Statistical Comparison of Grain Algorithm for IoT Device Security

Statistical Comparison of Grain Algorithm for IoT Device Security

Published in 11th International Conference on Telecommunication Systems, Services, and Applications

Internet of Things (IoT) is an interconnection among devices or “things” that exchange data between them. A man-in-the-middle can be performed when two IoT devices are communicating, therefore secure data transmission between IoT devices has emerged as a challenging task. There are numbers of existing cryptography algorithms that offers protection. However, their utilization in IoT is questionable since the hardware is not suitable for inexpensive yet efficient encryption process. This paper proposed implementation of Grain as the winner for eSTREAM project and compare all version of Grain, i.e Grain v0, Grain v1 and Grain 128 in Arduino Mega 2560 as it used as a single board computer for IoT. The result shows that there is no significant difference in encryption-decryption processing time. While, in generating keystream, Grain 128 will take more time when implemented in Arduino Mega 2560.

An Empirical Study of App Permissions: A User Protection Motivation Behaviour

An Empirical Study of App Permissions: A User Protection Motivation Behaviour

Published in International Journal of Advanced Computer Science and Applications 9 (11) 106

Smartphone is one of the telecommunications media that can be used anytime and anywhere. To be able to support the activity of its users, smartphone users install the application on their smartphone. When installing an application, there are permissions provided by the application about data that will be collected. However, many users choose to ignore and do not read the application permission since it is too long or difficult to understand, hence they accept the apps permissions without thinking and consequently leads to security problems. This study aims to determine the factors that affect users in reading apps permissions that have been provided by an application before they install the application. Data were collected from 292 respondents who were active in using smartphones. The data analysis method used is Structural Equation Modeling (SEM). The results of the study show that the factors that influence the user in reading the app permissions before they install the application are coping self-efficacy and personal responsibility.

Performance Evaluation of Trivium on Raspberry Pi

Performance Evaluation of Trivium on Raspberry Pi

Published in International Journal of Advanced Computer Science and Applications 9 (11) 579

High connectivity of billions of IoT devices lead to many security issues. Trivium is designed for IoT to overcome the security challenges of IoT. The objective of this study is to implement a security service to provide confidentiality for the communication of IoT devices. Furthermore, this study aims to analyze Trivium performance in terms of keystream generation time and memory utilization on Raspberry Pi Zero, Raspberry Pi 2B, and Raspberry Pi 3B. The result showed that there was a statistically significant difference between the keystream generation time and memory utilization on Raspberry Pi Zero, Raspberry Pi 2B, and Raspberry Pi 3B based on Kruskal-Wallis H test. Further test of Jonckheere-Terpstra indicates that the fastest keystream generation time was on Raspberry Pi 3B, and the smallest memory utilization was on Raspberry Pi 2B. The implemantation of Trivium on three versions of Raspberry Pi shows promising results with less than 27 MB of memory utilization for cryptography leaves more resources available to applications.

Trust and Security Concerns of Cloud Storage: An Indonesian Technology Acceptance

Trust and Security Concerns of Cloud Storage: An Indonesian Technology Acceptance

Published in International Journal of Advanced Computer Science and Applications 9 (6) 453

Cloud drive is a service that offers data storage on the cloud. As the worldwide rapid growth of cloud drive there are ongoing concerns about trust, privacy and security concerns about how the user’s personal information and data are visible to other users or even abused by the cloud drive provider. This study provides empirical evidence about the factors affecting the acceptance of cloud drive users by using seven construct variables which are Trust, Perceived Risk, Perceived Ease of Use, Perceived Usefulness, Security, Behavioural Intention and Subjective Norm. Data were collected from 294 respondents by using online questionnaire. The data analysis method used was Structural Equation Modelling (SEM) analysis. The results of this study show that the factor affecting the intention of using cloud drive are trust, perceived risk and subjective norm.

Teen‘s Social Media Adoption: An Empirical Investigation in Indonesia

Teen‘s Social Media Adoption: An Empirical Investigation in Indonesia

Published in International Journal of Advanced Computer Science and Applications 9 (2) 380

Social media has reached their popularity in the past decade. Indonesia has more than 63 million social media users who are accessing their account through mobile phone and therefore Indonesia is the third largest users in the world after United States and India. This study is attempted to determine the factors affecting user behaviour intention of social media usage. TAM (Technology Acceptance Model) for Social Media by Rauniar et al. is adopted to provide empirical evidence of teens in Indonesia. Data were collected through questionnaire survey and hypotheses are analyzed with SEM (Structural Equation Modeling). Result shows that factor affecting Indonesian teens in using social media is perceived usefullness (PP), while Trustworthiness (TW) has no significant influence towards thier intention to use social media.

Information Privacy Concerns on Teens as Facebook Users in Indonesia

Information Privacy Concerns on Teens as Facebook Users in Indonesia

Published in Procedia Computer Science (4th Information Systems Internasional Conference)

Facebook is the most popular social media among teens. In a research conducted by Crowd DNA to 13 countries, two-third of teens aged 13-24 checking on their Facebook 14 times a day. Along with the rising of social media development and popularity, issue of privacy concerns has become public attention. This paper attempted to investigate Facebook users’ information privacy concerns using Internet Users’ Information Privacy Concerns (IUIPC). The data used in this research is collected from a questionnaire survey and analyzed using Structural Equation Modelling (SEM). The result shows that although users are aware with the risk of information loss by using Facebook, it does not have effect on their intention to use Facebook.

Discuss With Us