Optimasi Keamanan Autentikasi dari Man in the Middle Attack (MiTM) Menggunakan Teknologi Blockchain
Main Article Content
Abstract
Article Details
Submission of an original manuscript to the journal will be taken to mean that it represents originality work not previously published. Please see JIEET (Journal of Information Engineering and Educational Technology) originality guidelines for details. Use this in conjunction with the points below about references, before submission i.e. always attribute clearly using either indented text or quote marks as well as making use of the preferred IEEE style of formatting. Authors submitting articles for publication warrant that the work is not an infringement of any existing copyright and will indemnify the publisher against any breach of such warranty. For ease of dissemination and to ensure proper policing of use, papers and contributions become the legal copyright of the publisher unless otherwise agreed.
The editor may make use of Thurnitin software for checking the originality of submissions received.
References
A. Fauzan N I, œTeknologi Blockchain dan Peranannya dalam Era Digital, Jurnal BJB University, vol. 4, pp. 115, 2018.
M. D. K. Perdani, W. Widyawan, and P. I. Santosa, œBlockchain untuk Keamanan Transaksi Elektronik Perusahaan Financial Technology (Studi Kasus pada PT XYZ), Semnasteknomedia, vol. 6, no. 1, pp. 712, 2018.
F. Septa and R. Umar, œAnalisis kepuasan pengguna sistem informasi e-government menggunakan metode webqual 4.0 (studi kasus: website simsarpras kementerian agama), METHOMIKA: Jurnal Manajemen Informatika & Komputerisasi Akuntansi, vol. 3, no. 2, 2019.
C. E. Suling, M. Olivya, and R. Nur, œPrototype Pengembangan Autentikasi Login Menggunakan Teknologi Quick Respone Code, in Seminar Nasional Teknik Elektro dan Informatika (SNTEI) 2017, 2017, no. November, pp. 156161.
R. Firdaus, D. Kurniawan, and E. C. Simamora, œImplementasi metode autentikasi one time password (otpa) berbasis mobile token pada aplikasi ujian online (studi kasus¯: jurusan matematika fmipa unila), in Prosiding SNSMAIP III-2012, 2012.
R. Munadi, Z. Musliyana, and T. Y. Arif, œPeningkatan Sistem Keamanan Otentikasi Single Sign On (SSO) Menggunakan Algoritma AES dan One-Time Password Studi Kasus: SSO Universitas Ubudiyah Indonesia, Jurnal Rekayasa Elektrika, vol. 12, no. 1, pp. 2129, 2016.
D. Saputra and I. Riadi, œNetwork Forensics Analysis of Man in the Middle Attack Using Live Forensics Method, International Journal of Cyber-Security and Digital Forensics, vol. 8, no. 1, pp. 6673, 2019, doi: 10.17781/p002558.
R. A. Sowah, K. B. Ofori-Amanfo, G. A. Mills, and K. M. Koumadi, œDetection and prevention of man-in-the-middle spoofing attacks in MANETs using predictive techniques in Artificial Neural Networks (ANN), Journal of Computer Networks and Communications, vol. 2019, 2019, doi: 10.1155/2019/4683982.
P. Radhika, G. Ramya, K. Sadhana, and R. Salini, œDefending Man In The Middle Attacks, International Research Journal of Engineering and Technology(IRJET), vol. 4, no. 3, pp. 579585, 2017.
William Stallings, Cryptography and Network Security, 4th ed. Prentice Hall, 2005.
G. D. Putra, S. Sumaryono, and W. Widyawan, œRancang Bangun Identity and Access Management IoT Berbasis KSI dan Permissioned Blockchain, Jurnal Nasional Teknik Elektro dan Teknologi Informasi (JNTETI), vol. 7, no. 4, pp. 384390, 2018, doi: 10.22146/jnteti.v7i4.455.
Caroline Harris, œThe History of Bitcoin, 2019. [Online]. Available: https://cryptocurrencynews.com/the-history-of-bitcoin/. [Accessed: 24-Feb-2020].
R. C. Noorsanti, H. Yulianton, and K. Hadiono, œBlockchain - Teknologi Mata Uang Kripto ( Crypto Currency ), Prosiding SENDI_U, vol. 3, p. 306, 2018.
D. Efanov and P. Roschin, œThe All-Pervasiveness of the Blockchain Technology, in Procedia Computer Science, 2018, pp. 116121, doi: https://doi.org/10.1016/j.procs.2018.01.019.
R. Zhang, R. Xue, and L. Liu, œSecurity and privacy on blockchain, ACM Computing Surveys, vol. 52, no. 3, 2019, doi: 10.1145/3316481.
S. Barjtya, A. Sharma, and U. Rani, œA detailed study of Software Development Life Cycle (SDLC) Models, International Journal Of Engineering And Computer Science ISSN, vol. 6, no. 7, pp. 2209722100, 2017, doi: 10.18535/ijecs/v6i7.32.
Ian Sommerville, Software Engineering, 9th Edition, 9th ed. Scotland: University of St Andrews, 2011.
Y. Irawan, œPengujian Sistem Informasi Pengelolaan Pelatihan Kerja UPT BLK Kabupaten Kudus dengan Metode Whitebox Testing, Sentra Penelitian Engineering dan Edukasi, vol. 9, no. 3, pp. 5963, 2017.
S. Alfisahrin, œPendekatan White Box Testing Untuk Menentukan Kualitas Perangkat Lunak Dengan Menggunakan Bahasa Pemrograman C++, Paradigma, vol. XIV, no. 1, pp. 6978, 2012.
H. B. I. Alfaris, C. Anam, and A. Masyan, œImplementasi Black Box Testing Pada Sistem Informasi Pendaftaran Santri Berbasis Web Dengan Menggunakan PHP Dan MYSQL, Jurnal Sains dan Teknologi, vol. 6, no. 1, pp. 2338, 2013.