Keamanan Data Pada Perangkat Internet Of Things Menggunakan Metode Public-Key Cryptography

Authors

  • Marsyel Sampe Asang Fakultas Teknologi Informasi Universitas Kristen Satya Wacana Jl. Diponegoro 52-60, Salatiga 50711
  • Irwan Sembiring Fakultas Teknologi Informasi Universitas Kristen Satya Wacana Jl. Diponegoro 52-60, Salatiga 50711

Keywords:

IoT, Keamanan, Public-Key Cryptography, RSA

Abstract

Developments of IoT in every sector gives a new problem, it is information security. There are many issues about data theft and hacking in IoT system, this is because the weak of system security. IoT device is a part of system that needs special care for that issues. This research focuses on data security in IoT decive like microcontroller that only has a limited resources. Firstly is implement public-key cryptography using RSA algorithm in the device. Then, make an analysis process to see the effectiveness and efficiency of the method. Finally result of this paper shows that implementation of public-key cryptography in IoT device for data security still make the device effective and efficient to work only for small key.

Downloads

Download data is not yet available.

Metrics

Metrics Loading ...

References

L. Atzori, A. Iera, and G. Morabito, “The Internet of Things: A survey,” Comput. Networks, vol. 54, no. 15, pp. 2787–2805, 2010.

T. Li, “Principle, Framework and Application of Internet of Things,” Appl. Mech. Mater., vol. 303–306, pp. 2144–2148, 2013.

L. Toms, “5 Common Cyber Attacks in the IoT - Threat Alert on a Grand Scale,” GlobalSign Blog, 2016. [Online]. Available:

https://www.globalsign.com/en/blog/five-common-cyber-attacks-in-the-iot.[Accessed: 03-Jul-2016].

M. O’Neill, “Insecurity by Design: Today’s IoT Device Security Problem,” Engineering, vol. 2, no. 1, pp. 48–49, 2016.

H. J. Highland, “Data encryption: A non-mathematical approach,” Comput.Secur., vol. 16, no. 5, pp. 369–386, 1997.

R. Wilson, “A Clearing Picture of the Internet of Things,” Altera Corporation, 2013. [Online]. Available: http://systemdesign.altera.com/a-clearing-pictureof-the-internet-of-things-2.

D. Ariyus, Pengantar Ilmu Kriptografi. Yogyakarta: Penerbit Andi, 2008.

D. Ireland, “RSA Algorithm,” DI Management, 2011. [Online]. Available: http://www.di-mgt.com.au/rsa_alg.html. [Accessed: 25-Oct-2016].

Downloads

Published

2017-02-25

How to Cite

[1]
M. S. Asang and I. Sembiring, “Keamanan Data Pada Perangkat Internet Of Things Menggunakan Metode Public-Key Cryptography”, AITI, vol. 14, no. 1, pp. 80–87, Feb. 2017.

Issue

Section

Articles

Most read articles by the same author(s)