Advanced Encryption Standard (AES) 128 Bit untuk Keamanan Data Internet of Things (IoT) Tanaman Hidroponik
One method of growing vegetables is to use hydroponics by utilizing water as the medium used. In this era of rapidly developing technology, one of which is Internet of Things (IoT) is a system between computers or objects that can connect and exchange data without requiring interaction, because the data sent is public data, a security system is needed to secure the data sent. Advanced Encryption Standard (AES) 128 bits are used to secure data sent by users or data received by users, using a private key so that data security is maintained. The process of encryption and decryption was carried out through the website using an Arduino Uno microcontroller, SoC version ESP 8266. To adjust the rules for controlling plant needs such as Total Dissolve Solid (TDS), Potential Hydrogen (PH), temperature, and distance, this study uses Sensor2. Database in the research used to facilitate computerized access to assist the process of caring for IoT-based hydroponic plants. The final results have been tested in the encryption decryption process, Avalanche Effect (AE), entropy and Bit Error Ratio (BER). The AE yield 58.01% as highest score, the highest entropy was 6.3566 while all data resulted in BER = 0.
Winder Davey. (2019, July) Confirmed: 2 Billion Records Exposed In Massive Smart Home Device Breach. [Online]. https://www.forbes.com/sites/daveywinder/2019/07/02/confirmed-2-billion-records-exposed-in-massive-smart-home-device-breach/#230e8b36411c
Saurabh Singh, Pradip Kumar Sharma, Seo Yeon Moon, and Jong Hyuk Park, "Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions," Journal of Ambient Intelligence and Humanized Computing, 2017.
Sarada Prasad Gochhayat et al., "Reliable and Secure Data Transfer in IoT Networks," Wireless Networks : The Journal of Mobile Communication,Computation and Information, 2019.
Sana Belguith, Nesrine Kaaniche, Maryline Laurent, Abderrazak Jemai, and Rabah Attia, "PHOABE: Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT," Computer Networks Vol 133, Issue 14, pp. 141-156, 2018.
Xinlei Wang, Jianqing Zhang, Eve M. Schooler, and Mihaela Ion, "Performance evaluation of Attribute-Based Encryption: Toward data privacy in the IoT," in IEEE International Conference on Communications (ICC), Sydney, NSW, Australia, 2014.
Kun Lin Tsai et al., "AES-128 Based Secure Low Power Communication for LoRaWAN IoT Environments," IEEE Access Vol 6, Topic: Security and Trusted Computing for Industrial Internet of Things, pp. 45325-45334, 2018.
Ritambhara, Alka Gupta, and Manjit Jaiswal, "An enhanced AES algorithm using cascading method on 400 bits key size used in enhancing the safety of next generation internet of things (IOT)," in International Conference on Computing, Communication and Automation (ICCCA), Greater Noida, India, 2017.
Ali Akbar Pammu, Kwen-Siong Chong, Weng-Geng Ho, and Bah-Hwee Gwee, "Interceptive side channel attack on AES-128 wireless communications for IoT applications," in IEEE Asia Pacific Conference on Circuits and Systems (APCCAS), Jeju, South Korea, 2016.
Weize Yu and Selcuk Kose, "A Lightweight Masked AES Implementation for Securing IoT Against CPA Attacks," IEEE Transactions on Circuits and Systems I: Regular Papers ( Volume: 64 , Issue: 11), 2017.
Noveline Aziz Fauziah, Eko Hari Rachmawanto, De Rosal Ignatius Moses Setiadi, and Christy Atika Sari, "Design and Implementation of AES and SHA-256 Cryptography for Securing Multimedia File over Android Chat Application," in International Seminar on Research of Information Technology and Intelligent Systems (ISRITI), Yogyakarta, Indonesia, 2018, pp. 146-151.
B.K.S. Rajaram and Krishna Prakash N, "Secure MQTT using AES for Smart Homes in IoT Network," International Journal of Innovative Technology and Exploring Engineering (IJITEE), pp. 483-485, 2019.
Turki Ali Alghamdi, Ishtiaq Ali, Nadeem Javaid, and Muhammad Shafiq, "Secure service provisioning scheme for lightweight IoT devices with a fair payment system and an incentive mechanism based on blockchain," IEEE Access Vol 8, pp. 1048-1061, 2019.
Wiwin Styorini and Dwi Harinitha, "Analisis Performansi Algoritma AES dan Blowfish Pada Aplikasi Kriptografi," in Seminar Nasional, pp. 1-6.
Aji Fitrah Marisman and Anita Hidayati, "PEMBANGUNAN APLIKASI PEMBANDING KRIPTOGRAFI DENGAN CAESAR CIPHER DAN ADVANCE ENCRYPTION STANDARD," Jurnal Penelitian Komunikasi dan Opini Publik, vol. 19, no. 3, pp. 213-222, Desember 2015.
Fernando Fernando and Lukas Lukas, "IMPLEMENTASI DAN ANALISIS LIGHTWEIGHT CRYPTOGRAPHY UNTUK INTERNET OF THINGS (IOT)," JURNAL ELEKTRO, vol. 10, no. 2, pp. 85-94, Oktober 2017.
Resianta Perangin-angin, Indra Kelana Jaya, Benget Rumahorbo, and Berlian Juni R. Marpaung, "Analisa Alokasi Memori dan Kecepatan Kriptograpi Simetris Dalam Enkripsi dan Dekripsi," INFORMATION SYSTEM DEVELOPMENT [ISD], vol. 4, no. 1, pp. 11-16, Januari 2019.
Duy-Hieu Bui, Diego Puschini, Simone Bacles-Min, Edith Beigné, and Xuan-Tu Tran, "Ultra low-power and low-energy 32-bit datapath AES architecture for IoT applications," in International Conference on IC Design and Technology (ICICDT), Ho Chi Minh City, Vietnam, 2016, pp. 1-4.
Eko Hari Rachmawanto, Khabib Prasetyo, Christy Atika Sari, De Rosal Ignatius Moses Setiadi, and Nova Rijati, "Secured PVD Video Steganography Method based on AES and Linear Congruential Generator," in International Seminar on Research of Information Technology and Intelligent Systems (ISRITI), Yogyakarta, Indonesia, 2018, pp. 163-167).
Mutia Rizky Ashila, Nur Atikah, De Rosal Ignatius Moses Setiadi, Eko Hari Rachmawanto, and Christy Atika Sari, "Hybrid AES-Huffman Coding for Secure Lossless Transmission," in Fourth International Conference on Informatics and Computing (ICIC), Semarang, Indonesia, 2019.
Ioannis Georgiadis, Michael Dossis, and Sotirios Kontogiannis, "Performance evaluation on IoT devices secure data delivery processes," in Proceedings of the 22nd Pan-Hellenic Conference on Informatics, Athens, Greece, 2018, pp. 306–311.
Alex Biryukov, Dmitry Khovratovich, and Ivica Nikolić, "Distinguisher and Related-Key Attack on the Full AES-256," in Advances in Cryptology - CRYPTO 2009. Lecture Notes in Computer Science, vol 5677. Berlin, Heidelberg: Springer, 2009, pp. 231-249.
Alex Biryukov, Orr Dunkelman, Nathan Keller, Dmitry Khovratovich, and Adi Shamir, "Key recovery attacks of practical complexity on AES-256 variants with up to 10 rounds," in nternational Conference on the Theory and Applications of Cryptographic Techniques, Berlin, Heidelberg., 2010, pp. 299-319.
Bawna Bhat, Abdul Wahid Ali, and Apurva Gupta, "DES and AES performance evaluation," in International Conference on Computing, Communication & Automation, Noida, India, 2015, pp. 887-890.
Simon Heron, "Advanced Encryption Standard (AES)," Network Security Vol 2009 Issue 12, pp. 8-12, 2010.
Ibnu Utomo Wahyu Mulyono, Ajib Susanto, Muhamad Rizky Fajar Febrian, and Ghaitsa Ardelia Rosyida, "A Combination of Hill Cipher and LSB for Image Security," Scientific Journal of Informatics, Vol. 7, No. 1, pp. 155-165, 2020.
Amish Kumar and Namita Tiwari, "Effective Implementation and Avalanche Effect of AES," International Journal of Security, Privacy and Trust Management ( IJSPTM), Vol. 1, No 3/4, pp. 31-35, 2012.
Sriram Ramanujam and Marimuthu Karuppiah, "Designing an algorithm with high Avalanche Effect," IJCSNS International Journal of Computer Science and Network Security, VOL.11 No.1, pp. 106-111, 2011.
Rotem Arnon-Friedman, Frédéric Dupuis, Omar Fawzi, Renato Renner, and Thomas Vidick, "Practical device-independent quantum cryptography via entropy accumulation," Nature Communications, pp. 1-11, 2018.
Bobby Jasuja and Abhishek Pandya, "Crypto-Compression System: An Integrated Approach," International Journal of Computer Applications, Vol 116, No 21, pp. 34-41, 2015.
Amandeep Singh, Praveen Agarwal, and Mehar Chand, "Image Encryption and Analysis using Dynamic AES," in 5th International Conference on Optimization and Applications (ICOA), Kenitra, Morocco, 2019, pp. 1-6.
Georgios Makris and Ioannis Antoniou, "Chaos Cryptography with prescribed Entropy Production," in International Electronic Conference on Entropy and Its Applications, 2015, pp. 1-17.
O. Shoewu and Segun O. Olatinwo, "Securing Text Messages using Elliptic Curve Cryptography and Orthogonal," The Pacific Journal of Science and Technology, Volume 14. Number 2, pp. 220-227, 2013.
Copyright (c) 2020 Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi)
This work is licensed under a Creative Commons Attribution 4.0 International License.
Hak cipta pada setiap artikel adalah milik penulis.
- Penulis mengakui bahwa Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) sebagai publisher yang mempublikasikan pertama kali dengan lisensi Creative Commons Attribution 4.0 International License.
- Penulis dapat memasukan tulisan secara terpisah, mengatur distribusi non-ekskulif dari naskah yang telah terbit di jurnal ini kedalam versi yang lain (misal: dikirim ke respository institusi penulis, publikasi kedalam buku, dll), dengan mengakui bahwa naskah telah terbit pertama kali pada Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) ;