Papers by Muhamad Al Fikri

Formal Verification of the Authentication and Voice Communication Protocol Security on Device X Using Scyther Tool
IOP Conference Series: Materials Science and Engineering, 2021
In the current era, the ownership of strategic information and the ability to effectively manage ... more In the current era, the ownership of strategic information and the ability to effectively manage it has become a significant advantage. Reflecting on the experience of attacks on strategic communications in Indonesia, including the tapping of the former President Susilo Bambang Yudhoyono’s conversation through the cellular network and President Jokowi’s official residence, Indonesia has begun paying more attention to security in this sector. Device X is one of the secret strategic communication tools used in Indonesia. The XYZ Agency initiated the use of this device. As of 2020, there have been 1,284 units of Device X widely used by the army, police officers, and other strategic agencies in Indonesia. In its 5 years of operation, the XYZ Agency has researched the algorithm security used in Device X. However, there has never been a study of thwe security regarding the authentication and communication protocols of this device. This research aims to make a security analysis of voice co...

Cloud computing is a technology that allows users to save on the computation cost. By using cloud... more Cloud computing is a technology that allows users to save on the computation cost. By using cloud computing, users no longer need to think about software license and operating systems Users can even use a virtual computer which is provided by the cloud service provider.Some information technology companies such as Google and Microsoft has been providing cloud computing services. The price paid to obtain these services also varied, ranging from free to paid per month. However, there is absolutely no security for user's data in the untrusted public cloud which is a free service. The uploaded data by the user can be downloaded by anyone. Therefore, this research proposed an access control mechanism based on asymmetric encryption for group communications on untrusted public cloud along with effective key management. Access control using multiple keys, namely public key, private key, and the key group. The application of access control can protect user's data stored in the cloud ...

Procedia Computer Science, 2019
Risk management is a practical step in handling risk scenarios in an organization, including in t... more Risk management is a practical step in handling risk scenarios in an organization, including in the field of information security. There are many techniques used to carry out information security risk assessments. One of them is a combination technique using ISO 27005 and NIST SP 800-30 revision 1. Previous research proved that the combination technique could be implemented in a non-profit organization (government). However, the detailed risk assessment steps are not explained clearly yet. Thus, raising the question of whether this new approach can be utilized in a common organization or not (not only non-profit but also profit organization). This research focuses on information security risk assessment by implementing the combination technique in a profit organization using semi-quantitative methods. The result, the combination technique can be used in common organizations both profit and non-profit with clear step by step translation.

Comparison of the Energy Efficiency in Fat-Tree and B-Cube Based Data Center Network
Nowadays, in order to accommodate the growth in demand for computing resources, adding more power... more Nowadays, in order to accommodate the growth in demand for computing resources, adding more power and cooling capacity to existing data centers or build new data centers is required. However, both of these options are extremely expensive. Therefore, improving energy efficiency has become a paramount necessity for data centers. The right architecture and topology design will be able to produce effective use of energy and increase performance. Taking into account the servers and network without the cooling aspect in data center energy efficiency, and the increasing trend of network simulator in data center network research, this paper aims to answer the emerging question by comparing two most common network topologies (Fat-Tree and B-Cube) in data center using Network Simulator 3 (NS3) tool. Despite having difference in nature, those two topologies have an equalized form to be compared. In this research, the focus of energy efficiency study is to determine whether the difference of nature in Fat-Tree and B-Cube topology will affect the energy consumption in the data center using an assumption of energy consumption for a certain network device. The result, despite the small amount, B-Cube is proven to be 0.003141% better than Fat-Tree in term of energy use.
Uploads
Papers by Muhamad Al Fikri