Sistem Presensi Dosen Menggunakan IMEI dan GPS Smartphone dengan Data Terenkripsi

Adriana Fanggidae, Yulianto Triwahyuadi Polly

Abstract


The improvement of education quality is determined not only by student's attendance but also lecturer's attendance in class. In this paper, control system of lecturer's attendance has been developed. This system requires two types of users, which are administrator and lecturer. The administrator is responsible for data analysis and report. The lecturer confirms his/her attendance using smartphone by utilising IMEI (International Mobile Equipment Identity) and GPS (Global Positioning System). The security of the data flow in this attendance system is built using the stream cipher algorithm with three key randomization methods: odd parity Hamming code, tent map and session keys. Research finds that this contol system of lecturer's attendance is secure because of the following reasons. First, it has been built using three-tier architecture. Second, there is a security check from software system. And lastly data flow is encrypted with low correlation between plaintext and ciphertext. Furthermore, the sytem is reliable because when internet and/or GPS is lost, data between client and server is kept and is delivered once there is internet and/or GPS connection. Report of lecturer's attendance from this system is reliable and hence it is recommended to be used for lecturers' attendance report.

Full Text:

PDF

References


Azkario Rizky Pratama and Widyawan, "Pedestrian Dead Reckoning pada Ponsel Cerdas sebagai Sistem Penentuan Posisi dalam Ruangan," Jurnal Nasional Teknik Elektro dan Teknologi Informasi (JNTETI), vol. 2, no. 3, pp. 20-25, Agustus 2013.

Teguh Firmansyah, Sabdo Purnomo, Feti Fatonah, and Tri Hendarto Fajar Nugroho, "Antena Mikrostrip Rectangular Patch 1575,42 MHz dengan Polarisasi Circular untuk Receiver GPS," Jurnal Nasional Teknik Elektro dan Teknologi Informasi (JNTETI), vol. 4, no. 4, November 2015.

Hongjun Wu, Cryptanalysis And Design Of Stream Ciphers. Belgium: B-3001 Heverlee, 2008.

Christof Paar and Jan Pelzl, Understanding Cryptography. London New York: Springer-Verlag Berlin Heidelberg, 2010.

Rick Wash. Lecture Notes on Stream Ciphers and RC4. [Online]. http://rickwash.com/papers/stream.pdf

B. K. Gupta and R. L. Dua, "Communication by 31 Bit Hamming Code Transceiver with Even Parity and Odd Parity Check Method by Using VHDL," IJECCT, vol. 2, no. 4, 2012.

Nutan Shep and P. H. Bhagat, "Implementation of Hamming code using VLSI," International Journal of Engineering Trends and Technology, vol. 4, no. 2, 2013.

Rainer Klages. (2008, April) Introduction to Dynamical Systems. [Online]. http://www.maths.qmul.ac.uk/~klages/mas424/lnotes_ds2007f.pdf

Adriana Vlad, Adiran Luca, Octavian Hodea, and Relu Tataru, "Generating Chaotic Secure Sequences Using Tent Map And A Running-Key Approach," in Proceedings Of Romanian Academy, Series A, vol. 14, 2013, pp. 295-302.

Sarika Tyagi and Deepak Chaudhary, "Adapted Encryption Algorithm With Multiple Skew Tent Map," IJCSM, vol. 2, no. 4, pp. 422-428, April 2013.

Wadia Faid Hassan Al-Shameri and Mohammed Abdulkawi Mahiub, "Some Dynamical Properties Of The Family Of Tent Maps," Int. Jornal Of Math. Analysis, vol. 7, no. 29, pp. 1433-1449, 2013.

Justin Guo. (2014) Analysis Of Chaotic Systems. [Online]. http://Math.Uchicago.Edu/~May/Reu2014/Reupapers/Guo.Pdf

N. K. Pareek, Vinod Patidar, and K. K. Sud. (2004) Cryptography Using Multiple One-Dimensional Chaotic Maps. [Online]. www.sciencedirect.com

N. K. Pareek, Vinod Patidar, and K. K. Sud, "Image Encryption Using Chaotic Logistic Map," Elsevier, vol. 24, no. 9, pp. 926-934, 2006.

P. Vidhya Saraswathi and M. Venkatesulu, "A Block Cipher For Multimedia Encryption Using Chaotic Maps For Key Generation," in Proc. Of Int. Conf. on Advances In Information Technology And Mobile Communication, 2013.

Algifari , Analisis Regresi Teori, Kasus dan Solusi, 2nd ed. Yogyakarta: BPFE, 2013.

Shujiang Xu, Yinglong Wang, Jizhi Wang, and Yucui Guo, "A Fast Image Encrytion Scheme Based On A Nonlinear Chaotic Map," in 2nd International Conference On Signal Processing Systems (ICSPS), 5-7 July 2010, pp. v2-326-v2-330.

T. Hongmei, H. Liying, H. Yu, and W. Xia, "An Improved Compound Image Encryption Scheme," in Proceeding of 2010 International Conference on Computer and Communication Technologies in Agriculture Engineering, 2010.

Khaled Loukhaoukha, Jean-Yves Chouinard, and Abdellah Berdai, "A Secure Image Encryption Algorithm Based On Rubik’s Cube Principle," Journal Of Electircal And Computer Engineering, vol. 2012, 2012.

Mohid Kumar, Akshat Aggarwal, and Ankit Garg, "A Review On Various Digital Image Encryption Techniques And Security Criteria," International Journal Of Computer Applications, vol. 96, no. 13, pp. 19-26, 17 June 2013.

Bruce Ratner, Statistical and machine-learning data mining Techniques for better predictive modeling and analysis of big data, 2nd ed.: CRC Press, Taylor & Francis Group, 2011.

Obaida Mohammad Awad Al-Hazaimeh, "A New Approach For Complex Encrypting And Decrypting Data," International Journal of Computer Networks & Communications (IJCNC), vol. 5, no. 2, March 2013.

Firas Shawkat Hamid, Thakwan Akram Jawad, and Ersun Iscioglu, "Study and Analysis New Algorithm for Effective Cryptographic in Telemedicine Purposes Using Hill Cipher after Modification," International Journal of Engineering and Advanced Technology (IJEAT), vol. 3, no. 3, February 2014.

Andy McGovern. (2003) Geographic Distance and Azimuth Calculations. [Online]. http://www.codeguru.com/cpp/cpp/algorithms/article.php/c5115/Geographic-Distance-and-Azimuth-Calculations.htm




DOI: http://dx.doi.org/10.22146/jnteti.v5i3.249

Refbacks

  • There are currently no refbacks.


Copyright (c) 2016 Jurnal Nasional Teknik Elektro dan Teknologi Informasi (JNTETI)

JNTETI (Jurnal Nasional Teknik Elektro dan Teknologi Informasi)

Departemen Teknik Elektro dan Teknologi Informasi, Fakultas Teknik Universitas Gadjah Mada
Jl. Grafika No 2. Kampus UGM Yogyakarta 55281
+62 274 552305
jnteti@ugm.ac.id