Javascript must be enabled to continue!
IMPLEMENTASI CHALLENGE RESPONSE AUTHENTICATION MECHANISM (CRAM) UNTUK KEAMANAN TRANSAKSI PERANGKAT IoT
View through CrossRef
This research aims to secure data transaction in Internet of Things (IoT)devices using the challenge-response authentication mechanism (CRAM). The research choose uses ESP 8266 and ESP 32 to develop the system for their ability to run micropython programming language. Using a random challenge to grant authentication protects the system from replay attack from intruders. In each authentication process, the client receives a 10 digit random number to be encrypted using a shared key and sent back to the server. The server then checks if the client posses the correct key by decrypting the encrypted challenge using the same shared key. Access is granted if the decryption result is equal to the original challenge.
Title: IMPLEMENTASI CHALLENGE RESPONSE AUTHENTICATION MECHANISM (CRAM) UNTUK KEAMANAN TRANSAKSI PERANGKAT IoT
Description:
This research aims to secure data transaction in Internet of Things (IoT)devices using the challenge-response authentication mechanism (CRAM).
The research choose uses ESP 8266 and ESP 32 to develop the system for their ability to run micropython programming language.
Using a random challenge to grant authentication protects the system from replay attack from intruders.
In each authentication process, the client receives a 10 digit random number to be encrypted using a shared key and sent back to the server.
The server then checks if the client posses the correct key by decrypting the encrypted challenge using the same shared key.
Access is granted if the decryption result is equal to the original challenge.
Related Results
Design of a Metrics for Teaching Quality on Cram Schools Business
Design of a Metrics for Teaching Quality on Cram Schools Business
Due to the pressure of fierce competition, many parents worry about their children being unable to compete with their peers. Besides the regular school class, they have engaged the...
PEMANTAUAN DAN PENGENDALIAN JARAK JAUH PADA SISTEM LISTRIK BEBAS UNTUK APLIKASI INTERNET OF THINGS (IOT)
PEMANTAUAN DAN PENGENDALIAN JARAK JAUH PADA SISTEM LISTRIK BEBAS UNTUK APLIKASI INTERNET OF THINGS (IOT)
Latar Belakang : Penggunaan Internet of Things (IoT) telah merevolusi cara kita berinteraksi dengan lingkungan sekitar dan mengoptimalkan berbagai aspek kehidupan sehari-hari. Namu...
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
Abstract
In some situations, the transfer of authentication authority is necessary for user authentication. In traditional authentication, a trust mechanism based on a trus...
A critical evaluation of the new cram‐down tool in Singapore's restructuring regime
A critical evaluation of the new cram‐down tool in Singapore's restructuring regime
AbstractSingapore has recently reformed its insolvency regime in its efforts to be an international restructuring hub. To that end, Singapore has attempted to take an autochthonous...
MATAKULIAH "PROJEK PERANGKAT LUNAK" UNTUK MENGATASI KESENJANGAN TEORI DAN PRAKTIK PEMBANGUNAN PERANGKAT LUNAK
MATAKULIAH "PROJEK PERANGKAT LUNAK" UNTUK MENGATASI KESENJANGAN TEORI DAN PRAKTIK PEMBANGUNAN PERANGKAT LUNAK
Kemajuan teknologi pada dekade kini menunjukkan bahwa pemanfaatan peralatan elektronika seperti personal komputer, pembangkit kontrol manufaktur, dan peralatan otomatisasi lainnya ...
An Authentication and Key Agreement Scheme Based on Roadside Unit Cache for VANET
An Authentication and Key Agreement Scheme Based on Roadside Unit Cache for VANET
Vehicular Ad Hoc Network (VANET) is a wireless Mobile Ad Hoc Network that is used for communication between vehicles, vehicles and fixed access points, and vehicles and pedestrians...
Blockchain-Based Anonymous Authentication in Edge Computing Environment
Blockchain-Based Anonymous Authentication in Edge Computing Environment
Authentication is an important requirement for the security of edge computing applications. The existing authentication schemes either frequently rely on third-party trusted author...
Pengaruh IOT terhadap Kemudahan Akses Penyebaran Agama Islam di Era Globalisasi
Pengaruh IOT terhadap Kemudahan Akses Penyebaran Agama Islam di Era Globalisasi
In the era of globalization, Internet of Things (IoT) technology has changed the way information is disseminated and accessed, including in the context of spreading Islam. This stu...

