5 research outputs found

    IMPLEMENTASI CHALLENGE RESPONSE AUTHENTICATION MECHANISM (CRAM) UNTUK KEAMANAN TRANSAKSI PERANGKAT IoT

    Get PDF
    This research aims to secure data transaction in Internet of Things (IoT)devices using the challenge-response authentication mechanism (CRAM). The research choose uses ESP 8266 and ESP 32 to develop the system for their ability to run micropython programming language. Using a random challenge to grant authentication protects the system from replay attack from intruders. In each authentication process, the client receives a 10 digit random number to be encrypted using a shared key and sent back to the server. The server then checks if the client posses the correct key by decrypting the encrypted challenge using the same shared key. Access is granted if the decryption result is equal to the original challenge

    IMPLEMENTASI TEKNIK KRIPTOGRAFI VISUAL PADA CITRA KEABUAN DAN BERWARNA UNTUK OTENTIKASI PENGGUNA PADA TRANSAKSI ONLINE

    Get PDF
    Visual cryptography (VC) technique encodes an image into two or more shares that appear random in human eyes. In the decryption section, the pixels in the shared images are combined to obtain the information contained in the original image. This study applies visual cryptographic techniques to graysle and color images for user authentication in online transactions using the VC2,2 scheme. The server computer encodes the CAPTCHA image into two shared images that are sent to the user through different channels or applications. To authenticate himself, the user performs an XOR operation on both share images, identifies the information contained in the CAPTCHA and sends it to the server. In encryption test, histogram of the share image has a different pattern from the original image. The description test shows the decrypted image in this study visually has a better quality than the binary image has better quality than binary images

    Analisis Dampak Variasi Data Transmisi pada Kinerja Protokol MAC Sistem Komunikasi Wireless Body Area Network

    Get PDF
    Protokol media access control (MAC) berperan menjamin keberhasilan transmisi data antar sensor nirkabel dan konsumsi daya pada Wireless Body Area Network (WBAN). Penelitian ini membandingkan unjuk kerja dua buah protocol MAC, yaitu T-MAC dan ZigbeeMAC pada sistem WBAN, pada laju kedatangan paket (λ) yang berbeda. Hasil simulasi menunjukan bahwa pada jaringan dengan λ rendah tingkat keberhasilan pengiriman paket antara protocol T-MAC dan ZigbeeMAC mencapai rata-rata 90% dari throughput maksimal walaupun pada kondisi tersebut kinerja ZigbeeMAC memiliki nilai lebih baik dibanding T-MAC. Pada laju kedatangan paket tinggi, throughput pada T-MAC memiliki perbedaan yang signifikan terhadap ZigbeeMAC. Pada keadaan terburuk troughput T-MAC adalah 88% dari throughput maksimal sedangkan Zigbee menurun hingga 43% dari throughput maksimal. Kosumsi daya pada ZigbeeMAC cenderung konstan untuk setiap laju kedatangan paket sedangkan pada T-MAC meningkat sejalan dengan pertambahan laju kedatangan paket. &nbsp

    INTEGRASI PROTOKOL MQTT DAN HTTP UNTUK OTOMASI BERBASIS IOT PADA PERTANIAN LAHAN KERING

    Get PDF
    The availability of telecommunication infrastructure and services has not been evenly distributed throughout the NTT region. This problem becomes the basis of this research  to develop a communication system that capable of reaching areas without a telecommunications network. Through the LORA gateway on the raspberry pi, information from areas that are not covered by telecommunications services is sent to another gateway using a working frequency of 915MHz. The plant in this study is the regulation of soil moisture with the input of 2 sensors and 1 relay for controlling land irrigation activities. An esp8266 sensor node collects the sensing results of the YL-69 and DS18B20 sensors to control the pump motor operation. The process of sending data between the sensor node and the gateway uses the mqtt protocol. Users in areas served by the internet network can access all published data on the test website. The results of controlling the plant area in the test area fluctuated and tended to be stable at between 60% and 80%

    RANCANG BANGUN SISTEM PENGENALAN WAJAH DAFTAR PENCARIAN ORANG (DPO) BERBASIS JARINGAN SARAF TIRUAN

    Get PDF
    This study aims to design a system that is able to recognize the face of a people search list (DPO). The application is built using opencv and dlib ddan system testing is done with a dataset consisting of 6 target people. The target was identified when it was exactly perpendicular to the camera but the detection failed when the target's face was not exactly perpendicular. This study also models the transmission of target data detected using long range radio (LORA) at a frequency of 91
    corecore