KEAMANAN TRANSMISI DATA PADA SISTEM IOT MELALUI PENERAPAN METODE CHECKSUM SHA-256, AES-128 UNTUK PENCEGAHAN DATA TAMPERING
DOI:
https://doi.org/10.55123/storage.v4i4.6428Keywords:
Cyber Security, MQTT, Data Tampering, SHA-256, AES-128Abstract
MQTT is a communication protocol in IoT that operates using a publish-subscriber scheme, where the publisher sends data to the broker and the data is forwarded to subscribers that are subscribed to the respective topic. Protecting data from cyberattack threats is one of the critical aspects, particularly against manipulation attempts such as data tampering attacks that can make it inaccurate and even potentially produce false information. Therefore, methods such as the SHA-256 checksum, the salt technique, and AES-128 can be utilized to prevent data tampering threats. Based on the testing results, the average detection and prevention rate of data tampering attacks reached 100%, and the average amount of data successfully received by the subscriber was 94% of the total topic data transmissions during the testing. The developed security system is not yet perfect, because the system can only prevent attacks on the subscriber side. To fully prevent data tampering attack, additional security measures such as TLS, SSL, or using port 8883 on MQTT are required so that communication can take place privately.
Downloads
References
Al-Mashhadani, M., & Shujaa, M. (2022). IoT Security Using AES Encryption Technology based ESP32 Platform. International Arab Journal of Information Technology, 19(2), 214–223. https://doi.org/10.34028/iajit/19/2/8
Anugrah, Y., Hannats, M., Ichsan, H., & Kusyanti, A. (2019). Implementasi Algoritme SHA-256 Menggunakan Protokol MQTT pada Budidaya Ikan Hias (Vol. 3, Issue 4). http://j-ptiik.ub.ac.id
Gerez, A. H., Kamaraj, K., Nofal, R., Liu, Y., & Dezfouli, B. (2019). Energy and Processing Demand Analysis of TLS Protocol in Internet of Things Applications. IEEE Workshop on Signal Processing Systems, SiPS: Design and Implementation, 2018-October, 312–317. https://doi.org/10.1109/SiPS.2018.8598334
Hue, A., Sharma, G., & Dricot, J. M. (2022). Privacy-enhanced mqtt protocol for massive iot. Electronics (Switzerland), 11(1). https://doi.org/10.3390/electronics11010070
Kelechi, A. H., Alsharif, M. H., Agbaetuo, C., Ubadike, O., Aligbe, A., Uthansakul, P., Kannadasan, R., & Aly, A. A. (2021). Design of a low-cost air quality monitoring system using arduino and thingspeak. Computers, Materials and Continua, 70(1), 151–169. https://doi.org/10.32604/cmc.2022.019431
Khudhur, D. D., & Croock, M. S. (2021). Developed security and privacy algorithms for cyber physical system. International Journal of Electrical and Computer Engineering, 11(6), 5379–5389. https://doi.org/10.11591/ijece.v11i6.pp5379-5389
Kumar Shrivastava, R., Mishra, S., E, A. V, Hota, C., & Member, S. (2019). Preventing data tampering in IoT networks. In 2019 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS).
Mangkurat, C. A. (n.d.). RANCANG BANGUN SISTIM KEAMANAN PERANGKAT IoT DENGAN METODE AUTENTIKASI MENGGUNAKAN JSON WEB TOKEN PADA PROTOKOL MQTT.
Marco TORCHIANO Doc Maximilian HILS, S. (2024). Enhancing Network Interception with Mitmproxy An Open Source Solution for Transparent Proxy Mode on macOS and Linux Candidate Emanuele MICHELETTI.
Meylan, A., Cherubini, M., Chapuis, B., Humbert, M., Bilogrevic, I., & Huguenin, K. (2020). A Study on the Use of Checksums for Integrity Verification of Web Downloads. ACM Transactions on Privacy and Security, 24(1). https://doi.org/10.1145/3410154
Nikolov Neven, & Nakov Ognyan. (2019). Developed security and privacy algorithms for cyber physical system. IEEE.
Olazabal, A. A., Kaur, J., & Yeboah-Ofori, A. (2022). Deploying Man-In-the-Middle Attack on IoT Devices Connected to Long Range Wide Area Networks (LoRaWAN). ISC2 2022 - 8th IEEE International Smart Cities Conference. https://doi.org/10.1109/ISC255366.2022.9922377
Pramukantoro, E. S., Andri Bakhtiar, F., Lutfi, A., Aji, B., Prasetya Dewa, D. H., & Komputer, F. I. (2019). IMPLEMENTASI MEKANISME END-TO-END SECURITY PADA IoT MIDDLEWARE IMPLEMENTATION OF END TO END SECURITY IN IOT MIDDLEWARE. 6(3). https://doi.org/10.25126/jtiik.201961401
Rachmadini, D., & Puspasari, I. (2020). Implementasi dan Analisis Fitur Keamanan Protokol MQTT pada Telehealthcare. Journal of Technology and Informatics (JoTI), 2(1).
Rathod, U., Sonkar, M., & Chandavarkar, B. R. (2020, July 1). An Experimental Evaluation on the Dependency between One-Way Hash Functions and Salt. 2020 11th International Conference on Computing, Communication and Networking Technologies, ICCCNT 2020. https://doi.org/10.1109/ICCCNT49239.2020.9225503
TLP:WHITE Compromise of U.S. Water Treatment Facility SUMMARY. (2021). www.fbi.gov/contact-us/field,
Downloads
Published
Issue
Section
License
Copyright (c) 2025 I Putu Bayu Krisna Priastawan I Putu, Nugroho budhisantosa, Popong Setiawati, Imam Sutanto

This work is licensed under a Creative Commons Attribution 4.0 International License.



















