KEAMANAN TRANSMISI DATA PADA SISTEM IOT MELALUI PENERAPAN METODE CHECKSUM SHA-256, AES-128 UNTUK PENCEGAHAN DATA TAMPERING

Authors

  • I Putu Bayu Krisna Priastawan I Putu Universitas Esa Unggul
  • Nugroho budhisantosa Universitas Esa Unggul
  • Popong Setiawati Universitas Esa Unggul
  • Imam Sutanto Universitas Esa Unggul

DOI:

https://doi.org/10.55123/storage.v4i4.6428

Keywords:

Cyber Security, MQTT, Data Tampering, SHA-256, AES-128

Abstract

MQTT is a communication protocol in IoT that operates using a publish-subscriber scheme, where the publisher sends data to the broker and the data is forwarded to subscribers that are subscribed to the respective topic. Protecting data from cyberattack threats is one of the critical aspects, particularly against manipulation attempts such as data tampering attacks that can make it inaccurate and even potentially produce false information. Therefore, methods such as the SHA-256 checksum, the salt technique, and AES-128 can be utilized to prevent data tampering threats. Based on the testing results, the average detection and prevention rate of data tampering attacks reached 100%, and the average amount of data successfully received by the subscriber was 94% of the total topic data transmissions during the testing. The developed security system is not yet perfect, because the system can only prevent attacks on the subscriber side. To fully prevent data tampering attack, additional security measures such as TLS, SSL, or using port 8883 on MQTT are required so that communication can take place privately.

Downloads

Download data is not yet available.

References

Al-Mashhadani, M., & Shujaa, M. (2022). IoT Security Using AES Encryption Technology based ESP32 Platform. International Arab Journal of Information Technology, 19(2), 214–223. https://doi.org/10.34028/iajit/19/2/8

Anugrah, Y., Hannats, M., Ichsan, H., & Kusyanti, A. (2019). Implementasi Algoritme SHA-256 Menggunakan Protokol MQTT pada Budidaya Ikan Hias (Vol. 3, Issue 4). http://j-ptiik.ub.ac.id

Gerez, A. H., Kamaraj, K., Nofal, R., Liu, Y., & Dezfouli, B. (2019). Energy and Processing Demand Analysis of TLS Protocol in Internet of Things Applications. IEEE Workshop on Signal Processing Systems, SiPS: Design and Implementation, 2018-October, 312–317. https://doi.org/10.1109/SiPS.2018.8598334

Hue, A., Sharma, G., & Dricot, J. M. (2022). Privacy-enhanced mqtt protocol for massive iot. Electronics (Switzerland), 11(1). https://doi.org/10.3390/electronics11010070

Kelechi, A. H., Alsharif, M. H., Agbaetuo, C., Ubadike, O., Aligbe, A., Uthansakul, P., Kannadasan, R., & Aly, A. A. (2021). Design of a low-cost air quality monitoring system using arduino and thingspeak. Computers, Materials and Continua, 70(1), 151–169. https://doi.org/10.32604/cmc.2022.019431

Khudhur, D. D., & Croock, M. S. (2021). Developed security and privacy algorithms for cyber physical system. International Journal of Electrical and Computer Engineering, 11(6), 5379–5389. https://doi.org/10.11591/ijece.v11i6.pp5379-5389

Kumar Shrivastava, R., Mishra, S., E, A. V, Hota, C., & Member, S. (2019). Preventing data tampering in IoT networks. In 2019 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS).

Mangkurat, C. A. (n.d.). RANCANG BANGUN SISTIM KEAMANAN PERANGKAT IoT DENGAN METODE AUTENTIKASI MENGGUNAKAN JSON WEB TOKEN PADA PROTOKOL MQTT.

Marco TORCHIANO Doc Maximilian HILS, S. (2024). Enhancing Network Interception with Mitmproxy An Open Source Solution for Transparent Proxy Mode on macOS and Linux Candidate Emanuele MICHELETTI.

Meylan, A., Cherubini, M., Chapuis, B., Humbert, M., Bilogrevic, I., & Huguenin, K. (2020). A Study on the Use of Checksums for Integrity Verification of Web Downloads. ACM Transactions on Privacy and Security, 24(1). https://doi.org/10.1145/3410154

Nikolov Neven, & Nakov Ognyan. (2019). Developed security and privacy algorithms for cyber physical system. IEEE.

Olazabal, A. A., Kaur, J., & Yeboah-Ofori, A. (2022). Deploying Man-In-the-Middle Attack on IoT Devices Connected to Long Range Wide Area Networks (LoRaWAN). ISC2 2022 - 8th IEEE International Smart Cities Conference. https://doi.org/10.1109/ISC255366.2022.9922377

Pramukantoro, E. S., Andri Bakhtiar, F., Lutfi, A., Aji, B., Prasetya Dewa, D. H., & Komputer, F. I. (2019). IMPLEMENTASI MEKANISME END-TO-END SECURITY PADA IoT MIDDLEWARE IMPLEMENTATION OF END TO END SECURITY IN IOT MIDDLEWARE. 6(3). https://doi.org/10.25126/jtiik.201961401

Rachmadini, D., & Puspasari, I. (2020). Implementasi dan Analisis Fitur Keamanan Protokol MQTT pada Telehealthcare. Journal of Technology and Informatics (JoTI), 2(1).

Rathod, U., Sonkar, M., & Chandavarkar, B. R. (2020, July 1). An Experimental Evaluation on the Dependency between One-Way Hash Functions and Salt. 2020 11th International Conference on Computing, Communication and Networking Technologies, ICCCNT 2020. https://doi.org/10.1109/ICCCNT49239.2020.9225503

TLP:WHITE Compromise of U.S. Water Treatment Facility SUMMARY. (2021). www.fbi.gov/contact-us/field,

Downloads

Published

2025-11-30

Issue

Section

Articles