It is predicted that the growth of smart devices installed in the smart home ecosystem will increase in the future. Smart devices that are connected to each other using wired or wireless networks that have the potential for security holes are attacked by threat actors. Whereas a house is a place that provides comfort for its residents. An attack on the smart home ecosystem allows the operation of the smart home ecosystem to be disrupted or personal information stolen to be used by irresponsible parties. To face the high wave of smart home implementation in the future with potential security holes that always accompany it. This is in accordance with the principle that no system is 100% secure. In this study, attacks on wireless networks can be detected as anomalous traffic. Monitoring and detection in the smart home ecosystem involves supporting components such as sensors, access points, gateway collectors and analysis stacks.
Redundancy and robustness are the most common problems in a wireless network distribution system, network system problems that are not able to handle coverage areas in a large / wide coverage, so that the network users are easily disconnected from the connection and out of the server radius. These problems are caused by topology and wireless network distribution methods that are not in accordance with the needs and coverage of its users. However, adding a number of access points en masse to expand the network without being based on appropriate applied methods, is not necessarily able to minimize complaints from network users. Starting from the problems described in the previous paragraph, in this study a wireless distribution mesh system topology (WDS mesh) will be built to improve utility and network usage in the area / radius of the area between access points using wireless lines and minimize cable requirements which are generally the main constraints in network deployment and installation to areas that are difficult to reach. The topology built in this research will implement the wireless routing protocol that results from the analysis and observation process to expand the expansion of service areas to places that are difficult to reach. The wireless routing protocol method used in this study is the Made Mesh Easy (MME) method which is one of the developments of the Interior Gateway Routing Protocol (IGRP) method. Evaluation of the wireless routing protocol in the WDS mesh network topology will be carried out periodically to obtain the results of the analysis that will be used to re-configuring and rerouting to maintain the quality of the network remains realiable. Mesh clients will give feedback on the quality of service obtained based on observations according to IEEE 802.11 standardization.
Wireless network distribution is the right solution to disseminate network services in places and areas that are difficult to reach by cable networks. The effort to add a number of access points is intended to increase the coverage area of a network service so that the signal coverage can be even and broad. The development and improvement of wireless network users have made management and user management activities not easy, because of the way wireless technology works in the operational delivery of its packages, sorting and dividing the packages into 3 parts. Among them are packaged in the form of management, control, and data. Whereas if the management prioritizes data without considering management and control, the emergence of vulnerability in network distribution activities will occur when users are increasingly populated. To facilitate the flexibility and mobility of centralized wireless network users, this study utilizes VLANs that will be implemented at OSI Layer 2 to facilitate the classification of user-profiles, subnetting, securing, and roaming features between access point devices and their users. This research in its testing uses QoS parameters that refer to ITU G.165 / G.168 to monitor the quality of services provided. The parameters used in the measurement of interconnection include Throughput, Packet Loss Ratio, Latency, Jitter, and Delay. If the test is declared successful and complete, it is continued by analyzing and evaluating the results of the study in the hope that the system will successfully cluster the users based on the user characteristic dataset
Tim Tanggap Insiden Siber Spanyol pada tahun 2021 menyatakan bahwa penggunaan mata uang kripto mengalami pertumbuhan. Hal ini selaras dengan indikasi pertumbuhan tindak kejahatan cryptojacking yang memanfaatkan mata uang kripto. Penambangan mata uang kripto memerlukan sumber daya yang besar. Terindikasi adanya oknum yang melakukan aktivitas penambangan menggunakan sumber daya ilegal, dan aktivitas ini dapat dikatakan sebagai tindak kejahatan cryptojacking. Berdasarkan sistem indexing Scopus, pada rentang tahun 2018 - 2021 terdapat 94 artikel penelitian terkait tindak kejahatan cryptojacking. Negara yang cukup aktif melakukan penelitian tindak kejahatan cryptojacking adalah Tiongkok, India, dan Amerika Serikat. Untuk memperdalam kajian tindak kejahatan cryptojacking, diperlukan pengetahuan tentang keamanan sistem dan jaringan komputer, malicous software (malware), dan mata uang elektronik seperti bitcoin, ethereum, litecoin, dan sebagainya. Dengan menggunakan analisis bibliometrika, dapat dilakukan kajian lebih lanjut menggunakan kata kunci atau tren dari sebuah topik penelitian. Selain itu, hal ini mempermudah peneliti dalam melakukan pemetaan topik-topik lanjutan.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.