PROTOKOL LIGHTWEIGHT AUTENTICHATION SEBAGAI PERLINDUNGAN PENCURIAN SMARTPHONE PADA WEARABLE TECHNOLOGY

SANTOSA, GALIH BANGUN (2018) PROTOKOL LIGHTWEIGHT AUTENTICHATION SEBAGAI PERLINDUNGAN PENCURIAN SMARTPHONE PADA WEARABLE TECHNOLOGY. S2 thesis, Universitas Mercu Buana Jakarta-Menteng.

[img]
Preview
Text (Cover)
00_Cover.pdf

Download (459kB) | Preview
[img]
Preview
Text (Abstrak)
FIX_92.TESIS_GALIHBS_Abstrak.pdf

Download (452kB) | Preview
[img]
Preview
Text (Abstrak)
000_Abstrak_English.pdf

Download (452kB) | Preview
[img]
Preview
Text (Lembar Pernyataan)
PERNYATAAN_SCAN.pdf

Download (531kB) | Preview
[img]
Preview
Text (Lembar Pengesahan)
PENGESAHAN TESIS_SCAN.pdf

Download (504kB) | Preview
[img]
Preview
Text (Kata Pengantar)
KATA PENGANTAR_SCAN.pdf

Download (604kB) | Preview
[img]
Preview
Text (Daftar Isi)
FIX_96.TESIS_GALIHBS_Daftar_Isi.pdf

Download (453kB) | Preview
[img]
Preview
Text (Daftar Tabel)
FIX_98.TESIS_GALIHBS_Daftar_Tabel.pdf

Download (471kB) | Preview
[img]
Preview
Text (Daftar Gambar)
FIX_97.TESIS_GALIHBS_Daftar_Gambar_10Dec2017.pdf

Download (471kB) | Preview
[img] Text (Bab 1)
01_BAB_I.pdf
Restricted to Registered users only

Download (455kB)
[img] Text (Bab 2)
02_BAB_II.pdf
Restricted to Registered users only

Download (1MB)
[img] Text (Bab 3)
03_BAB_III.pdf
Restricted to Registered users only

Download (817kB)
[img] Text (Bab 4)
04_BAB_IV.pdf
Restricted to Registered users only

Download (2MB)
[img] Text (Bab 5)
05_BAB_V.pdf
Restricted to Registered users only

Download (444kB)
[img] Text (Daftar Pustaka)
06_DaftarPustaka.pdf
Restricted to Registered users only

Download (456kB)

Abstract

Today, the use of wearable devices is becoming a thing inherent in the daily activities of urban communities. In practice, wearable communications may contain sensitive information regarding a user's health record, so authentication and confidentiality of data exchanged must be guaranteed. In addition, the success of authentication between users, wearable devices and smartphones is very important because there are various threats of attack on the authentication process. Based on previous studies, it was found that the security functionality of user impersonation attack is not owned by lightweight authentication protocols in the current wearable communication environment. So this research undertakes the design of a lightweight authentication protocol to be immune to user impersonation attacks to supplement the lack of security functionality in previous protocols with the support of performing a formal analysis using the Scyther Tool. The research method used is a Research Library supported by conducting protocol security test experiment. The developed protocol utilizes a modified and customized S-NCI key establishment protocol scheme to meet all targeted security functionality. The research resulted that the lightweight authentication protocol generated was immune to the impersonation attacks of users, then was able to add two new functionalities that added wearable devices and added smartphones. Keywords: wearable device, lightweight authentication protocol, user impersonation attack, scyther tool, key establishment. Pada era modern saat ini, penggunaan perangkat wearable sudah menjadi hal yang melekat pada aktifitas sehari-hari masyarakat perkotaan. Dalam praktiknya, komunikasi wearable dapat berisi informasi sensitif terkait data rekaman kesehatan seorang pengguna, sehingga keotentikasian dan kerahasiaan data yang dipertukarkan harus terjamin. Selain itu, keberhasilan otentikasi antara pengguna, perangkat wearable dan ponsel cerdas merupakan hal yang sangat penting dikarenakan terdapat berbagai macam ancaman serangan pada proses otentikasi tersebut. Berdasarkan penelitian-penelitian sebelumnya dihasilkan bahwa fungsionalitas keamanan perlindungan serangan pencurian ponsel cerdas, perlindungan serangan pencurian perangkat wearable, perlindungan serangan replay, dan perlindungan serangan pemalsuan perangkat wearable/ponsel cerdas/pengguna tidak dimiliki oleh protokol-protokol otentikasi ringkas pada lingkungan komunikasi wearable yang ada saat ini. Sehingga penelitian ini melakukan perancangan protokol otentikasi ringkas agar kebal terhadap sejumlah serangan tersebut untuk melengkapi kekurangan fungsionalitas keamanan pada protokol-protokol sebelumnya dengan didukung melakukan analisis formal menggunakan Scyther Tool. Metoda penelitian yang digunakan adalah Penelitian Pustaka dengan didukung melakukan eksperimen uji keamanan protokolnya. Protokol yang dikembangkan memanfaatkan skema protokol penyediaan kunci S- NCI yang telah dimodifikasi dan disesuaikan sehingga dapat memenuhi semua fungsionalitas keamanan yang ditargetkan. Penelitian ini menghasilkan bahwa protokol otentikasi ringkas yang dihasilkan kebal terhadap serangan pencurian ponsel cerdas, serangan pencurian perangkat wearable, serangan replay dan serangan pemalsuan perangkat wearable/ponsel cerdas/pengguna, kemudian mampu menambahkan dua fungsionalitas baru yaitu menambah perangkat wearable dan menambah ponsel cerdas. Kata Kunci: perangkat wearable, komunikasi wearable, ponsel cerdas, otentikasi, kerahasiaan, protokol otentikasi ringkas, scyther tool, S-NCI.

Item Type: Thesis (S2)
Call Number CD: CDT-554-18-019
NIM/NIDN Creators: 55416110023
Uncontrolled Keywords: perangkat wearable, komunikasi wearable, ponsel cerdas, otentikasi, kerahasiaan, protokol otentikasi ringkas, scyther tool, S-NCI, wearable device, lightweight authentication protocol, user impersonation attack, scyther tool, key establishment. MTEL
Subjects: 600 Technology/Teknologi > 620 Engineering and Applied Operations/Ilmu Teknik dan operasi Terapan > 621 Applied Physics/Fisika terapan
Divisions: Pascasarjana > Magister Teknik Elektro
Depositing User: ORYZA LUVITA
Date Deposited: 23 Mar 2022 03:03
Last Modified: 24 Jun 2022 06:45
URI: http://repository.mercubuana.ac.id/id/eprint/58653

Actions (login required)

View Item View Item