Security requirements come from people, individually or in wider society. And the effectiveness of security solutions often depends on the behaviour of people.
Our focus research in this area is securing various protocols that support Internet of Things, such as MQTT, CoAP, AMQP etc and also in various module of communication including BLE, LoRa, MQTT-SN ect by 3 different requirement of security CIA Triad, i.e. Confidentiality, Integrity and Authentication. There are several works that have been done by Nurovi Andiani, Iwi Suharti, Puspita Ainunnazah, Diah Ratih, Amelia Dwi S, Muh Fadhli. M. Rapli, Aditya Irvan, I Putu Agrahita, Faldo Bigdjaya.
As an emerging topic, this research group focuses on securing UAV by implementing various encryption algorithms to secure UAV protocols. The members of this group are Ahmad Faiz and Adam Syahputra.
Several works have been done in this area that focus on implementing hash function and evaluating its performance, such as work that has been done by Gibran Lukito, Arya Bagawwara and Angga Danar. Apart from evaluating blockchains performance, there are implementations of blockchain in various applications such as in SMEs by Angga Danar, supply chain management by Tabah Granit, Insurance application by Baihaqsani and Scholarship application by M Assaadil. This research group also contributes to the community by helding webinar that discuss blockchain and its implementation.
In our current research, we focus on easy-to-use encryption tools for personal communication, designing and analyzing cryptographic primitives such as block and stream ciphers, public-key encryption schemes.
User-centered security is about researching the best possible trade-offs and means to achieve good security that users are willing and able to use properly.