Papers by ferry astika
2019 5th International Conference on Science in Information Technology (ICSITech)
Many smart city applications have implemented the Wireless Sensor Network (WSN) as a solution to ... more Many smart city applications have implemented the Wireless Sensor Network (WSN) as a solution to solve urban problems. WSN has characteristics with an energy source that must remain lit, the ability to overcome node failures, node heterogeneity, ability to withstand extreme environmental conditions, mobility of nodes and dynamic network topology, scalability for large-scale deployment. However, there are various kinds of machine to machine (M2M) protocol that are used on Smart City based on WSN to connect between sensor devices or the internet. To choose the appropriate protocol and small packet loss probability is not easy. This research aims to implement the Message Queuing Telemetry Transport-Sensor Network (MQTT-SN) Protocol to overcome the limitations of the WSN-based protocol on Smart City sensors. MQTT-SN is an M2M connectivity protocol that is designed for sensor networks that are simple, lightweight, and easy to implement, so they can support and monitor small devices with wider data transmission. Implementation was built on the waspmote hardware using the MQTT-SN protocol for sensor communication with the server. Data transmission uses the XBee module to optimize and still be done in real time. The implementation uses a star topology and analyzes the Quality of Service (QoS) performance and power consumption used on the sensor nodes. Based on the analysis results, there is no packet loss when using the MQTT-SN, HTTP, and CoAP protocols. Temperature sensor, light sensor, and dust sensor data can be monitored remotely using the MQTT-SN protocol.
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
ABSTRACT
Bookmarks Related papers MentionsView impact
2013 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT), 2013
ABSTRACT One application considered for IEEE 802.15.4 standard Low Rate-Wireless Personal Area Ne... more ABSTRACT One application considered for IEEE 802.15.4 standard Low Rate-Wireless Personal Area Network (LR-WPAN) is wireless sensor network and control application that is centered on the performance of IEEE 802.15.4 standard for star and cluster topology. This study conduct performance comparison of beacon-enabled mode on star and cluster topology IEEE 802.15.4 standard by analyzing the result of throughput, delay, and energy consumption in order to get the maximum result to apply the appropriate topology model as needed. We conduct analysis on each topology model by using the numbers of nodes from 10 nodes to 100 nodes to analyze throughput, delay, energy consumption, and probability success packet. The simulation results show that the lifetime node and throughput of cluster topology are higher than that of star topology.
Bookmarks Related papers MentionsView impact
Journal of Southwest Jiaotong University, 2021
Snort is one of the well-known signature-based network intrusion detection systems (NIDS). The Sn... more Snort is one of the well-known signature-based network intrusion detection systems (NIDS). The Snort sensor placement must be in the same physical network. The defense center in the typical NIDS architecture cause limited network coverage to be monitored, especially for remote networks with restricted bandwidth and network policy. Moreover, the increasing number of sensor instances, followed by a rapid increase in log data volume, caused the existing system to face Big data challenges. This research paper aims to propose a novel design of cloud-based Snort NIDS using containers and implementing Big data in the defense center to overcome these problems. Our design consists of Docker as the sensor's platform, Apache Kafka as the distributed messaging system, and various big data technology orchestrated on lambda architecture. Experiments are conducted to measure sensor deployment, optimum message delivery from sensors to the defense center, and aggregation speed, and data processi...
Bookmarks Related papers MentionsView impact
Internet attacks are a frequent occurrence and the incidence is always increasing every year, the... more Internet attacks are a frequent occurrence and the incidence is always increasing every year, therefore Matagaruda project is built to monitor and analyze internet attacks using IDS (Intrusion Detection System). Unfortunately, the Matagaruda project has lacked in the absence of trend analysis and spatiotemporal analysis. It causes difficulties to get information about the usual seasonal attacks, then which sector is the most attacked and also the country or territory where the internet attack originated. Due to the number of unknown clusters, this paper proposes a new method of automatic bisecting K-means with the average of SSE is 93 percents better than K-means and bisecting K-means. The usage of big spark data is highly scalable for processing massive data attack.
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
inproceedings by ferry astika
Bookmarks Related papers MentionsView impact
Uploads
Papers by ferry astika
inproceedings by ferry astika