Sistem Presensi Dosen Menggunakan IMEI dan GPS Smartphone dengan Data Terenkripsi
Abstrak
Perbaikan mutu pendidikan tidak hanya dipandang dari sisi kehadiran mahasiswa di kelas tetapi juga yang tidak kalah penting adalah kehadiran tatap muka dengan dosen di kelas. Sistem presensi ini hanya diperuntukkan bagi dua pengguna, yaitu admin dan dosen, di mana admin melakukan pengolahan data dan laporan, sedangkan dosen melakukan presensi melalui perangkat smartphone dengan memanfaatkan IMEI (International Mobile Equipment Identity), dan GPS (Global Positioning System). Keamanan aliran data dalam sistem presensi ini menggunakan algoritme cipher aliran dengan metode pengacakan kunci, yaitu: Hamming code paritas ganjil, tent map, dan session keys. Hasil penelitian menunjukkan bahwa sistem sudah cukup aman karena dibangun menggunakan arsitektur three-tier, adanya security check dari perangkat lunak sistem, dan aliran data terenkripsi dengan nilai korelasi antara plaintext dan ciphertext yang sangat lemah. Sistem presensi ini juga handal dalam mempertahankan komunikasi data antara client dan server selama terjadi pemutusan koneksi internet dan/atauGPS. Laporan pertemuan dosen ini dapat dijadikan masukan bagi decision maker dalam menentukan keabsahan perkuliahan.
Referensi
Azkario Rizky Pratama and Widyawan, "Pedestrian Dead Reckoning pada Ponsel Cerdas sebagai Sistem Penentuan Posisi dalam Ruangan," Jurnal Nasional Teknik Elektro dan Teknologi Informasi (JNTETI), vol. 2, no. 3, pp. 20-25, Agustus 2013.
Teguh Firmansyah, Sabdo Purnomo, Feti Fatonah, and Tri Hendarto Fajar Nugroho, "Antena Mikrostrip Rectangular Patch 1575,42 MHz dengan Polarisasi Circular untuk Receiver GPS," Jurnal Nasional Teknik Elektro dan Teknologi Informasi (JNTETI), vol. 4, no. 4, November 2015.
Hongjun Wu, Cryptanalysis And Design Of Stream Ciphers. Belgium: B-3001 Heverlee, 2008.
Christof Paar and Jan Pelzl, Understanding Cryptography. London New York: Springer-Verlag Berlin Heidelberg, 2010.
Rick Wash. Lecture Notes on Stream Ciphers and RC4. [Online]. http://rickwash.com/papers/stream.pdf
B. K. Gupta and R. L. Dua, "Communication by 31 Bit Hamming Code Transceiver with Even Parity and Odd Parity Check Method by Using VHDL," IJECCT, vol. 2, no. 4, 2012.
Nutan Shep and P. H. Bhagat, "Implementation of Hamming code using VLSI," International Journal of Engineering Trends and Technology, vol. 4, no. 2, 2013.
Rainer Klages. (2008, April) Introduction to Dynamical Systems. [Online]. http://www.maths.qmul.ac.uk/~klages/mas424/lnotes_ds2007f.pdf
Adriana Vlad, Adiran Luca, Octavian Hodea, and Relu Tataru, "Generating Chaotic Secure Sequences Using Tent Map And A Running-Key Approach," in Proceedings Of Romanian Academy, Series A, vol. 14, 2013, pp. 295-302.
Sarika Tyagi and Deepak Chaudhary, "Adapted Encryption Algorithm With Multiple Skew Tent Map," IJCSM, vol. 2, no. 4, pp. 422-428, April 2013.
Wadia Faid Hassan Al-Shameri and Mohammed Abdulkawi Mahiub, "Some Dynamical Properties Of The Family Of Tent Maps," Int. Jornal Of Math. Analysis, vol. 7, no. 29, pp. 1433-1449, 2013.
Justin Guo. (2014) Analysis Of Chaotic Systems. [Online]. http://Math.Uchicago.Edu/~May/Reu2014/Reupapers/Guo.Pdf
N. K. Pareek, Vinod Patidar, and K. K. Sud. (2004) Cryptography Using Multiple One-Dimensional Chaotic Maps. [Online]. www.sciencedirect.com
N. K. Pareek, Vinod Patidar, and K. K. Sud, "Image Encryption Using Chaotic Logistic Map," Elsevier, vol. 24, no. 9, pp. 926-934, 2006.
P. Vidhya Saraswathi and M. Venkatesulu, "A Block Cipher For Multimedia Encryption Using Chaotic Maps For Key Generation," in Proc. Of Int. Conf. on Advances In Information Technology And Mobile Communication, 2013.
Algifari , Analisis Regresi Teori, Kasus dan Solusi, 2nd ed. Yogyakarta: BPFE, 2013.
Shujiang Xu, Yinglong Wang, Jizhi Wang, and Yucui Guo, "A Fast Image Encrytion Scheme Based On A Nonlinear Chaotic Map," in 2nd International Conference On Signal Processing Systems (ICSPS), 5-7 July 2010, pp. v2-326-v2-330.
T. Hongmei, H. Liying, H. Yu, and W. Xia, "An Improved Compound Image Encryption Scheme," in Proceeding of 2010 International Conference on Computer and Communication Technologies in Agriculture Engineering, 2010.
Khaled Loukhaoukha, Jean-Yves Chouinard, and Abdellah Berdai, "A Secure Image Encryption Algorithm Based On Rubik’s Cube Principle," Journal Of Electircal And Computer Engineering, vol. 2012, 2012.
Mohid Kumar, Akshat Aggarwal, and Ankit Garg, "A Review On Various Digital Image Encryption Techniques And Security Criteria," International Journal Of Computer Applications, vol. 96, no. 13, pp. 19-26, 17 June 2013.
Bruce Ratner, Statistical and machine-learning data mining Techniques for better predictive modeling and analysis of big data, 2nd ed.: CRC Press, Taylor & Francis Group, 2011.
Obaida Mohammad Awad Al-Hazaimeh, "A New Approach For Complex Encrypting And Decrypting Data," International Journal of Computer Networks & Communications (IJCNC), vol. 5, no. 2, March 2013.
Firas Shawkat Hamid, Thakwan Akram Jawad, and Ersun Iscioglu, "Study and Analysis New Algorithm for Effective Cryptographic in Telemedicine Purposes Using Hill Cipher after Modification," International Journal of Engineering and Advanced Technology (IJEAT), vol. 3, no. 3, February 2014.
Andy McGovern. (2003) Geographic Distance and Azimuth Calculations. [Online]. http://www.codeguru.com/cpp/cpp/algorithms/article.php/c5115/Geographic-Distance-and-Azimuth-Calculations.htm
© Jurnal Nasional Teknik Elektro dan Teknologi Informasi, di bawah Lisensi Creative Commons Atribusi-BerbagiSerupa 4.0 Internasional.