Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 22843 dokumen yang sesuai dengan query
cover
Ejaz, Waleed
"This book introduces the concept of smart city as the potential solution to the challenges created by urbanization. The Internet of Things (IoT) offers novel features with minimum human intervention in smart cities. This book describes different components of Internet of Things (IoT) for smart cities including sensor technologies, communication technologies, big data analytics and security."
Switzerland: Springer Cham, 2019
e20502859
eBooks  Universitas Indonesia Library
cover
"This book provides an overview of the most recent developments in Internet of Things (IoT) security and data protection. It presents the results of several international research projects addressing this topic from complementary angles. It starts by analyzing the main privacy and security threats on IoT, as well as the evolution of data protection norms, such as the European General Data Protection Regulation (GDPR), and their impact on IoT. Through a comprehensive and systematic approach, the contributors present new perspectives on IoT & Cloud Computing security requirements. They discuss the most recent approach to support trusted IoT, including new models of privacy risk assessment, labeling and certification, and contractual tools (such as Privacy PACT). Practical implementations, such as in the European Large Scale Pilots on IoT for Smart Cities (Synchronicity), are presented, explaining how they address security, privacy and data protection. Finally, innovative models to secure IoT systems are presented for the network and end-nodes security, including network threats analysis.
Shares results from several international research projects on IoT, cybersecurity, and privacy;
Combines complementary expertise from top experts in IoT, security, and data protection;
Provides a comprehensive view on how to protect IoT deployments and make them comply with the GDPR."
Switzerland: Springer Nature, 2019
e20509083
eBooks  Universitas Indonesia Library
cover
Jamalipour, Abbas
"This textbook introduces Wireless Powered Communication Networks (WPCNs) as a promising paradigm to overcome the energy bottleneck suffered by traditional wireless communication networks, as well as emerging Internet-of-Things networks. It selectively spans a coherent spectrum of fundamental aspects in WPCNs, such as wireless energy transfer (WEH) techniques, radio frequency (RF) energy harvesting receiver model, simultaneous wireless information and power transfer (SWIPT), as well as the rate-energy tradeoff arising from the joint transmission of information and energy using the same waveform. It covers network models for WPCNs, including the baseline and dual-hop WPCN models and a variety of related extensions. This book further examines the key factors including throughput, fairness, and security that must be taken into account for impeccable operation of WPCNs. The new IoT applications are targeted as a key element in those factors. It will also include exercises and examples throughout the book, as well as their PLS solutions.
This is the first textbook examining the current research to provide a unified view of wireless power transfer (WPT) and information transmission in WPCNs from a physical layer security (PLS) perspective. Focused on designing efficient secure transmission schemes, analyzing energy evolvement process, and evaluating secrecy outage performance under different channel state information (CSI), the results presented in this book shed light on how to best balance security and throughput with prudent use of harvested energy in WCNs. It also provides an overview of the WPCNs by introducing the background of WPT, followed by a summary of the research conducted in the field. The authors describe the physical-layer security (PLS) problem in WPCNs, including the causes and the impacts of the problem on the performance of WPCNs. The authors extend the discussions by introducing the applications of WPCNs in the IoT.
From the Internet of Things (IoT) point of view, this textbook reviews the opportunities and challenges for the lately-emerged WPCN to seamlessly integrate into the IoT ecosystem. It specifically addresses the maximization problem of uplink and downlink sum-throughout in a dual-hop WPCN, while taking fairness among WPCN users as a constraint. The results provided in this book reveal valuable insights into improving the design and deployment of future WPCNs in the upcoming IoT environment.
This textbook targets advanced-level students studying wireless communications and research engineers working in this field. Industry engineers in mobile device and network development business with an interest in WPCNs and IoT, as well as their PLS solutions, will also find this book useful."
Switzerland: Springer Cham, 2019
e20502860
eBooks  Universitas Indonesia Library
cover
Rachma Maharani Ulfa
"

Internet of things (IoT) seringkali menjadi target serangan Distributed Denial of Service (DDoS) pada perangkat mereka. Ini karena ekosistem IoT menggunakan sistem terpusat untuk mengendalikan dirinya sendiri. Blockchain menggunakan sistem distribusi terdesentralisasi sehingga tidak memerlukan otoritas dari pihak ketiga untuk memberikan kontrol verifikasi dalam mengidentifikasi block transaksi yang ada di dalam node ini.  Penggunaan Blockchain dapat diimplementasikan ke dalam ekosistem IoT dalam mengelola aliran data dan transaksi dan dapat mengelola manajemen akses yang aman dan andal yang mendukung ekosistem tepercaya. Integrasi blockchain pada IoT membutuhkan metode Smart Contract sebagai solusi untuk mendukung konsep keamanan jaringan seperti kerahasiaan, integritas, dan keseterdiaan.


Internet of things (IoT) is often the target of Distributed Denial of Service (DDoS) attacks on their devices. This is because the IoT ecosystem uses a centralized system to control itself. Blockchain uses a decentralized distribution system so that it does not require authority from a third party to provide verification control in identifying transaction blocks that exist within this node. The use of Blockchain can be implemented into the IoT ecosystem in managing data flow and transactions and can manage secure and reliable access management that supports trusted ecosystems. Blockchain integration in IoT requires Smart contract method as a solution to support the concept of network security such as confidentiality, integrity and integrity.

"
Depok: Fakultas Teknik Universitas Indonesia, 2020
T-pdf
UI - Tesis Membership  Universitas Indonesia Library
cover
"This book covers various aspects of security, privacy and reliability in Internet of Things (IoT) and Cyber-Physical System design, analysis and testing. In particular, various established theories and practices both from academia and industry are presented and suitably organized targeting students, engineers and researchers. Fifteen leading academicians and practitioners wrote this book, pointing to the open problems and biggest challenges on which research in the near future will be focused."
Switzerland: Springer Nature, 2019
e20509832
eBooks  Universitas Indonesia Library
cover
Insan Laksana Pribadi
"ABSTRAK
Internet of Things IoT merupakan salah satu teknologi yang sedang berkembang dimana memungkinkan setiap benda seperti alat kesehatan, mesin produksi, mobil, TV, benda lainnya dapat saling terhubung melalui internet. Namun, terdapat beberapa tantangan yang perlu menjadi perhatian semua pihak, salah satunya adalah potensi ancaman terhadap keamanan data dan privasi.Di Indonesia sendiri, sudah ada regulasi yang mengatur keamanan data dan transaksi elektronik. Regulasi tersebut antara lain PP No. 82 Tahun 2012, UU No. 11 Tahun 2008, dan Permen Kominfo No. 4 Tahun 2016. Namun ketiga regulasi tersebut tidak secara spesifik mengatur masalah keamanan data dan privasi pada layanan Internet of Things IoT . Sehingga di perlukan sebuah regulasi yang khusus mengatur masalah keamanan data dan privasi pada layanan IoT.Penelitian ini menggunakan metode Privacy Impact Assessment PIA dan mengambil salah satu domain IoT, yakni Smart Healthcare. Sebagai hasil dari penelitian, di dapat 5 faktor yang perlu di atur dalam regulasi terkait aspek keamanan data dan privasi pada layanan Internet of Things Smart Heathcare , yakni security compliance, device security, secure communication, virtualization security, dan application security. Untuk security compliance, di rekomendasikan untuk menerapkan sertifikasi ISO/TC 215 Health Informatics. Untuk aspek device security, direkomendasikan untuk menerapkan Trusted Computing Base TCB . Untuk aspek secure communication di haruskan menggunakan Virtual Private Network VPN . Untuk aspek virtualization security, di haruskan menerapkan beberapa mitigasi seperti provisioning, hardening, firewall, access control, dan IDPS. Dan untuk aspek application security, di haruskan untuk menerapkan beberapa mitigasi seperti secure programming, static code analysis, automated pentest, dan web application firewall.

ABSTRACT
Internet of Things IoT is one of the emerging technologies which allow any objects such as medical equipment, production machinery, cars, TVs, and other objects can be interconnected through the Internet. However, there are several challenges that need to be considerate of all parties, one of which is a potential threat to data security and privacy.In Indonesia, there are some existing regulations governing the security of data and electronic transactions. PP No. 82 Tahun 2012, UU No. 11 Tahun 2008, and Permen Kominfo No. 4 Tahun 2016 about Information Security Management System ISMS . However, these three regulations are not specifically control the issue of data security and privacy on the services of Internet of Things IoT . Thus, required a special regulation governing the data security and privacy on services of Internet of Things IoT .This research using Privacy Impact Assessment PIA methods and take one of the IoT domain, Smart Healthcare. As a result, there are 5 factors that need to be set in regulations related aspects of data security and privacy on the Internet of Things services Smart Heathcare security compliance, device security, secure communications, virtualization security, and application security. For security compliance, it 39 s recommended to apply ISO TC 215 Health Informatics. For the aspects of security devices, it is recommended to implement the Trusted Computing Base TCB . For secure communication aspects in required to use a Virtual Private Network VPN . For security aspects of virtualization, in required to apply some mitigation such as provisioning, hardening, firewalls, access control, and IDPS. And for aspects of application security, be required to implement some mitigation such as secure programming, static code analysis, automated pentest, and web application firewall."
2017
T46908
UI - Tesis Membership  Universitas Indonesia Library
cover
"The aim of this book is to stimulate research on the topic of the Social Internet of Things, and explore how Internet of Things architectures, tools, and services can be conceptualized and developed so as to reveal, amplify and inspire the capacities of people, including the socialization or collaborations that happen through or around smart objects and smart environments.
From new ways of negotiating privacy, to the consequences of increased automation, the Internet of Things poses new challenges and opens up new questions that often go beyond the technology itself, and rather focus on how the technology will become embedded in our future communities, families, practices, and environment, and how these will change in turn."
Switzerland: Springer Cham, 2019
e20501952
eBooks  Universitas Indonesia Library
cover
"This book discusses the challenges in the convergence of technologies as the Internet of Things (IoT) evolves. These include sensing, computing, information processing, networking, and controlling intelligent technologies. The contributors first provide a survey of various assessment and evaluation approaches available for successful convergence. They then go on to cover several operational ideas to apply. The contributors then discuss the challenges involved bridging gaps in computation and the communication process, hidden networks, intelligent decision making, human-to-machine perception and large-scale IoT environments. The contributors aim to provide the reader an overview of trends in IoT in terms of performability and traffic modeling and efforts that can be spent in assessing the graceful degradation in IoT paradigms.
- Provides a survey of IoT assessment and evaluation approaches;
- Covers new and innovative operational ideas that apply to the IoT industry and the industries it affects;
- Includes chapters from researchers and industry leaders in IoT from around the world."
Switzerland: Springer Cham, 2019
e20502433
eBooks  Universitas Indonesia Library
cover
Valya Sandria Akiela
"

Internet of Things (IoT) tidak hanya mengubah cara perangkat berinteraksi dan terhubung, tetapi juga membawa risiko keamanan serius, seperti kebocoran data. Penelitian ini mengatasi masalah tersebut dengan menggabungkan Advanced Encryption Standard (AES) dan shift left security. AES digunakan untuk mengenkripsi data yang ditransmisikan melalui perangkat IoT dengan mempertimbangkan keterbatasan sumber daya komputasi, khususnya pada perangkat Smart Fan System, yang bekerja dengan mengaktifkan mini fan berdasarkan threshold suhu tertentu yang dapat dimonitor melalui web app. Pada penelitian ini, shift left security diterapkan untuk mengidentifikasi dan mengatasi kerentanan sejak tahap awal pengembangan. Efektivitas integrasi AES dan shift left security diuji dengan membandingkan waktu eksekusi dan kerentanan keamanan. Penetration testing dilakukan terhadap SQL injection, Man in the Middle (MITM) attack, dan Distributed Denial of Service (DDoS) attack. Hasil penelitian menunjukkan peningkatan keamanan sebesar 66.67% dengan waktu eksekusi 485.51 ms pada sistem IoT yang mengintegrasikan AES dan shift left security, tanpa penurunan performa signifikan. Meskipun efektif terhadap SQL injection dan MITM attack, sistem masih rentan terhadap DDoS attack, sehingga diperlukan strategi tambahan yang lebih komprehensif. Penelitian ini diharapkan memberikan kontribusi penting dalam desain perangkat IoT yang lebih aman dan andal di masa depan.


The Internet of Things (IoT) not only transforms how devices interact and connect but also brings serious security risks, such as data breaches. This study addresses these issues by combining Advanced Encryption Standard (AES) and shift left security. AES is used to encrypt data transmitted through IoT devices, considering computational resource limitations, particularly in the Smart Fan System, which operates by activating a mini fan based on specific temperature threshold that can be monitored via a web app. In this research, shift left security is applied to identify and address vulnerabilities from the early stages of development. The effectiveness of integrating AES and shift left security is tested by comparing execution time and security vulnerabilities. Penetration testing is conducted against SQL injection, Man in the Middle (MITM) attack, and Distributed Denial of Service (DDoS) attack. The results show a 66.67% increase in security with an execution time of 485.51 ms in the IoT system integrating AES and shift left security, without significant performance degradation. Although effective against SQL injection and MITM attacks, the system remains vulnerable to DDoS attacks, indicating the need for more comprehensive strategies. This research is expected to make a significant contribution to the design of more secure and reliable IoT devices in the future.

"
Depok: Fakultas Teknik Universitas Indonesia, 2024
S-pdf
UI - Skripsi Membership  Universitas Indonesia Library
cover
Cahyo Nugroho
"Internet of Things (IoT) diprediksi akan menjadi masa depan bisnis digital di Indonesia. Pangsa pasar IoT diperkirakan akan berkembang pesat seiring dengan bertambahnya perangkat sensor yang terpasang. Narrowband IoT (NB-IoT) yang dispesifikasikan 3GPP dengan berbasis teknologi Long Term Evolution (LTE) di-deploy pada network seluler exisiting, diprediksi akan menjadi kontributor utama berkembangnya IoT seluler. Dalam studi ini dilakukan perencanaan network NB-IoT dengan peruntukan penggunaan utilitas smart meter di area Jakarta. Perencanaan dilakukan sesuai target KPI untuk coverage dan kualitas jaringan dengan hasil diperlukannya 111 Evolved Node B (eNodeB). Dari sisi kapasitas, jumlah eNodeB tersebut sudah mencukupi prediksi kebutuhan untuk device listrik, air, dan gas sampai dengan tahun 2029. Hal ini terlihat dari utilisasi network yang masih mencapai 7.39% berdasar perhitungan dari simulasi troughput, sedangkan dari perhitungan berdasar kapasitas rekomendasi 3GPP diperoleh utilisasi 27.57%. Selain itu juga dilakukan tinjauan tekno ekonomi secara ringkas, baik dari sisi sisi operator seluler sebagai penyedia jaringan, maupun perusahaan listrik sebagai pengguna jasa jaringan NB-IoT tersebut dengan hasil nilai NPV yang positif.

The Internet of Things (IoT) is predicted to become the future of digital business in Indonesia. The IoT market share is expected to grow rapidly as more sensor devices are installed. Specified Narrowband IoT (NB-IoT) 3GPP with Long Term Evolution (LTE) technology-based deployed on exisiting cellular networks,it is predicted to be the main contributor to the development of cellular IoT. In this study, NB-IoT network planning was carried out with the use of smart meters utilities in the Jakarta area. Planning is carried out according to the KPI target for network coverage and quality with the results of requiring 111 Evolved Node B (eNodeB). In terms of capacity, the number of eNodeBs is sufficient to cover estimated needs for electricity, water and gas devices up to 2029. This can be seen from network utilization which still reaches 7.39% based on calculations from throughput simulation, while from calculations based on 3GPP recommendation capacity obtained utilization of 27.57%. In addition, a brief techno-economic review was carried out, both from the side of cellular operators as network providers, as well as electricity companies as users of the NB-IoT network services with positive NPV values."
Depok: Fakultas Teknik Universitas Indonesia, 2019
T53348
UI - Tesis Membership  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>