Simulasi Penggunaan Blockchain Pada Keamanan Jaringan Internet Of Things Menggunakan Pin Emulator: Model Public Blockchain
DOI:
https://doi.org/10.25126/jtiik.20241126108Abstrak
Internet of Things (IoT) adalah sejumlah perangkat yang dapat mengumpulkan dan mengirimkan data antar sensor tanpa perlu bantuan manusia. Namun, keamanan IoT dapat terancam karena sifatnya yang dapat diakses dari mana saja dan kapan saja. Celah keamanan memiliki kemungkinan sukar untuk dideteksi, karena memiliki pola yang beragam. Oleh karena itu, diperlukan sebuah model keamanan pengiriman data antar sensor yang aman. Blockchain adalah teknologi yang dapat menjawab tiga syarat keamanan yang diperlukan, yaitu ketersediaan, kerahasiaan, dan integritas. Dalam penelitian ini, kami mencoba membangun sebuah simulasi keamanan IoT dengan menggunakan teknologi blockchain, dimana sistem keamanannya menggunakan pola public blockchain. Metode yang digunakan dalam penelitian ini adalah model public blockchain yang memungkinkan para pengguna untuk mengendalikan aplikasi yang terhubung pada pin emulator melalui smart contract. Penelitian ini menggunakan jejaring Ethereum yang termasuk dalam jaringan pengujian yang dapat digunakan tanpa adanya biaya transaksi yang perlu dibayar. Dengan adanya penelitian ini, diharapkan dapat memberikan solusi pada permasalahan keamanan dan tantangan yang dihadapi dalam jaringan IoT.
Abstract
The Internet of Things (IoT) is a collection of devices that can collect and transmit data between sensors without the need for human assistance. However, IoT security can be threatened due to its accessibility from anywhere and at any time. Security vulnerabilities may be difficult to detect due to their diverse patterns. Therefore, a secure data transmission security model between sensors is needed. Blockchain is a technology that can meet the three security requirements needed, namely availability, confidentiality, and integrity. In this study, we attempt to build a security simulation of IoT using blockchain technology, where the security system uses a public blockchain pattern. The method used in this study is a public blockchain model that allows users to control applications connected to the pin emulator via smart contracts. This research uses the Ethereum network, which is included in the testing network that can be used without transaction fees. With this research, it is hoped that solutions can be provided for the security issues and challenges faced in IoT networks.
Downloads
Referensi
ALI, G., AHMAD, N., CAO, Y., ASIF, M., CRUICKSHANK, H. & ALI, Q.E., 2019. Blockchain based permission delegation and access control in Internet of Things (BACI). Computers & Security, 86, pp.318–334. https://doi.org/10.1016/j.cose.2019.06.010.
ATLAM, H. F., ALENEZI, A., ALASSAFI, M. O., & WILLS, G. B. (2018). Blockchain with Internet of Things: Benefits, challenges, and future directions. International Journal of Intelligent Systems and Applications, 10(6), 40–48. https://doi.org/10.5815/ijisa.2018.06.05
BACCELLI, E., GUNDOGAN, C., HAHM, O., KIETZMANN, P., LENDERS, M. S., PETERSEN, H., SCHLEISER, K., SCHMIDT, T. C., & WAHLISCH, M. (2018). RIOT: An Open Source Operating System for Low-End Embedded Devices in the IoT. IEEE Internet of Things Journal, 5(6), 4428–4440. https://doi.org/10.1109/JIOT.2018.2815038
COLE, R., STEVENSON, M. & AITKEN, J., 2019. Blockchain technology: implications for operations and supply chain management. Supply Chain Management: An International Journal, 24(4), pp.469–483. https://doi.org/10.1108/SCM-09-2018-0309.
DABBAKUTI, S., 2021. Salmandabbakuti/IoT-and-Blockchain. [Python] Available at: <https://github.com/Salmandabbakuti/IoT-and-Blockchain> [Accessed 25 Jan. 2022].
FADHILLAH, Y. et al. (2022). TEKNOLOGI BLOCKCHAIN DAN IMPLEMENTASINYA. Medan: Yayasan Kita Menulis
FENG, B., MERA, A., & LU, L. (2020). P2IM: Scalable and Hardware-independent Firmware Testing via Automatic Peripheral Interface Modeling.
https://www.usenix.org/conference/usenixsecurity20/presentation/feng
FERNANDO, E., MEYLIANA, H. & WARNARS, E.A., 2020. Blockchain technology for pharmaceutical drug distribution in Indonesia: A proposed model. ICIC Express Letters, 14(2), pp.113–120.
HELLIAR, C.V., CRAWFORD, L., ROCCA, L., TEODORI, C. & VENEZIANI, M., 2020. Permissionless and permissioned blockchain diffusion. International Journal of Information Management, 54, p.102136. https://doi.org/10.1016/j.ijinfomgt.2020.102136.
HUANG, H., KONG, W., ZHOU, S., ZHENG, Z. & GUO, S., 2021. A Survey of State-of-the-Art on Blockchains: Theories, Modelings, and Tools. ACM Computing Surveys, 54(2), p.44:1-44:42. https://doi.org/10.1145/3441692.
KOSBA, A., MILLER, A., SHI, E., WEN, Z. & PAPAMANTHOU, C., 2016. Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts. In: 2016 IEEE Symposium on Security and Privacy (SP). 2016 IEEE Symposium on Security and Privacy (SP). pp.839–858. https://doi.org/10.1109/SP.2016.55.
KOŠŤÁL, K., HELEBRANDT, P., BELLUŠ, M., RIES, M. & KOTULIAK, I., 2019. Management and Monitoring of IoT Devices Using Blockchain. Sensors, 19(4), p.856. https://doi.org/10.3390/s19040856.
LOCKL, J., SCHLATT, V., SCHWEIZER, A., URBACH, N. & HARTH, N., 2020. Toward Trust in Internet of Things Ecosystems: Design Principles for Blockchain-Based IoT Applications. IEEE Transactions on Engineering Management, 67(4), pp.1256–1270. https://doi.org/10.1109/TEM.2020.2978014.
MATONDANG, N., NURLAILI ISNAINIYAH, I., & MULIAWATI, A. (2018). Analisis Manajemen Risiko Keamanan Data Sistem Informasi (Studi Kasus: RSUD XYZ). 2(1), 282–287. http://jurnal.iaii.or.id
NAKAMOTO, S., 2008. Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review, p.21260.
PANARELLO, A., TAPAS, N., MERLINO, G., LONGO, F. & PULIAFITO, A., 2018. Blockchain and IoT Integration: A Systematic Survey. Sensors, 18(8), p.2575. https://doi.org/10.3390/s18082575.
PATALTIMORE, 2022. Create a blockchain application - Azure Blockchain Workbench - Azure Blockchain. [online] Available at: <https://docs.microsoft.com/en-us/azure/blockchain/workbench/create-app> [Accessed 25 Jan. 2022].
PRAMUDITA, R., FUADA, S., & MAJID, N. W. A. (2020). Studi Pustaka Tentang Kerentanan Keamanan E-Learning dan Penanganannya. JURNAL MEDIA INFORMATIKA BUDIDARMA, 4(2), 309. https://doi.org/10.30865/mib.v4i2.1934
PURI, V., PRIYADARSHINI, I., KUMAR, R., & VAN LE, C. (2021). Smart contract based policies for the Internet of Things. Cluster Computing, 24(3), 1675–1694. https://doi.org/10.1007/s10586-020-03216-w
RIADI, I., UMAR, R. & LESTARI, T., 2021. Smart Payment Application Security Optimization from Cross-Site Scripting (XSS) Attacks Based on Blockchain Technology. Telematika, 14(2), pp.74–85. https://doi.org/10.35671/telematika.v14i2.1221.
SARI, I.Y. et al. (2020). KEAMANAN DATA DAN INFORMASI. Medan: Yayasan Kita Menulis
SIDIQ, M.F., BASUKI, A.I., FIRDAUS, H. & BAIHAQI, M.A., 2020. Sentralisasi Pengawasan Informasi Jaringan Menggunakan Blockchain Ethereum. Jurnal Teknologi Informasi dan Ilmu Komputer, 7(6), pp.1187–1196. https://doi.org/10.25126/jtiik.2020722662.
SINGH, S., HOSEN, A.S.M.S. & YOON, B., 2021. Blockchain Security Attacks, Challenges, and Solutions for the Future Distributed IoT Network. IEEE Access, 9, pp.13938–13959. https://doi.org/10.1109/ACCESS.2021.3051602.
TAYLOR, P.J., DARGAHI, T., DEHGHANTANHA, A., PARIZI, R.M. & CHOO, K.-K.R., 2020. A systematic literature review of blockchain cyber security. Digital Communications and Networks, 6(2), pp.147–156. https://doi.org/10.1016/j.dcan.2019.01.005.
WIHARTIKO, F.D., NURDIATI, S., BUONO, A. & SANTOSA, E., 2021. Blockchain dan Kecerdasan Buatan dalam Pertanian : Studi Literatur. Jurnal Teknologi Informasi dan Ilmu Komputer, 8(1), pp.177–188. https://doi.org/10.25126/jtiik.0814059.
XUE, J., XU, C. & ZHANG, Y., 2018. Private Blockchain-Based Secure Access Control for Smart Home Systems. KSII Transactions on Internet and Information Systems (TIIS), 12(12), pp.6057–6078. https://doi.org/10.3837/tiis.2018.12.024.
ZHOU, L., WANG, L., SUN, Y., & LV, P. (2018). BeeKeeper: A Blockchain-Based IoT System with Secure Storage and Homomorphic Computation. IEEE Access, 6, 43472–43488.
Unduhan
Diterbitkan
Terbitan
Bagian
Lisensi
Hak Cipta (c) 2024 Jurnal Teknologi Informasi dan Ilmu Komputer
Artikel ini berlisensiCreative Commons Attribution-ShareAlike 4.0 International License.
Artikel ini berlisensi Creative Common Attribution-ShareAlike 4.0 International (CC BY-SA 4.0)
Penulis yang menerbitkan di jurnal ini menyetujui ketentuan berikut:
- Penulis menyimpan hak cipta dan memberikan jurnal hak penerbitan pertama naskah secara simultan dengan lisensi di bawah Creative Common Attribution-ShareAlike 4.0 International (CC BY-SA 4.0) yang mengizinkan orang lain untuk berbagi pekerjaan dengan sebuah pernyataan kepenulisan pekerjaan dan penerbitan awal di jurnal ini.
- Penulis bisa memasukkan ke dalam penyusunan kontraktual tambahan terpisah untuk distribusi non ekslusif versi kaya terbitan jurnal (contoh: mempostingnya ke repositori institusional atau menerbitkannya dalam sebuah buku), dengan pengakuan penerbitan awalnya di jurnal ini.
- Penulis diizinkan dan didorong untuk mem-posting karya mereka online (contoh: di repositori institusional atau di website mereka) sebelum dan selama proses penyerahan, karena dapat mengarahkan ke pertukaran produktif, seperti halnya sitiran yang lebih awal dan lebih hebat dari karya yang diterbitkan. (Lihat Efek Akses Terbuka).