Implementasi Algoritme Morus V2 untuk Pengamanan Data Pada Perangkat Bluetooth Low Energy

Penulis

  • Diah Ratih Destyorini Universitas Brawijaya, Malang
  • Ari Kusyanti Universitas Brawijaya, Malang
  • Reza Andria Siregar Universitas Brawijaya, Malang

DOI:

https://doi.org/10.25126/jtiik.2022976768

Abstrak

Pengamanan data merupan bagian penting dalam penerapan jaringan berbasis Internet of things (IoT). Sistem IoT membutuhkan sebuah protokol komunikasi, seperti Bluetooth Low Energy (BLE). BLE dinilai cepat dan hemat energi dalam pengiriman data jarak dekat. BLE digunakan sebagai komunikasi client-server yang menerima data dari sensor. Pengiriman data tidak aman tanpa adanya proses pengaman data. Kriptografi menjadi salah satu pilihan dalam pengaman data. Pada pengembangan diperlukan pertimbangan beberapa aspek seperti, resource yang digunakan, serta waktu untuk proses enkripsi dan dekripsi. Pada penelitian ini algoritme MORUS V2 dipilih untuk mengamankan data dari serangan. Algoritme ini mudah diimplementasikan pada hardware. Kecepatan dari algoritme ini dapat mencapai 0,69 cpb, lebih cepat dari algoritme lain. Proses enkripsi data dari sensor dilakukan pada server hingga menghasilkan ciphertext. Kemudian akan dilakukan dekripsi pada ciphertext ketika diterima oleh client, hingga plaintext ditampilkan. Dari hasil pengujian algoritme MORUS V2 telah berhasil diimplementasikan melalui pengujian test vector dengan nilai keystream yang sama. Pengujian confidentiality telah berhasil dilakukan melalui proses enkripsi dan dekripsi. Pada pengujian serangan pasif berhasil dilakukan dengan hasil nilai plaintext tidak diketahui ketika data dikirim, serta tidak ada perubahan ketika data sampai pada client. Pengujian serangan aktif menggunakan known-plaintext attack (KPA) dinyatakan gagal dalam memperoleh nilai plaintext.


Abstract

Data security is an essential part of implementing an Internet of things (IoT) based network. IoT systems require a communication protocol, such as Bluetooth Low Energy (BLE). BLE is considered fast and energy-efficient in sending data over short distances. BLE is used as a client-server communication that receives data from sensors.  Data transmission will be insecure without a data security process. Cryptography is one of the options for securing data.  The development requires consideration of several aspects, such as the resources used, as well as the time for the encryption and decryption process.  In research, the MORUS V2 algorithm was chosen to secure data from attacks. This algorithm is easy to implement on hardware. The speed of this algorithm can reach 0.69 CPB, faster than other algorithms. The data encryption process from the sensor is carried out on the server to produce ciphertext.  Then decryption will be carried out on the ciphertext when received by the client until the plaintext is displayed.  From the test results, the MORUS V2 algorithm has been successfully implemented through test vector testing with the same keystream value.  Confidentiality testing has been successfully carried out through encryption and decryption processes. The passive attack test was successfully carried out with the result that the plaintext value was unknown when the data was sent, and there was no change when the data arrived at the client. Active attack testing using a known-plaintext attack (KPA) is declared to have failed in obtaining the plaintext value.


Downloads

Download data is not yet available.

Referensi

AFIF, M. Implementasi Algoritme Enkripsi Grain-Cipher di ESP32 untuk Pengiriman Data lewat Modul Bluetooth Low Energy (BLE). Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer, vol. 5, no. 7, p. 2866-2870, juni 2021. ISSN 2548-964X. Tersedia pada: <https://j-ptiik.ub.ac.id/index.php/j-ptiik/article/view/9366>. [Diakses 7 Februari 2022]

ALEXANDER MAIER., et al., 2017. Comparative Analysis and Practical Implementation of the ESP32 Microcontroller Module for the Internet of things, [e-jurnal]. Tersedia melalui: < https://www.researchgate.net/publication/320273388_Comparative_Analysis_and_Practical_Implementation_of_the_ESP32_Microcontroller_Module_for_the_Internet_of_Things > [Diakses 15 Februari 2020]

AMIRUDDIN AMIRUDDIN., et al.,2018. Secure

Multi-protocol Gateway for Internet of things, [e-jurnal]. Tersedia melalui: https://ieeexplore.ieee.org/document/8363934 [Diakses 6 April 2020]

GHULAM MUSTAFA., et al.,2018. A Review of

Data Security and Cryptographic Techniques in IoT based devices, [e-jurnal]. Tersedia melalui: < https://www.researchgate.net/publication/327325243_A_review_of_data_security_and_cryptographic_techniques_in_IoT_based_devices> [Diakses 8 Mei 2020]

HARRIS, J., SMALL, L., HOPKINS, M. AND DE LAUTOUR, N., 2020. A Summary of Bluetooth Low Energy, [e-jurnal] p.1. Tersedia at: <https://www.dta.mil.nz/assets/Publications/A-Summary-of-Bluetooth-Low-Energy.pdf> [Diakses 23 Mei 2021].

HONGJUN, W., TAO, H., 2016. The

Authenticated Cipher MORUS V2 (V2), [e-jurnal]. Tersedia melalui: < https://competitions.cr.yp.to/round3/MORUS V2.pdf> [Diakses 15 Februari 2020]

IFTEKHAR SALAM., et al., 2018. Fault Attacks on the Authenticated Encryption Stream Cipher MORUS V2, [e-jurnal]. Tersedia melalui: < https://www.semanticscholar.org/paper/Fault-Attacks-on-the-Authenticated-Encryption-MORUS V2 -Salam-Simpson/bd5050f6883cd71f2e81a735c9194a577f0ea27a> [Diakses 1 Mei 2020]

KEUCHUL CHO., et al.,2016. Performance

Analysis of Device Discovery of Bluetooth Low Energy (BLE) Networks, [e-jurnal]. Tersedia melalui: < https://www.sciencedirect.com/science/article/pii/S0140366415003886> [Diakses 6 Februari 2020]

QADIR, A. AND VAROL, N., 2019. A Review Paper on Cryptography. 2019 7th International Symposium on Digital Forensics and Security (ISDFS), [e-jurnal] pp.2-3. Tersedia at: <https://ieeexplore.ieee.org/document/8757514> [Diakses 14 April 2021].

SAKIYAMA, K., SASAKI, Y. AND LI, Y., 2016. Security Of Block Ciphers From Algorithm Design To Hardware Implementation. Weley, pp.72-74.

VAADATA, 2020. Security of Iot Wireless

Technologies, [e-jurnal]. Tersedia melalui: <https://www.vaadata.com/blog/white-paper-security-iot-wireless-technologies/> [Diakses 6 April 2020]

Diterbitkan

29-12-2022

Cara Mengutip

Implementasi Algoritme Morus V2 untuk Pengamanan Data Pada Perangkat Bluetooth Low Energy. (2022). Jurnal Teknologi Informasi Dan Ilmu Komputer, 9(7), 1655-1662. https://doi.org/10.25126/jtiik.2022976768