Repositori Institusi

Politeknik Siber dan Sandi Negara

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}
Image of Implementasi Skema Improved Security Authentication Protocol Berbasis Elliptic Curve Cryptography pada Radio Frequency Identification untuk Kendali Akses
Bookmark Share

Text

Implementasi Skema Improved Security Authentication Protocol Berbasis Elliptic Curve Cryptography pada Radio Frequency Identification untuk Kendali Akses

Rizka Khairunnisa - Personal Name; Andriani Adi Lestari - Personal Name; Magfirawaty - Personal Name; Joko Nugroho Suryo Raharjo - Personal Name;

Abstrak:
RFID merupakan teknologi komunikasi nirkabel berbasis frekuensi radio untuk mengidentifikasi objek secara otomatis. Saat ini, RFID telah dimanfaatkan pada banyak bidang, salah satunya bidang pengamanan untuk sistem kendali akses. Implementasi protokol autentikasi berfungsi untuk menghilangkan beberapa kerentanan terhadap penggunaan RFID, seperti impersonation attack, man in the middle attack, dan lain-lain. Oleh karena itu, pada penelitian ini mengimplementasikan skema improved security authentication protocol berbasis ECC yang diajukan oleh Wei et. al untuk mengatasi kerentanan pada RFID yang digunakan kendali akses. Metode yang digunakan dalam penelitian ini adalah SDLC dengan pendekatan waterfall. Pengujian performa yang dilakukan yaitu menghitung waktu proses autentikasi dengan memberikan jarak berbeda-beda antara reader dan server. Hasil yang didapatkan dari pengujian performa adalah proses autentikasi dapat dilakukan dengan jarak antara reader dan server maksimal 5 meter. Untuk jarak antara reader dan server lebih dari 5 meter tidak dapat melakukan proses autentikasi karena komunikasi antara reader dengan server tidak terhubung karena koneksi WiFi yang digunakan kurang baik. Dari hasil pengujian keamanan, skema yang diimplementasikan terbukti confidentiality of identity information serta aman terhadap impersonation attack pada server dan tag.
Abstract:
RFID is a wireless communication technology based on radio frequency to identify objects automatically. Currently, RFID has been used in many fields, one of which is security for access control systems. Implementation of the authentication protocol serves to eliminate several vulnerabilities to the use of RFID, such as impersonation attacks, man in the middle attacks, and others. Therefore, this research implements the ECC-based improved security authentication protocol scheme proposed by Wei et. al to address vulnerabilities in RFID used for access control. The method used in this research is SDLC with a waterfall approach. Performance testing is carried out, namely calculating the authentication process time by providing different distances between the reader and the server. The results obtained from the performance test are that the authentication process can be carried out with a maximum distance of 5 meters between the reader and the server. If the distance between the reader and the server is more than 5 meters, the authentication process cannot be carried out because the communication between the reader and the server is not connected because the WiFi connection used is not good. From the results of security testing, the implemented scheme proved to be confidentiality of identity information and safe against impersonation attacks on servers and tags.


Availability

No copy data

Detail Information
Series Title
--
Call Number
2023 JOK i
Publisher
Bogor : Politeknik Siber dan Sandi Negara., 2023
Collation
xiv, 48 halaman
Language
Indonesia
ISBN/ISSN
--
Classification
Rekayasa Perangkat Keras Kriptografi
Content Type
-
Media Type
-
Carrier Type
-
Edition
--
Subject(s)
Autentikasi
RFID
SHA-256
Impersonation Attack
ECC
Improved Security Authentication Protocol
Specific Detail Info
-
Statement of Responsibility
Joko Nugroho Suryo Raharjo
Other version/related

No other version available

File Attachment
No Data
Comments

You must be logged in to post a comment

Repositori Institusi
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?