Implementation of Ethereum DApps

Implementation of Ethereum DApps

Technological developments are so fast, especially in the development of web technology that is often known as Web3. Web3 implements a technology called Blockchain as a concept of Decentralized (decentralized). This study implements the concept of Decentralized (decentralized) in order to manage data, by utilizing the advantages of technology Blockchain where the data is not easily changed and guarantee its safety. Therefore, In this study, we are implementing Dapps (Decentralized Application) based on Ethereum environment. Supported tol and technology needed are Smart Contract for data processing, Truffle framework as framework development on Ethereum environment, ReactJs for user interface, and IPFS for storing pictures in a decentralized manner. Test environment done locally hosted on the Truffle framework and supported by apps Ganache as a localhost blockchain network provider.

Implementation of SHA2 for LoRa

Implementation of SHA2 for LoRa

Long Range (LoRa) is a Low Power Wide Area Network (LPWAN) technology used for transmission using radio wave spectrum with long range transmission and low power consumption. The transmitted data does not have security so the integrity is not guaranteed. The method that has been used for data integrity security is the SHA-256. From the resulting research, BLAKE2S algorithm successfully performs security implemented to ensure data security on LoRa. Data security is done by converting into message digest through hashing process. Data security with active attack testing using techniques Man In The Middle Attack was successfully performed.

Implementation of Encryption Algorithm in UAV

Implementation of Encryption Algorithm in UAV

MAVLink or Micro Air Vehicle Link which is an unmanned system lightweight message serialization protocol. This protocol is commonly used in autopilot systems, especially ArduPilot and PX4 and provides advanced features not only for monitoring and controlling the mission of unmanned systems but also for integration into the Internet. Since the MAVLink protocol is carried over wireless channels, it's vulnerable against various attacks. In our groups, numbers of methods have been employed to secure data transmission. The implementation of various algorithms is employed. Performance evaluation is carried out in terms of QoS. Security evaluation is also performed for both passive and active attacks.

“Sign me in, please!”: An Indonesian Perspective of Google Single Sign-On

“Sign me in, please!”: An Indonesian Perspective of Google Single Sign-On

Google is an identity provider which provides email account. Email account is used for third-party service’s registration. Nowadays, Google provides single sign on function. This function enables Internet users, use only one authentication process to obtain permission to access third-party’s services. Single sign on process allows data sharing process from respective account (Google’s Email) to the third-party. This process increases the risk of personal data loss. This research aims to determine the factors that affect Internet user’s intention to use Google’s single sign on, by using SEM (Structural Equation Modelling). In this research, there are 10 latent variables with 30 indicators. Those variable latent are Trust, Perceived Usefulness, Perceived Ease of Use, Behavioral Intention of Use, Risk, Security, and Privacy (Second order using IUIPC). This research collects 247 respondents, who have used Google's single sign on, through online questionnaire. The results shows, the factors that affect Internet user’s intention to use Google’s single sign on are Perceived Usefulness and Risk.

Discuss With Us