system only took around 1 second to perform the data transmission between nodes.
BEL RUMAH MENGGUNAKAN SENSOR ULTRASONIK DENGAN NOTIFIKASI BOT TELEGRAM Khoirul R; Fransiska L.K; Alfin E.A; Noprianto Noprianto
Jurnal Sistem Informasi dan Bisnis Cerdas Vol 16 No 1 (2023): Februari 2023
Publisher : Program Studi Sistem Informasi, Fakultas Ilmu Komputer, UPN Veteran Jawa Timur

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33005/sibc.v16i1.15

Abstract

Bel rumah merupakan sebuah perangkat yang berfungsi sebagai pemberitahuan kepada pemilik rumah bahwa ada orang yang berada di depan pintu. Akan tetapi, bel rumah konvensional kurang efektif karena terbatasnya jangkauan suara yang dihasilkan oleh bel. Dengan permasalahan tersebut penulis memiliki solusi dengan menggunakan sensor ultrasonik yang dapat mengirimkan notifikasi menggunakan bot telegram. Penggunaan sensor ultrasonik dapat menjadi alternatif pengganti saklar bel. Untuk menyambungkan ke dashboard dan ke bot telegram dapat menggunakan aplikasi Node Red.
Traffic Density Prediction using IoT-based Double Exponential Smoothing Rosa Andrie Asmara; Noprianto Noprianto; Muhammad Ainur Ilmy; Kohei Arai
Knowledge Engineering and Data Science Vol 5, No 2 (2022)
Publisher : Universitas Negeri Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.17977/um018v5i22022p168-178

Abstract

The number of vehicles and currents that tend to increase causes traffic density. A system is proposed to calculate the number of vehicles and predict real-time traffic density. This research uses Haar Cascade to detect the number of cars and motorcycles and the Double Exponential Smoothing (DES) for forecasting the number of vehicles on the road. MAPE describes forecasting accuracy as a base for selecting the best smoothing constant (Alpha). The best test results from June 13 to 20, 2020, are cars on June 14, 2020 (alpha 0.5, MAPE 0%) and Motorcylecycles on June 18, 2020 (alpha 0.5, MAPE 0.1134% ). The most significant MAPE results of the car were on June 15, 2020, with alpha 0.5 and MAPE 2.1073%. The 3 minutes haar cascade detects 72.58% of cars and 81.90% of motorcycles.
Smart card security mechanism with dynamic key N Noprianto; Vivi Nur Wijayaningrum
JURNAL INFOTEL Vol 13 No 4 (2021): November 2021
Publisher : LPPM INSTITUT TEKNOLOGI TELKOM PURWOKERTO

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20895/infotel.v13i4.652

Abstract

As a currently popular technology, the use of smart cards continues to increase in various fields and the rapid development of technology. Therefore, data security stored on a smart card needs to focus on avoiding misuse of data by unauthorized parties. However, it is not enough for the security mechanism to be carried out only during the communication process of sending data. Then, the mechanism for securing data on the smart card also needs to be done. In this study, a data security technique using dynamic keys is proposed by changing the key and access conditions on the smart card according to predetermined rules. Dynamic keys are a new mechanism proposed to authenticate smart cards using a different key on each card. This technique ensures that the keys used to access each smart card are different so that the risk of data duplication and modification threats can be minimized. In addition, this mechanism is a low-cost security privacy protection. The test results show that the data security technique using dynamic keys ensures that read and write access to the smart card can only be done if the keys match the rules.
Perancangan Indoor Position System Berbasis Internet of Things dan Support Vector Machine Noprianto Noprianto; Thirsya Widya Sulaiman; Ahmad Rafif Alaudin; Raka Bagas Fitriansyah
Jurnal Teknik Informatika dan Sistem Informasi Vol 10 No 1 (2024): JuTISI
Publisher : Maranatha University Press

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28932/jutisi.v10i1.7277

Abstract

Currently, the utilization of position tracking technology has extended to various aspects, primarily harnessing the Global Positioning System (GPS). However, a significant limitation arises in the accuracy of GPS when employed within indoor environments. In response to this challenge, the concept of the Indoor Positioning System (IPS) has been introduced and developed. IPS enables the tracking of positions within buildings and offers not only improved accuracy but also enhanced security, safety, and greater efficiency. The research described in this context aims to formulate solutions for tracking and identifying locations within indoor spaces, with a specific focus on the 7th floor of a civil building. The approach employed involves the implementation of access point infrastructure strategically placed within each room. The dataset utilized to support the analysis consists of 80 location points within these indoor spaces, meticulously divided into 40 points for the LIG2 room, 40 points for the LPY4 room, and the connecting corridor area. In the pursuit of achieving this objective, the study adopts the Support Vector Machine (SVM) method. Through the utilization of this technique, the SVM model is instructed utilizing Received Signal Strength Indicator (RSSI) data from microcontrollers. Through a series of trials and evaluations, the SVM method applied in this research has yielded promising outcomes. The accuracy rate reaches 79%, signifying that the proposed system is capable of accurately predicting locations based on the collected data.
Analysis of LoRa with LoRaWAN Technology Indoors in Polytechnic of Malang Environment Noprianto Noprianto; Habibie Ed Dien; M. Hasyim Ratsanjani; Muhammad Afif Hendrawan
Sistemasi: Jurnal Sistem Informasi Vol 13, No 2 (2024): Sistemasi: Jurnal Sistem Informasi
Publisher : Program Studi Sistem Informasi Fakultas Teknik dan Ilmu Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32520/stmsi.v13i2.3884

Abstract

Technology is one of the fields heavily influenced by rapid developments, undergoing significant changes each year. One of the technologies affected is data transmission. Data transmission faces its own challenges, and each region encounters different constraints in their connections, such as the distance of data delivery. In this regard, expanding the data delivery range is crucial to optimize connections and system performance. The use of LoRaWAN for sensor monitoring in IoT devices is designed to transmit data over a wide area with low power consumption and long-term usability, thus overcoming these issues. Data collection in this study utilizes the technique of measuring RSSI (Received Signal Strength Indicator), SNR (Signal-to-Noise Ratio), and LoRa's time interval, considering distance and location parameters at Politeknik Negeri Malang and its surrounding areas. Locations chosen include each floor of the Civil Engineering building to obtain data parameters like RSSI, SNR, and time intervals, which improve when the distance between the transmitting LoRa node and the LoRa gateway gets closer. After conducting tests, it was found that using a 35 dBi antenna outperforms a 10 dBi antenna in data transmission. This was evidenced by the RSSI values approaching 0 from floor 8 to 1 in the Civil Engineering building of Politeknik Negeri Malang. Additionally, the use of a 35 dBi antenna resulted in a 50% faster data transmission compared to the 10 dBi antenna. LoRaWAN technology, particularly The Things Network, can be employed to manage LoRa. However, similar technologies like Chripstack can also be used to manage LoRaWAN more flexibly on the local network