Over the past 20 years, wireless technology has grown massive, and especially in the past decade wireless technology has completed a big jump almost all devices on local networks are trying to connect wirelessly. This technology is... more
Over the past 20 years, wireless technology has grown massive, and especially in the past decade wireless technology has completed a big jump almost all devices on local networks are trying to connect wirelessly. This technology is standardized by IEEE 802.11 group which is the standard for wireless local area networks. In this paper, we propose analytical approaches based on formulas that are evaluated as system reliability using Reliability Block Diagram. System reliability is closely related to the availability of distribution or service. Security holes in wireless technology were found in the management framework process, specifically when devices were first interconnected. We tested them to try reliability with several attack simulations using modules ESP8266. Our evaluation showed that the proposed solution successfully identifies and the system survives the attack with uninterrupted communication obvious on the wireless network. The results gave more than 90% reliability, were validated by using Reliability Analytics Toolkit
Research Interests:
Artificial intelligence (AI) has become a key driving force in sectors from transportation to healthcare, and is opening up tremendous opportunities for technological advancement. However, behind this promising potential, AI also presents... more
Artificial intelligence (AI) has become a key driving force in sectors from transportation to healthcare, and is opening up tremendous opportunities for technological advancement. However, behind this promising potential, AI also presents serious security challenges. This article aims to investigate attacks on AI and security challenges that must be faced in the era of artificial intelligence, this research aims to simulate and test the security of AI systems due to adversarial attacks. We can use the Python programming language for this, using several libraries and tools. One that is very popular for testing the security of AI models is CleverHans, and by understanding those threats we can protect the positive developments of AI in the future. this research provides a thorough understanding of attacks in AI technology especially in neural networks and machine learning, and the security challenge we face is that adding a little interference to the input data causes the AI model to...
Research Interests:
Dalam era digital saat ini, otomatisasi tugas administratif dan manajemen telah menjadi suatu kebutuhan yang mendesak dalam upaya meningkatkan efisiensi dan produktivitas. Dalam penelitian ini, kami menyajikan analisis otomatisasi tugas... more
Dalam era digital saat ini, otomatisasi tugas administratif dan manajemen telah menjadi suatu kebutuhan yang mendesak dalam upaya meningkatkan efisiensi dan produktivitas. Dalam penelitian ini, kami menyajikan analisis otomatisasi tugas administratif dan manajemen menggunakan platform chatbot yang dikembangkan dengan Python. Dalam analisis ini, kami mengidentifikasi beberapa tugas administratif yang sering terjadi dalam lingkungan digital, termasuk pengelolaan User atau user management, pengelolaan tugas, dan penyediaan informasi dasar kepada pengguna. Penelitian ini mencakup analisis kebutuhan dan identifikasi tugas administratif dan manajemen yang paling relevan dalam konteks lingkungan digital. pengembangan dan konfigurasi Chatbot menggunakan Python dan pustaka terkait untuk mengimplementasikan logika dan proses yang diperlukan untuk tugas-tugas administratif, pengujian dan evaluasi kinerja Chatbot dalam menangani tugas-tugas tersebut, termasuk kecepatan respons, akurasi, dan keh...
This paper provides an overview of the wireless handoff process on wireless networks by investigating Authentication Protocol using EAP -AKA (Extensible Authentication Protocol) - Authentication and Key Agreement The EAP-AKA protocol was... more
This paper provides an overview of the wireless handoff process on wireless networks by investigating Authentication Protocol using EAP -AKA (Extensible Authentication Protocol) - Authentication and Key Agreement The EAP-AKA protocol was developed for LAN networks or mobile network devices, the authors found ineffective network procedures guaranteed that made the attacks MITM and DoS attacks may occur. In addition, we find the storage procedures and resource submissions not safe enough to withstand DoS attacks. Focusing on Both types of attacks, the authors are interested in existing security protocol methods and written by researchers, then perform Systematic Literature Review (SLR) by using international journals database ie from the IEEE organization with the use of wireless handoff attack keyword in the middle of the world and obtained some related journals which need further research to deepen the Systematic Literature review, by offering a structured, methodical, and meticulou...
Perkembangan teknologi dan internet sangat mempengaruhi peradaban manusia dan nilai-nilai sosial, termasuk adat istiadat budaya serta kebiasaan dalam pergaulan , saat ini begitu banyak aplikasi media sosial semua hampir semua hal... more
Perkembangan teknologi dan internet sangat mempengaruhi peradaban manusia dan nilai-nilai sosial, termasuk adat istiadat budaya serta kebiasaan dalam pergaulan , saat ini begitu banyak aplikasi media sosial semua hampir semua hal dibagikan di internet promosi, bisnis, pendidikan,kesehatan,pemerintahan, berita, politik, teknologi sampai kegiatan sehari-hari seperti makan, minum, rekreasi, pertandingan bola dibagikan di media sosial. penulis melihat fenomena ini sebagai hal yang menarik dan sangat berhubungan dengan kemajuan teknologi mobil atau kendaraan roda empat salah satu hasil dari teknologi tidak bisa dipisahkan dengan kegiatan manusia mobil yang sekarang ini menjadi bagian dari kemajuan teknologi pengembangan dan implementasi teknologi baru, terutama Internet yang sekarang umumnya dikenal sebagai Internet of Things (IOT).