Implementasi Algoritme Spongent sebagai Algoritme Hashing untuk Integritas pada Modul Komunikasi Lora

Penulis

  • Ari Kusyanti Universitas Brawijaya, Malang
  • I Putu Agrahita Wiguna Universitas Brawijaya, Malang
  • Fariz Andri Bakhtiar Universitas Brawijaya, Malang

DOI:

https://doi.org/10.25126/jtiik.1067119

Abstrak

Internet of Things (IoT) merupakan konsep terbaru dalam ranah teknologi dan informasi komunikasi dengan fondasinya berdasarkan pada pertukaran informasi antara objek-objek pintar. Komunikasi dalam lingkup IoT memiliki peran penting untuk saling terhubung dengan beberapa perangkat untuk mengirimkan pesan. Teknologi yang secara khusus menargetkan situasi di mana cakupan area yang luas dengan biaya penerapan yang rendah dan konsumsi daya yang rendah menggunakan frekuensi radio ialah LoRa. LoRa dioptimalkan untuk implementasi pada perangkat dengan sumber daya yang terbatas, namun pada penerapan IoT, keamanan data menjadi tantangan selain keterbatasan sumber daya. Pengamanan data dapat dilakukan dengan algoritme hashing seperti algoritme SPONGENT. Algoritme SPONGENT dipilih untuk menjamin integritas data. Berdasarkan hasil penelitian, algoritme SPONGENT telah berhasil diimplementasikan sebagai keamanan integritas data pada LoRa. Pengujian terhadap keamanan data dengan pengujian serangan aktif berhasil dilakukan karena ketika penyerang mengirimkan data yang sudah diubah, telah dilakukan pengecekan pada gateway dan data yang dihasilkan tidak valid. Algoritme SPONGENT menunjukkan kinerja yang lebih baik dari Algoritme QUARK berdasarkan kinerja waktu hashing.

 

Abstract

The Internet of Things (IoT) is a recent concept in the realm of technology and information communication, built on the foundation of information exchange among smart objects. Communication within the scope of IoT has an important role to connect with multiple devices to send messages. Technology that specifically targets situations where large area coverage with low deployment costs and low power consumption use a radio frequency is LoRa. LoRa is optimized for implementation on limited resource devices, but in IoT deployment, data security becomes a challenge in addition to resource limitations. Data security can be done with hashing algorithms such as SPONGENT algorithm. The SPONGENT algorithm was chosen to ensure data integrity. Based on the research results, the SPONGENT algorithm has been successfully implemented as data integrity security in LoRa. Testing of data security with active attack testing is successful because when the attacker sends the modified data, it has been checked on the gateway node and the resulting data is invalid. SPONGENT algorithm shows better performance than QUARK algorithm based on hashing time performance.

Downloads

Download data is not yet available.

Referensi

BOGDANOV, A., KNEŽEVIĆ, M., LEANDER, G., TOZ, D., VARICI, K., & VERBAUWHEDE, I. 2013. SPONGENT: The design space of lightweight cryptographic hashing. IEEE Transactions on Computers, 62(10), 2041–2053. https://doi.org/10.1109/TC.2012.196

CARAVEO-CACEP, M. A., VÁZQUEZ-MEDINA, R., & HERNÁNDEZ ZAVALA, A. 2023. A survey on low-cost development boards for applying cryptography in IoT systems. Internet of Things (Netherlands), 22(March), 100743. https://doi.org/10.1016/j.iot.2023.100743

DHANDA, S. S., SINGH, B., & JINDAL, P. 2020. Lightweight Cryptography: A Solution to Secure IoT. In Wireless Personal Communications (Vol. 112, Issue 3). Springer US. https://doi.org/10.1007/s11277-020-07134-3

GARG, P., & KUMAR SINGH, D. 2021. Analysis of cryptographic encryption algorithm design to Secure IoT Devices: A review. Materials Today: Proceedings, 51(xxxx), 810–814. https://doi.org/10.1016/j.matpr.2021.06.240

GLAROUDIS, D., IOSSIFIDES, A., & CHATZIMISIOS, P. 2020. SURVEY, COMPARISON AND RESEARCH Challenges of IoT application protocols for smart farming. Computer Networks, 168, 107037. https://doi.org/10.1016/j.comnet.2019.107037

GUPTA, D. N., & KUMAR, R. 2021. Sponge based Lightweight Cryptographic Hash Functions for IoT Applications. 2021 International Conference on Intelligent Technologies, CONIT 2021, 9–13. https://doi.org/10.1109/CONIT51480.2021.9498572

HAMEED, A., & ALOMARY, A. 2019. Security issues in IoT: A survey. 2019 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies, 3ICT 2019. https://doi.org/10.1109/3ICT.2019.8910320

MANUEL, M. P., & DAIMI, K. 2021. Implementing cryptography in LoRa based communication devices for unmanned ground vehicle applications. SN Applied Sciences, 3(4), 1–14. https://doi.org/10.1007/s42452-021-04377-y

MOUSAVI, S. K., GHAFFARI, A., BESHARAT, S., & AFSHARI, H. 2021. Security of internet of things based on cryptographic algorithms: a survey. In Wireless Networks (Vol. 27, Issue 2). Springer US. https://doi.org/10.1007/s11276-020-02535-5

MUNIR, R. 2019. Kriptografi (2nd ed.). Informatika Bandung.

RAHMAN, A. G. A., PRAMUKANTORO, E. S., & AMRON, K. 2020. Implementasi Mekanisme End-To-End Security Menggunakan Algoritma AES dan HMAC pada Pengiriman Data Sensor ECG Berbasis LoRa. 4(1), 166–173.

SARKER, V. K., QUERALTA, J. P., GIA, T. N., TENHUNEN, H., & WESTERLUND, T. 2019. A survey on LoRa for IoT: Integrating edge computing. 2019 4th International Conference on Fog and Mobile Edge Computing, FMEC 2019, 295–300. https://doi.org/10.1109/FMEC.2019.8795313

SHARMA, C., MATA, S., & DEVI, V. 2018. Constrained IoT Systems. 2018 3rd International Conference On Internet of Things: Smart Innovation and Usages (IoT-SIU), 1–6.

SUNDARAM, J. P. S., DU, W., & ZHAO, Z. 2019. A Survey on LoRa Networking: Research Problems, Current Solutions, and Open Issues. IEEE Communications Surveys and Tutorials, 22(1), 371–388. https://doi.org/10.1109/COMST.2019.2949598

ZOURMAND, A., KUN HING, A. L., WAI HUNG, C., & ABDULREHMAN, M. 2019. Internet of Things (IoT) using LoRa technology. 2019 IEEE International Conference on Automatic Control and Intelligent Systems, I2CACIS 2019 - Proceedings, June, 324–330. https://doi.org/10.1109/I2CACIS.2019.8825008

Diterbitkan

29-12-2023

Terbitan

Bagian

Ilmu Komputer

Cara Mengutip

Implementasi Algoritme Spongent sebagai Algoritme Hashing untuk Integritas pada Modul Komunikasi Lora. (2023). Jurnal Teknologi Informasi Dan Ilmu Komputer, 10(6), 1311-1318. https://doi.org/10.25126/jtiik.1067119