Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 2916 dokumen yang sesuai dengan query
cover
"This book covers various aspects of security, privacy and reliability in Internet of Things (IoT) and Cyber-Physical System design, analysis and testing. In particular, various established theories and practices both from academia and industry are presented and suitably organized targeting students, engineers and researchers. Fifteen leading academicians and practitioners wrote this book, pointing to the open problems and biggest challenges on which research in the near future will be focused."
Switzerland: Springer Nature, 2019
e20509832
eBooks  Universitas Indonesia Library
cover
"This book provides an overview of the most recent developments in Internet of Things (IoT) security and data protection. It presents the results of several international research projects addressing this topic from complementary angles. It starts by analyzing the main privacy and security threats on IoT, as well as the evolution of data protection norms, such as the European General Data Protection Regulation (GDPR), and their impact on IoT. Through a comprehensive and systematic approach, the contributors present new perspectives on IoT & Cloud Computing security requirements. They discuss the most recent approach to support trusted IoT, including new models of privacy risk assessment, labeling and certification, and contractual tools (such as Privacy PACT). Practical implementations, such as in the European Large Scale Pilots on IoT for Smart Cities (Synchronicity), are presented, explaining how they address security, privacy and data protection. Finally, innovative models to secure IoT systems are presented for the network and end-nodes security, including network threats analysis.
Shares results from several international research projects on IoT, cybersecurity, and privacy;
Combines complementary expertise from top experts in IoT, security, and data protection;
Provides a comprehensive view on how to protect IoT deployments and make them comply with the GDPR."
Switzerland: Springer Nature, 2019
e20509083
eBooks  Universitas Indonesia Library
cover
Anderson, T.
Englewood Cliffs, NJ: Prentice-Hall, 1981
004.2 AND f
Buku Teks SO  Universitas Indonesia Library
cover
Muhammad Fadhlan Harits
"Perangkat Internet of Things (IoT) telah mengalami peningkatan signifikan dalam beberapa tahun terakhir, pada tahun 2020 diketahui bahwa terdapat sekitar 11.3 miliar perangkat IoT yang terhubung di seluruh dunia dan akan terus berkembang setiap tahun. Salah satu tantangan yang dapat timbul pada penggunaan perangkat IoT adalah pada aspek keamanan dimana terdapat beberapa pendekatan untuk melakukan peningkatan keamanan, salah satunya adalah pada sisi kode sumber yang digunakan untuk menjalankan perangkat IoT. Penelitian ini akan melakukan analisis terhadap efektivitas peningkatan keamanan melalui metode shifting left security yaitu kode sumber atau hasil kompilasi kode sumber akan dianalisis sebelum dirilis pada perangkat IoT serta pengujian perangkat IoT dalam lingkungan internal sebelum dirilis ke publik. Pada penelitian ini telah dilakukan percobaan terhadap serangan SQL Injection, Broken Authentication, dan Denial of Service serta diketahui bahwa terdapat peningkatan sebesar 66% pada implementasi metode shifting left security dalam pengembangan perangkat IoT yaitu terdapat serangan SQL Injection dan Broken Authentication yang dapat dicegah serta serangan Denial of Service yang masih ditemukan setelah metode shifting left security diterapkan.

Internet of Things (IoT) devices have had significant increase during the last few years, in 2020 it is known that there were approximately 11.3 billion connected devices around the world and is continuing to develop throughout each year. One of the challenges that may occur when implementing IoT devices is security in which there are several approaches that can be taken for increasing security, one of the approaches is through analyzing the source code that is used for running the device. This research will conduct an analysis upon the effectiveness of shifting left security where the source code or the binary will be analyzed before it is deployed onto the IoT device as well as testing the IoT device in an internal environment prior to public release. Based on the tests conducted in this research through several attacks such as SQL Injection, Broken Authentication, and Denial of Service it is known that the security of IoT devices can be improved by 66% when implementing the shifting left security method in which SQL Injection and Broken Authentication are two of the attacks that can be mitigated while Denial of Service attack still persists after the shifting left security method had been implemented.
"
Depok: Fakultas Teknik Universitas Indonesia, 2022
S-pdf
UI - Skripsi Membership  Universitas Indonesia Library
cover
Chen, Tinghuai
New York: Springer-Verlag , 1992
004.2 CHE f
Buku Teks  Universitas Indonesia Library
cover
"This book provides insight and expert advice on the challenges of Trust, Identity, Privacy, Protection, Safety and Security (TIPPSS) for the growing Internet of Things (IoT) in our connected world. Contributors cover physical, legal, financial and reputational risk in connected products and services for citizens and institutions including industry, academia, scientific research, healthcare and smart cities. As an important part of the Women in Science and Engineering book series, the work highlights the contribution of women leaders in TIPPSS for IoT, inspiring women and men, girls and boys to enter and apply themselves to secure our future in an increasingly connected world. The book features contributions from prominent female engineers, scientists, business and technology leaders, policy and legal experts in IoT from academia, industry and government."
Switzerland: Springer Nature Switzerland, 2019
e20509438
eBooks  Universitas Indonesia Library
cover
Alvin Yudistriansyah
"Operator telekomunikasi kini telah mulai mengubah arah bisnis yang tidak lagi bergantung pada pendapatan dari layanan legacy seperti SMS dan voice, mereka mulai beralih ke layanan digital. Dengan kemampuan operator dalam hal konektivitas, mereka menaruh harapan pada layanan digital seperti Internet of Things (IoT). Banyak akademisi dan konsultan memprediksi bahwa IoT dapat meningkatkan pendapatan bagi operator telekomunikasi. Namun di balik potensi besar IoT, ada masalah penting dalam IoT yaitu masalah keamanan yang bisa menurunkan kepercayaan terhadap adopsi IoT. Melihat fakta-fakta ini, evaluasi tingkat kematangan pada sistem keamanan operator telekomunikasi perlu dilakukan untuk meminimalkan risiko dan ancaman keamanan. Penelitian ini bertujuan untuk mengevaluasi tingkat kematangan keamanan dan memberikan rekomendasi peningkatan keamanan di satu operator telekomunikasi di Indonesia. Metode penilaian yang digunakan penelitian ini menggunakan kerangka kerja IoT Security Maturity Model yang dikeluarkan oleh IIC. Hasil dari assessment maturity level yang dilakukan menunjukkan adanya kesenjangan pada maturity level untuk supply chain, incident dan event handling and recovery, identity access management, patch management, dan monitoring.

Telco operators have now begun to shift the direction of the business, which no longer relies on revenues from legacy services such as SMS and voice, they now shift to digital services. With its capabilities in terms of connectivity, the operator put hope to digital service such as the Internet of Things (IoT). Many academics and consultants predict IoT could boost revenue streams for telco operators. But behind the huge potential of IoT, there is a crucial issue in IoT which is security issues that could bring down confidence in the adoption of IoT. Looking at these facts, the evaluation of the maturity level on the telco operators security system needs to be done to minimize risks and security threats. This study aims to evaluate the security maturity level and give recommendation security improvement of one telco operator in Indonesia. The method for assessment which this study uses is the IoT Security Maturity Model framework issued by IIC. The results of the assessment maturity level indicate a gap in the maturity level for supply chain, incident, and event handling and recovery, identity access management, patch management, and monitoring."
Depok: Fakultas Teknik Universitas Indonesia, 2019
T53349
UI - Tesis Membership  Universitas Indonesia Library
cover
Rachma Maharani Ulfa
"

Internet of things (IoT) seringkali menjadi target serangan Distributed Denial of Service (DDoS) pada perangkat mereka. Ini karena ekosistem IoT menggunakan sistem terpusat untuk mengendalikan dirinya sendiri. Blockchain menggunakan sistem distribusi terdesentralisasi sehingga tidak memerlukan otoritas dari pihak ketiga untuk memberikan kontrol verifikasi dalam mengidentifikasi block transaksi yang ada di dalam node ini.  Penggunaan Blockchain dapat diimplementasikan ke dalam ekosistem IoT dalam mengelola aliran data dan transaksi dan dapat mengelola manajemen akses yang aman dan andal yang mendukung ekosistem tepercaya. Integrasi blockchain pada IoT membutuhkan metode Smart Contract sebagai solusi untuk mendukung konsep keamanan jaringan seperti kerahasiaan, integritas, dan keseterdiaan.


Internet of things (IoT) is often the target of Distributed Denial of Service (DDoS) attacks on their devices. This is because the IoT ecosystem uses a centralized system to control itself. Blockchain uses a decentralized distribution system so that it does not require authority from a third party to provide verification control in identifying transaction blocks that exist within this node. The use of Blockchain can be implemented into the IoT ecosystem in managing data flow and transactions and can manage secure and reliable access management that supports trusted ecosystems. Blockchain integration in IoT requires Smart contract method as a solution to support the concept of network security such as confidentiality, integrity and integrity.

"
Depok: Fakultas Teknik Universitas Indonesia, 2020
T-pdf
UI - Tesis Membership  Universitas Indonesia Library
cover
"This book discusses the challenges in the convergence of technologies as the Internet of Things (IoT) evolves. These include sensing, computing, information processing, networking, and controlling intelligent technologies. The contributors first provide a survey of various assessment and evaluation approaches available for successful convergence. They then go on to cover several operational ideas to apply. The contributors then discuss the challenges involved bridging gaps in computation and the communication process, hidden networks, intelligent decision making, human-to-machine perception and large-scale IoT environments. The contributors aim to provide the reader an overview of trends in IoT in terms of performability and traffic modeling and efforts that can be spent in assessing the graceful degradation in IoT paradigms.
- Provides a survey of IoT assessment and evaluation approaches;
- Covers new and innovative operational ideas that apply to the IoT industry and the industries it affects;
- Includes chapters from researchers and industry leaders in IoT from around the world."
Switzerland: Springer Cham, 2019
e20502433
eBooks  Universitas Indonesia Library
cover
Valya Sandria Akiela
"

Internet of Things (IoT) tidak hanya mengubah cara perangkat berinteraksi dan terhubung, tetapi juga membawa risiko keamanan serius, seperti kebocoran data. Penelitian ini mengatasi masalah tersebut dengan menggabungkan Advanced Encryption Standard (AES) dan shift left security. AES digunakan untuk mengenkripsi data yang ditransmisikan melalui perangkat IoT dengan mempertimbangkan keterbatasan sumber daya komputasi, khususnya pada perangkat Smart Fan System, yang bekerja dengan mengaktifkan mini fan berdasarkan threshold suhu tertentu yang dapat dimonitor melalui web app. Pada penelitian ini, shift left security diterapkan untuk mengidentifikasi dan mengatasi kerentanan sejak tahap awal pengembangan. Efektivitas integrasi AES dan shift left security diuji dengan membandingkan waktu eksekusi dan kerentanan keamanan. Penetration testing dilakukan terhadap SQL injection, Man in the Middle (MITM) attack, dan Distributed Denial of Service (DDoS) attack. Hasil penelitian menunjukkan peningkatan keamanan sebesar 66.67% dengan waktu eksekusi 485.51 ms pada sistem IoT yang mengintegrasikan AES dan shift left security, tanpa penurunan performa signifikan. Meskipun efektif terhadap SQL injection dan MITM attack, sistem masih rentan terhadap DDoS attack, sehingga diperlukan strategi tambahan yang lebih komprehensif. Penelitian ini diharapkan memberikan kontribusi penting dalam desain perangkat IoT yang lebih aman dan andal di masa depan.


The Internet of Things (IoT) not only transforms how devices interact and connect but also brings serious security risks, such as data breaches. This study addresses these issues by combining Advanced Encryption Standard (AES) and shift left security. AES is used to encrypt data transmitted through IoT devices, considering computational resource limitations, particularly in the Smart Fan System, which operates by activating a mini fan based on specific temperature threshold that can be monitored via a web app. In this research, shift left security is applied to identify and address vulnerabilities from the early stages of development. The effectiveness of integrating AES and shift left security is tested by comparing execution time and security vulnerabilities. Penetration testing is conducted against SQL injection, Man in the Middle (MITM) attack, and Distributed Denial of Service (DDoS) attack. The results show a 66.67% increase in security with an execution time of 485.51 ms in the IoT system integrating AES and shift left security, without significant performance degradation. Although effective against SQL injection and MITM attacks, the system remains vulnerable to DDoS attacks, indicating the need for more comprehensive strategies. This research is expected to make a significant contribution to the design of more secure and reliable IoT devices in the future.

"
Depok: Fakultas Teknik Universitas Indonesia, 2024
S-pdf
UI - Skripsi Membership  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>