Keamanan Data Pada Perangkat Internet Of Things Menggunakan Metode Public-Key Cryptography
Keywords:
IoT, Keamanan, Public-Key Cryptography, RSAAbstract
Developments of IoT in every sector gives a new problem, it is information security. There are many issues about data theft and hacking in IoT system, this is because the weak of system security. IoT device is a part of system that needs special care for that issues. This research focuses on data security in IoT decive like microcontroller that only has a limited resources. Firstly is implement public-key cryptography using RSA algorithm in the device. Then, make an analysis process to see the effectiveness and efficiency of the method. Finally result of this paper shows that implementation of public-key cryptography in IoT device for data security still make the device effective and efficient to work only for small key.
Downloads
Metrics
References
L. Atzori, A. Iera, and G. Morabito, “The Internet of Things: A survey,” Comput. Networks, vol. 54, no. 15, pp. 2787–2805, 2010.
T. Li, “Principle, Framework and Application of Internet of Things,” Appl. Mech. Mater., vol. 303–306, pp. 2144–2148, 2013.
L. Toms, “5 Common Cyber Attacks in the IoT - Threat Alert on a Grand Scale,” GlobalSign Blog, 2016. [Online]. Available:
https://www.globalsign.com/en/blog/five-common-cyber-attacks-in-the-iot.[Accessed: 03-Jul-2016].
M. O’Neill, “Insecurity by Design: Today’s IoT Device Security Problem,” Engineering, vol. 2, no. 1, pp. 48–49, 2016.
H. J. Highland, “Data encryption: A non-mathematical approach,” Comput.Secur., vol. 16, no. 5, pp. 369–386, 1997.
R. Wilson, “A Clearing Picture of the Internet of Things,” Altera Corporation, 2013. [Online]. Available: http://systemdesign.altera.com/a-clearing-pictureof-the-internet-of-things-2.
D. Ariyus, Pengantar Ilmu Kriptografi. Yogyakarta: Penerbit Andi, 2008.
D. Ireland, “RSA Algorithm,” DI Management, 2011. [Online]. Available: http://www.di-mgt.com.au/rsa_alg.html. [Accessed: 25-Oct-2016].
Downloads
Published
How to Cite
Issue
Section
License
All articles published in AITI: Jurnal Teknologi Informasi is licensed under a Creative Commons Attribution 4.0 International License.