Implementasi Mekanisme End-To-End Security pada IoT Middleware

Penulis

Eko Sakti Pramukantoro, Fariz Andri Bakhtiar, Ahmad Lutfi Bayu Aji, Deny Hari Prasetya Dewa

Abstrak

Pada penelitian sebelumnya telah dikembangkan sebuah middleware dengan pendekatan event-driven yang mampu mendukung interoperabilitas berbagai macam perangkat sensor pada lingkungan IoT. Namun, skema komunikasi pada middleware tersebut masih terdapat celah keamanan dan menimbulkan ancaman berupa eavasdropping. Solusi dari permasalahan ini adalah menerapakan mekanisme end-to-end security. Dalam penelitian ini dilakukan penerapan algoritme kriptografi AES-CBC 128 pada komunikasi node sensor ke middleware dan mekanisme TLS pada komunikasi middleware dengan aplikasi berbasis IoT. Hasil yang didapat end-to-end security berbasis kriptografi pada pub/sub dapat menjamin kerahasiaan data dengan enkripsi payload akan tetapi topik masih terlihat, sedangkan TLS/SSL menjamin kerahasiaan seluruh data yang dikirim. Penggunaan mekanisme ini tidak berdampak signifikan pada delay pengiriman data, yaitu masih dibawah 1 detik

 Abstract

An IoT middleware for handling interoperability is proposed in previous works. However, a vulnerability that can lead to the eavesdropping attack exist. there is no security mechanism in the communication system among middleware with other parties like node sensors and subscribers. This research implements the end to end security to the existing IoT middleware.  AES-CBC 128 is used to secure communication between sensor nodes to middleware and used TLS/SLL between middleware and subscriber. The results show both mechanisms can securely communication between middleware and other parties, but AES-CBS can only secure data payload, not entire data. This mechanism has no significant impact on the delay transmission, which is still under 1 second

Teks Lengkap:

PDF

Referensi


AHMAD, MUDASSAR, SUMAIRA TAJ, TASLEEM MUSTAFA, AND MD ASRI. 2012. ‘Performance Analysis of Wireless Network with the Impact of Security Mechanisms’. In International Conference on Emerging Technologies (ICET),.

ASHTON, KEVIN. 2009. ‘That “Internet of Things” Thing, in the Real World Things Matter More than Ideas’. RFID Journal.

BEHRINGER, MICHAEL H. 2009. ‘End-to-End Security’. The Internet Protocol Journal 12(3).

https://www.cisco.com/c/en/us/about/press/internet-protocol-journal/back-issues/table-contents-45/123-security.html.

BLESSY RAJRA M B, 2A J DEEPA. 2015. ‘A Survey on Network Security Attacks and Prevention Mechanism’. Journal of Current Computer Science and Technology 5(2): 1–5.

DESAI, PRATIKKUMAR, AMIT SHETH, AND PRAMOD ANANTHARAM. 2015. ‘Semantic Gateway as a Service Architecture for IoT Interoperability’. In Proceedings - 2015 IEEE 3rd International Conference on Mobile Services, MS 2015, , 313–19.

MAQSOOD, FAIQA, MUHAMMAD MUMTAZ ALI, MUHAMMAD AHMED, AND MUNAM ALI SHAH. 2017. ‘Cryptography : A Comparative Analysis for Modern Techniques’. International Journal of Advanced Computer Science and Applications 8(6): 442–48.

PRAMUKANTORO, EKO SAKTI, AND HUSNUL ANWARI. 2018. ‘An Event-Based Middleware For Syntactical Interoperability And Enabling Web-Oriented In Internet Of Things’. International Journal of Electrical and Computer Engineering 8(5).

SRIVASTAVA, ANKIT, AND N REVATHI VENKATARAMAN. 2013. ‘AES-128 Performance in Tinyos with CBC Algorithm’. 7(5): 40–49.

TURNER, SEAN. 2014. ‘Transport Layer Security’. IEEE Internet Computing 18(6): 60–63.




DOI: http://dx.doi.org/10.25126/jtiik.2019631401