3 research outputs found

    TLS-VaD: A New Tool for Developing Centralized Link-Scheduling Algorithms on the IEEE802.15.4e TSCH Network

    No full text
    A simulator plays an important role in network protocol research, as it enables researchers to develop protocols more flexibly. Many simulators have been developed to support research in this field, including NS-2, NS-3, OPNET, OMNeT, and Cooja. Although, as a research support tools, NS3 and Cooja have already been equipped with an Internet of things (IoT) module, their support for research on IoT centralized scheduling is still limited. Therefore, this study is aimed to develop a tool for IoT centralized scheduling research, where the IoT technology is based on the IEEE802.15.4e time synchronized channel hopping (TSCH) standard. The tool is called the TSCH Link-Scheduling visualization and data processing (TLS-VaD). The results of validity tests show that TLS-VaD works well; therefore, this tool can be used in the performance measurement of centralized scheduling algorithms on TSCH networks. As an example of the application, this research used TLS-VaD to test the performance of three scheduling algorithms: Iman Ramli Bursty Transmission Scheduling Algorithm (IRByTSA), first top scheduling algorithm (FTSA), and first leaf scheduling algorithm (FLSA). The test results using TLS-VaD shows that IRByTSA had better performance compared to FLSA and FTSA, because it saved more power and was able to generate scheduling decisions relatively quickly

    Analisis Perbandingan Kinerja Sensor Jarak HC-SR04 dan GP2Y0A21YK Dengan Menggunakan Thingspeak dan Wireshark

    No full text
    Until now, Internet of Things (IoT) is a very interesting topic to research. This is due to the wide role that IoT can play in human life. This study aims to compare the performance of two sensors in an IoT-based distance detection system with the focus of the parameters being tested: sensor readings, Qos of data transmission, and power requirements. The two sensors that are the subject of comparison are HC-SR04 and GP2YA21YK. As an analytical tool, this research uses two tools, namely Thingspeak and Wireshak. The performance test results show that in terms of accuracy in determining distance, the HC-SR04 has a much better performance than the GP2YA21YK. On HC SR04, the average reading error is 0.82 cm, while on GP2YA21YK it is 14.40 cm. Meanwhile, in terms of QoS parameters, the two sensor systems show almost commensurate performance, the packet loss is both 0%, the throughput value is 37.01 kbps on HC-SR04 and 38.12 kbps on GP2YA21YK. As for the delay, the HC-SR04 sensor gives a value of 33.55 ms, and on GP2YA21YK it is 26.1 ms. Furthermore, based on power requirements, sensor systems using the HC-SR04 consume 14.36% less power than the system that use GP2YA21YK. By referring to the results of measurements and visualizations using Wireshark and Thingspeak, it can be concluded that the distance detection system using the HC-SR04 sensor is better than the system with the GP2YA21YK

    Implementation of QR Code Attendance Security System Using RSA and Hash Algorithms

    No full text
    The quick response (QR) code-based attendance application contributes to reducing paper usage and attendance input errors. However, in its implementation process, the QR-code-based attendance at a Bandung school demonstrates weaknesses. Absent students can fake their attendance for themselves or friends. This type of attack is known as fake QR code generation. This research proposes a security authentication system using the Rivest–Shamir–Adleman (RSA) encryption algorithm and the secure hash algorithm 1 (SHA-1) to secure QR code-based attendance applications from fake QR code generation attacks. The RSA algorithm encrypts QR code data to maintain privacy, while the SHA-1 algorithm ensures data integrity. Based on this method, the mutual authentication process between the QR code data generated by the student and the attendance reading application by the teacher can be established. The results obtained from a series of tests showed that the security system in the student attendance recording application that had been implemented at Madrasah Aliyah (MA) Al-Mukhlishin could detect and prevent fake QR code generation attacks. The test was conducted by changing the impact of the key length on RSA-1024 bits and RSA-2048 bits. The results showed that in RSA-1024 bits, energy consumption of 0.14 J and time of 1.66 s is more efficient than that in RSA-2048 bits, with energy consumption of 0.19 J and time of 2.09 s. Interestingly, if a higher level of security is required, the key length should be increased at the expense of some energy and time efficiency
    corecore