Simulasi Penggunaan Blockchain Pada Keamanan Jaringan Internet Of Things Menggunakan Pin Emulator: Model Public Blockchain

Penulis

  • Clara Amalia Ismayanti Universitas Papua, Manokwari
  • Parma Hadi Rantelinggi Universitas Papua, Manokwari

DOI:

https://doi.org/10.25126/jtiik.20241126108

Abstrak

Internet of Things (IoT) adalah sejumlah perangkat yang dapat mengumpulkan dan mengirimkan data antar sensor tanpa perlu bantuan manusia. Namun, keamanan IoT dapat terancam karena sifatnya yang dapat diakses dari mana saja dan kapan saja. Celah keamanan memiliki kemungkinan sukar untuk dideteksi, karena memiliki pola yang beragam. Oleh karena itu, diperlukan sebuah model keamanan pengiriman data antar sensor yang aman. Blockchain adalah teknologi yang dapat menjawab tiga syarat keamanan yang diperlukan, yaitu ketersediaan, kerahasiaan, dan integritas. Dalam penelitian ini, kami mencoba membangun sebuah simulasi keamanan IoT dengan menggunakan teknologi blockchain, dimana sistem keamanannya menggunakan pola public blockchain. Metode yang digunakan dalam penelitian ini adalah model public blockchain yang memungkinkan para pengguna untuk mengendalikan aplikasi yang terhubung pada pin emulator melalui smart contract. Penelitian ini menggunakan jejaring Ethereum yang termasuk dalam jaringan pengujian yang dapat digunakan tanpa adanya biaya transaksi yang perlu dibayar. Dengan adanya penelitian ini, diharapkan dapat memberikan solusi pada permasalahan keamanan dan tantangan yang dihadapi dalam jaringan IoT.

 

Abstract

The Internet of Things (IoT) is a collection of devices that can collect and transmit data between sensors without the need for human assistance. However, IoT security can be threatened due to its accessibility from anywhere and at any time. Security vulnerabilities may be difficult to detect due to their diverse patterns. Therefore, a secure data transmission security model between sensors is needed. Blockchain is a technology that can meet the three security requirements needed, namely availability, confidentiality, and integrity. In this study, we attempt to build a security simulation of IoT using blockchain technology, where the security system uses a public blockchain pattern. The method used in this study is a public blockchain model that allows users to control applications connected to the pin emulator via smart contracts. This research uses the Ethereum network, which is included in the testing network that can be used without transaction fees. With this research, it is hoped that solutions can be provided for the security issues and challenges faced in IoT networks.

Downloads

Download data is not yet available.

Referensi

ALI, G., AHMAD, N., CAO, Y., ASIF, M., CRUICKSHANK, H. & ALI, Q.E., 2019. Blockchain based permission delegation and access control in Internet of Things (BACI). Computers & Security, 86, pp.318–334. https://doi.org/10.1016/j.cose.2019.06.010.

ATLAM, H. F., ALENEZI, A., ALASSAFI, M. O., & WILLS, G. B. (2018). Blockchain with Internet of Things: Benefits, challenges, and future directions. International Journal of Intelligent Systems and Applications, 10(6), 40–48. https://doi.org/10.5815/ijisa.2018.06.05

BACCELLI, E., GUNDOGAN, C., HAHM, O., KIETZMANN, P., LENDERS, M. S., PETERSEN, H., SCHLEISER, K., SCHMIDT, T. C., & WAHLISCH, M. (2018). RIOT: An Open Source Operating System for Low-End Embedded Devices in the IoT. IEEE Internet of Things Journal, 5(6), 4428–4440. https://doi.org/10.1109/JIOT.2018.2815038

COLE, R., STEVENSON, M. & AITKEN, J., 2019. Blockchain technology: implications for operations and supply chain management. Supply Chain Management: An International Journal, 24(4), pp.469–483. https://doi.org/10.1108/SCM-09-2018-0309.

DABBAKUTI, S., 2021. Salmandabbakuti/IoT-and-Blockchain. [Python] Available at: <https://github.com/Salmandabbakuti/IoT-and-Blockchain> [Accessed 25 Jan. 2022].

FADHILLAH, Y. et al. (2022). TEKNOLOGI BLOCKCHAIN DAN IMPLEMENTASINYA. Medan: Yayasan Kita Menulis

FENG, B., MERA, A., & LU, L. (2020). P2IM: Scalable and Hardware-independent Firmware Testing via Automatic Peripheral Interface Modeling.

https://www.usenix.org/conference/usenixsecurity20/presentation/feng

FERNANDO, E., MEYLIANA, H. & WARNARS, E.A., 2020. Blockchain technology for pharmaceutical drug distribution in Indonesia: A proposed model. ICIC Express Letters, 14(2), pp.113–120.

HELLIAR, C.V., CRAWFORD, L., ROCCA, L., TEODORI, C. & VENEZIANI, M., 2020. Permissionless and permissioned blockchain diffusion. International Journal of Information Management, 54, p.102136. https://doi.org/10.1016/j.ijinfomgt.2020.102136.

HUANG, H., KONG, W., ZHOU, S., ZHENG, Z. & GUO, S., 2021. A Survey of State-of-the-Art on Blockchains: Theories, Modelings, and Tools. ACM Computing Surveys, 54(2), p.44:1-44:42. https://doi.org/10.1145/3441692.

KOSBA, A., MILLER, A., SHI, E., WEN, Z. & PAPAMANTHOU, C., 2016. Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts. In: 2016 IEEE Symposium on Security and Privacy (SP). 2016 IEEE Symposium on Security and Privacy (SP). pp.839–858. https://doi.org/10.1109/SP.2016.55.

KOŠŤÁL, K., HELEBRANDT, P., BELLUŠ, M., RIES, M. & KOTULIAK, I., 2019. Management and Monitoring of IoT Devices Using Blockchain. Sensors, 19(4), p.856. https://doi.org/10.3390/s19040856.

LOCKL, J., SCHLATT, V., SCHWEIZER, A., URBACH, N. & HARTH, N., 2020. Toward Trust in Internet of Things Ecosystems: Design Principles for Blockchain-Based IoT Applications. IEEE Transactions on Engineering Management, 67(4), pp.1256–1270. https://doi.org/10.1109/TEM.2020.2978014.

MATONDANG, N., NURLAILI ISNAINIYAH, I., & MULIAWATI, A. (2018). Analisis Manajemen Risiko Keamanan Data Sistem Informasi (Studi Kasus: RSUD XYZ). 2(1), 282–287. http://jurnal.iaii.or.id

NAKAMOTO, S., 2008. Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review, p.21260.

PANARELLO, A., TAPAS, N., MERLINO, G., LONGO, F. & PULIAFITO, A., 2018. Blockchain and IoT Integration: A Systematic Survey. Sensors, 18(8), p.2575. https://doi.org/10.3390/s18082575.

PATALTIMORE, 2022. Create a blockchain application - Azure Blockchain Workbench - Azure Blockchain. [online] Available at: <https://docs.microsoft.com/en-us/azure/blockchain/workbench/create-app> [Accessed 25 Jan. 2022].

PRAMUDITA, R., FUADA, S., & MAJID, N. W. A. (2020). Studi Pustaka Tentang Kerentanan Keamanan E-Learning dan Penanganannya. JURNAL MEDIA INFORMATIKA BUDIDARMA, 4(2), 309. https://doi.org/10.30865/mib.v4i2.1934

PURI, V., PRIYADARSHINI, I., KUMAR, R., & VAN LE, C. (2021). Smart contract based policies for the Internet of Things. Cluster Computing, 24(3), 1675–1694. https://doi.org/10.1007/s10586-020-03216-w

RIADI, I., UMAR, R. & LESTARI, T., 2021. Smart Payment Application Security Optimization from Cross-Site Scripting (XSS) Attacks Based on Blockchain Technology. Telematika, 14(2), pp.74–85. https://doi.org/10.35671/telematika.v14i2.1221.

SARI, I.Y. et al. (2020). KEAMANAN DATA DAN INFORMASI. Medan: Yayasan Kita Menulis

SIDIQ, M.F., BASUKI, A.I., FIRDAUS, H. & BAIHAQI, M.A., 2020. Sentralisasi Pengawasan Informasi Jaringan Menggunakan Blockchain Ethereum. Jurnal Teknologi Informasi dan Ilmu Komputer, 7(6), pp.1187–1196. https://doi.org/10.25126/jtiik.2020722662.

SINGH, S., HOSEN, A.S.M.S. & YOON, B., 2021. Blockchain Security Attacks, Challenges, and Solutions for the Future Distributed IoT Network. IEEE Access, 9, pp.13938–13959. https://doi.org/10.1109/ACCESS.2021.3051602.

TAYLOR, P.J., DARGAHI, T., DEHGHANTANHA, A., PARIZI, R.M. & CHOO, K.-K.R., 2020. A systematic literature review of blockchain cyber security. Digital Communications and Networks, 6(2), pp.147–156. https://doi.org/10.1016/j.dcan.2019.01.005.

WIHARTIKO, F.D., NURDIATI, S., BUONO, A. & SANTOSA, E., 2021. Blockchain dan Kecerdasan Buatan dalam Pertanian : Studi Literatur. Jurnal Teknologi Informasi dan Ilmu Komputer, 8(1), pp.177–188. https://doi.org/10.25126/jtiik.0814059.

XUE, J., XU, C. & ZHANG, Y., 2018. Private Blockchain-Based Secure Access Control for Smart Home Systems. KSII Transactions on Internet and Information Systems (TIIS), 12(12), pp.6057–6078. https://doi.org/10.3837/tiis.2018.12.024.

ZHOU, L., WANG, L., SUN, Y., & LV, P. (2018). BeeKeeper: A Blockchain-Based IoT System with Secure Storage and Homomorphic Computation. IEEE Access, 6, 43472–43488.

https://doi.org/10.1109/ACCESS.2018.2847632

Unduhan

Diterbitkan

25-04-2024

Terbitan

Bagian

Ilmu Komputer

Cara Mengutip

Simulasi Penggunaan Blockchain Pada Keamanan Jaringan Internet Of Things Menggunakan Pin Emulator: Model Public Blockchain. (2024). Jurnal Teknologi Informasi Dan Ilmu Komputer, 11(2), 235-242. https://doi.org/10.25126/jtiik.20241126108