Prototype Pengembangan Aplikasi Login menggunakan Teknologi Blockchain
Abstract
The internet is developing so fast, from the kinds of internet technolgy to something that is needed by every user. Information needs and an extensive network system give the easier to access. One of them is wireless, wireless is very helpful for internet users. However, the problem often arises in wireless securing network. Many attacks that make the username and password of the users get hacked. Based on these problems, this study focuses on securing when users login user a device. One of the innovative technologies that be able to solve these problems is Blockchain Technology. By using blockchain technology adversaries will find the difficulty to change and modify the same data on all computers at the same time because it will take the time so long to crack the encryption code on each block of sata on the entire computer network. This study used literature study as a data collection technique. Browsing method using the internet or other network media. This result of this research is the system prototype has been successfully built. The prototype for the development of this login system application has succeed in securing data such as of username and password using blockchain technology. User data is secured and converted into encryption block.
Downloads
References
Y. N. Kunang dan T. Ibadi, “Celah Keamanan Sistem Autentikasi Wireless Berbasis RADIUS,” Celah Keamanan Sist. Autentikasi Wirel. Berbas. Radius, vol. 34, no. 2, hal. 1907–5022, 2013.
M. Rusdan dan M. Sabar, “Analisis dan Perancangan Jaringan Wireless Dengan Wireless Distribution System Menggunakan User Authentication Berbasis Multi-Factor Authentication,” Jt. (Journal Inf. Technol., vol. 02, no. 01, hal. 17–24, 2020.
U. Rahardja, E. P. Harahap, dan D. D. Christianto, “Pengaruh Teknologi Blockchain Terhadap Tingkat Keaslian Ijazah,” Technomedia J., vol. 4, no. 2, hal. 211–222, 2019.
E. P. Harahap, Q. Aini, dan R. K. Anam, “Pemanfaatan Teknologi Blockchain Pada Platform Crowdfunding,” Technomedia J., vol. 4, no. 2, hal. 199–210, 2019.
L. Ismanto, H. S. Ar, A. N. Fajar, Sfenrianto, dan S. Bachtiar, “Blockchain as E-Commerce Platform in Indonesia,” J. Phys. Conf. Ser., vol. 1179, no. 1, 2019.
X. Zhu dan D. Wang, “Research on Blockchain Application for E-Commerce, Finance and Energy,” IOP Conf. Ser. Earth Environ. Sci., vol. 252, no. 4, 2019.
A. Alam, S. M. Zia Ur Rashid, M. Abdus Salam, dan A. Islam, “Towards Blockchain-Based E-voting System,” 2018 Int. Conf. Innov. Sci. Eng. Technol. ICISET 2018, hal. 351–354, 2018.
S. Shorman, M. Allaymoun, dan O. Hamid, “Developing the E-Commerce Model a Consumer To Consumer Using Blockchain Network Technique,” Int. J. Manag. Inf. Technol., vol. 11, no. 02, hal. 55–64, 2019.
Y. W. Chang, K. P. Lin, dan C. Y. Shen, “Blockchain Technology for e-Marketplace,” 2019 IEEE Int. Conf. Pervasive Comput. Commun. Work. PerCom Work. 2019, hal. 429–430, 2019.
M. A. Abdillah, A. Yudhana, dan A. Fadil, “Sniffing Pada Jaringan WiFi Berbasis Protokol 802.1x Menggunakan Aplikasi Wireshark,” J-SAKTI (Jurnal Sains Komput. dan Inform., vol. 4, no. 1, hal. 1, 2020.
R. Sundaramoorthy, K. Rajapandiyan, V. Palanivelayudham, dan U. Muthukrishnan, “Interoperability Solution for Ieee 802.1x Based Authentication Unsupported Customer Premises Equipment,” Proc. 2019 3rd IEEE Int. Conf. Electr. Comput. Commun. Technol. ICECCT 2019, hal. 1–5, 2019.
I. Wiratama dan P. Sugiartawan, “Peningkatan Keamanan Wireless Pada Jaringan Komputer di Universitas Amikom Menggunakan Protokol IEEE802.1X,” J. Sist. Inf. dan Komput. Terap. Indones., vol. 2, no. 1, hal. 155–164, 2019.
U. Rahardja, Q. Aini, M. Yusup, dan A. Edliyanti, “Penerapan Teknologi Blockchain Sebagai Media Pengamanan Proses Transaksi E-Commerce,” Comput. Eng. Sci. Syst. J., vol. 5, no. 1, hal. 28–32, 2020.
S. Gupta dan M. Sadoghi, “Encyclopedia of Big Data Technologies,” Encycl. Big Data Technol., no. May, 2020.
S. Damai dkk., “Implementasi Blockchain : Studi Kasus e-Voting,” J. Infra Petra, no. 031, 2019.
O. Novo, “Scalable access management in IoT using blockchain: A performance evaluation,” IEEE Internet Things J., vol. 6, no. 3, hal. 4694–4701, 2019.
N. I. Fauzan, “Teknologi Blockchain Dan Peranannya Dalam Era Digital,” vol. 4, hal. 1–15, 2018.
T. Salman, M. Zolanvari, A. Erbad, R. Jain, dan M. Samaka, “Security services using blockchains: A state of the art survey,” IEEE Commun. Surv. Tutorials, vol. 21, no. 1, hal. 858–880, 2019.
W. S. Raharjo, I. D. E. K. Ratri, H. Susilo, J. Wahidin, dan S. Yogyakarta, “Implementasi Two Factor Authentication Dan Protokol Zero Knowledge Proof Pada Sistem Login,” vol. 3, no. April, hal. 127–136, 2017.
H. Han, C. Wu, S. Gao, dan G. Zu, “An assessment approach of the power system vulnerability considering the uncertainties of wind power integration,” China Int. Conf. Electr. Distrib. CICED, no. 201804270000656, hal. 741–745, 2018.
Copyright (c) 2021 Imam Riadi, Herman Herman, Aulyah Zakilah Ifani
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License (Attribution-ShareAlike 4.0 International (CC BY-SA 4.0) ) that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).