Aplikasi untuk Monitoring Jaringan IoT Menggunakan Algoritma Address Shuffling dengan HMAC

Elvan Alandi, Agustinus Noertjahyana, Justinus Andjarwirawan

Abstract


With the increasing market of the Internet of Things and Wireless Sensor Network (WSN). Increasing network security on the Internet of Things is important. Internet of Things is used starting from smart homes, smart campuses, smart cities, etc. so securing the Internet of Things network is more important than securing ordinary local networks. In addition, IoT devices have weaknesses in computing capabilities and storing sensitive data. There are four main types of weaknesses in the network, namely address spoofing attacks, false address conflicts, address exhaustion attacks and negative reply attacks.

The method used is Address shuffling with HMAC. This method is run by the DHCPv6 server (Dynamic Host Configuration Protocol) as a network coordinator and is monitored by the Android application to secure the Internet of Things network. DHCPv6 server is used on the Internet of Things network because it is faster and easier to control through the server, can be used on large networks and stop and restart commands can be done on the server. Additionally, when a DHCPv6 server has a problem, this will not interrupt other devices on one network.

The result of this program is a monitoring application that is able to notify users of attacks and the network is able to minimize four weaknesses in the network. So that later this application can help users to take preventive actions against attacks on the network.

Keywords


Internet Of Things; Wireless sensor network; Monitoring; Security

Full Text:

PDF

References


Al-Ani, A., Anbar, M., Hasbullah, I. H., Abdullah, R., & Al-Ani, A. K. 2019. Authentication and Privacy Approach for DHCPv6. URI = https://www.researchgate.net/publication/333505317.

Android Authority. 2020. What is Android? Here’s everything you need to know. URI = https://www.androidauthority.com/what-is-android-328076/.

Azeez, N. A., & Chinazo, O. J. 2018. Achieving Data Authentication with HMAC-SHA256 Algorithm. URI = https://www.researchgate.net/publication/332182220.

Bajrami, Valentin. 2019. What you need to know about IPv6. URI = https://www.redhat.com/sysadmin/what-you-need-know-about-ipv6.

DHCPKit. 2019. DHCPKit – A Flexible DHCP Server for IPv6 Networks. URI = https://www.dhcpkit.org/.

Li, L., Ren, G., Liu, Y., & Wu, J. 2018. Secure DHCPv6 Mechanism for DHCPv6 Security and Privacy. URI = https://ieeexplore.ieee.org/abstract/document/8293069.

Nizzi, F., Pecorella, T., Esposito, F., Pierucci, L., & Fantacci, R. 2019. IoT Security via Address Shuffling: the Easy Way. URI = https://ieeexplore.ieee.org/document/8606197.

Ozkan, A. 2014. Implementation of a Lightweight Trusted Platform Module. URI = https://www.researchgate.net/publication/305956412.

Ranger, S. 2020. Everything you need to know about the Internet of Things right now. URI = https://www.zdnet.com/article/what-is-the-internet-of-things-everything-you-need-to-know-about-the-iot-right-now/.

Statcounter. 2019. Mobile Operating System Market Share Worldwide - April 2019. URI = http://gs.statcounter.com/os-market-share/mobile/worldwide/.


Refbacks

  • There are currently no refbacks.


Jurnal telah terindeks oleh :