SlideShare a Scribd company logo
1 of 7
Download to read offline
TELKOMNIKA, Vol.17, No.2, April 2019, pp.712~718
ISSN: 1693-6930, accredited First Grade by Kemenristekdikti, Decree No: 21/E/KPT/2018
DOI: 10.12928/TELKOMNIKA.v17i2.11755  712
Received August 6, 2018; Revised October 20, 2018; Accepted December 25, 2018
KAFA: A novel interoperability open framework to
utilize Indonesian electronic identity card
Rolly Maulana Awangga*, Nisa Hanum Harani, Muhammad Yusril Helmi Setyawan
Applied of Informatics Engineering Politeknik Pos Indonesia, Indonesia
*Corresponding author, e-mail: awangga@poltekpos.ac.id
Abstract
Indonesian people have electronic citizen card called e-KTP. e-KTP is NFC based technology
embedded inside Indonesian citizenship identity card. e-KTP technology has never been used until now
since it was launch officially by the government. This research proposes an independent framework for
bridging the gap between Indonesia regulation for e-KTP and commercial use in the many commercial or
organization sector. The Framework proposes interoperability framework using novel combination
component, there are e-KTP reader, Middleware and Web Service. KAFA (e-KTP Middleware and
Framework) implementing Internet of Things (IoT) concept to make it as open standard and independent.
The framework use federation mode or decentralized data for interoperability, to make sure not breaking
the law of privacy. Extended development of AES-CBC cipher algorithm was used to encrypt the data on
the transport between middleware and web service.
Keywords: AES-CBC, e-KTP, interoperability, KAFA, web service
Copyright © 2019 Universitas Ahmad Dahlan. All rights reserved.
1. Introduction
The use of ID on identity is essential as a single identity number that distinguishes one
data from another. As stated in the Presidential Regulation of The Republic of Indonesia
Number 35 The Year 2010 that NIK-based ID cards contain security codes and electronic
recordings as a means of verifying and validating the identity data of the population [1].
Currently, Indonesia applies the identity identifier with a technology-based identity card system
with electronic ID card (e-KTP card). The e-KTP card technology is the technology incorporated
into the contactless smart card technology [2]. The identity or resident information of the e-KTP
card stored in a data center [3] and stored in a physical form of an e-ID card. e-KTP use Near
Field Communication (NFC) technology. NFC is a short-range radio technology that allows
communication between devices by touching each other or holding adjacent devices [4]. NFC
itself is quite simple, done by using radio frequency. NFC device itself is divided into two
classes, namely the target device and initiator [5]. Near Field Communication (NFC) is one of
the new technologies used in faster, cheaper and more secure data transfers [4].
At the present time, several research in e-KTP card among others can be used for the
needs in transactional activities that assist in the validity of the data for example in the general
election system [6] besides e-KTP card can be used as a tool in home security system [7]. and
has been im-plemented in several sectors, including electronic payments [4]. In this case, there
is a gap problem in interoperability standard for using e-KTP to integrate in the organization
process business. In the logistics sector for example, require consumer data such as data
sender and receiver. Currently, there are many disadvantages in logistic distribution schemes,
such as consumer information errors. Also, the use of paper in recording consumer information
is quite tricky because the courier must perform manual authentication data [8]. So with the
e-KTP card can be used for authentication of data validity so that data used more accurate
compared to manual recording. Frameworks are used as guides to build something that extends
the structure into something useful. TOGAF is a framework that provides detailed methods for
building and managing enterprise information sys-tems and architectures [9]. TOGAF can
optimize the overall aspect of the company’s environment in order to respond to changes. This
framework is suitable for designing corporate governance. Federation Model is a method in
enterprise architecture that allows interoperability and division of business lines and information
technology semi-autonomously. This research proposes a novel interoperability Framework for
TELKOMNIKA ISSN: 1693-6930 
KAFA: A novel interoperability open framework to... (Rolly Maulana Awangga)
713
e-KTP. The framework proposing as open standard and independent using open hardware and
software.
2. Research Method
KAFA (e-KTP Middleware and Framework) is a framework developing using IoT
concept. IoT is a concept that has the purpose of expanding the benefits of internet connection.
In IoT it provides connectivity on physical sensors that can generate messages between
objects. IOT works by translating the programming language we have put into the tool called
Microcontroller. Arduino provides you with a library that is relatively clean, and trades flexibility
for simplicity. Given the data, the AES-CBC method involves a process of encryption and
decryption that can produce plaintext. AES-CBC cipher algoritm was use to secure
communication flow. And to be able to visualize all the models in one tool we will use the
concept of federation modeling.
2.1. IoT
The IoT concept is that we can connect, communicate and manage multiple devices
au-tomatically with countless remote networks. It is a scenario in which storage, computing and
communication technologies are embedded in everyday objects. Processing, storage and
commu-nication capabilities attached to an object turns object into a service for which users pay
per use [10]. Web service is also a big part of IoT. The low computational web service [11] also
developing in this research.
2.2. Open Hardware
Arduino is an open-source platform to facilitate the use of electronics in various fields.
Arduino uses Atmel AVR processor and its software has its own programming language (often
referred to as a microcontroller) or IDE (Integrated Development Environment) that runs on your
computer, used to write and upload computer code to the physical board. IDE is a software
used to write and compile programs for Arduino. Arduino IDE is also used to upload compiled
programs to the Arduino board program memory [7].
2.3. NFC
Near Field Communication (NFC) is a kind of communicational technology, which run
wirelessly at a high frequency; and it can work in 20 cm by 13.56 MHz. It can transmit data at
three speeds which are respectively 106 Kbit/s, 212 Kbit/s and 424Kbit/s. The NFC has two
work modes which are initiative mode and passive mode [12]. Card emulation mode: In this
mode, the NFC tag is equivalent to an IC card which adopts RFID technology. The NFC tag can
replace many IC cards used now (including credit, card entrance card used in supermarket,
easy card, control card, ticket to vehicle, ticket to door and so on). In this mode, it is a great
advantageous that the RF domain of Non-contact card reader can supply power to NFC tags;
so, the tag can work even the host device is out of battery. The NFC tag must be equipped with
Security Element (SE for short) if it wants to apply the function of Card Emulation [8].
NFC reader has two tasks, receive commands from software and communicate
between NFC tags. NFC reader is a link between software applications with antenna will radiate
radio waves to NFC tags. Radio waves emitted by the antenna gathered in the room around it.
so that the data can be transferred wirelessly from or to the NFC tag located adjacent to the
antenna [13]. In this discussion, NFC reader built by two microcontrollers that are arduino UNO
board and NFC shield PN532. Communications between arduino UNO board and NFC shield
PN532 can be using I2C (Inter-Integrated Circuit Communications, pronounced I squared C)
protocol or SPI (Serial-Peripheral or Interface) protocol [14].
2.4. AES-CBC URL Encrypt
AES-CBC is one of the standard methods of encryption also known as The Rijndael
algorithm [15]. AES is a symmetric key algorithm to helps prevent information from being
passed in clear text. Both the sender and the receiver use a single key for encryption and
decryption of up to 16 characters, and an initialization vector. [16]. This process requires a
minimum of 128 bits of data in the encryption. The AESCBC method involves an Initialization
Vector (IV) for XOR operations. Both encryption and decryption process is done with a key.
 ISSN: 1693-6930
TELKOMNIKA Vol. 17, No. 2, April 2019: 712-718
714
They must have a data length of 128 bits [17]. The process of encryption and decryption is as
follows: To perform an encryption operation, a plaintext must have a length of multiple data of
128 bits XOR and IV will be operated on the first plaintext before it is encrypted by the key. The
encryption process creates a ciphertext. Then it will be decrypted by the key first. After the
decryption process, XOR operation and IV are performed to the decryption result to produce
plaintext [16].
AES-CBC is adopted by many organizations around the world. Because it has simplicity
and flexibility in the implementation stage. AES-CBC is used in various applications ranging
from smart cards to large servers. In fact, hardware implementations of AES are well suited to
resource-constrained embedded applications like satellites [16]. Several other advantages of
choosing AES-CBC is that these are symmetric key ciphers, lightweight and more secured
when compared to others [18]. The cipher is merged with the created instance of the AES
algorithm [19]. Typically, the CPU memory on these IoT devices is a scarce resource. Hence,
implementation of AES CBC will not cause memory footprint overloads [18].
2.5. Federation Model
The federation model best suits in the situation where an existing collection of
autonomous and possibly heterogeneous databases are required to be shared. After
authentication, the user can request data from any one of the databases within the federation.
The owner institution has full control over local databases and has liberty of choosing among
different configurations for different levels of autonomy, degree of replication, and
cross-registration of each data resource [20]. The Cloud Architecture also implementing
Federation model as single-sign-on authentication [21], real-time application [22], a service
model [23], scalable peer-to-peer approach [24], and a reservoir model [25].
3. Experiment and Results
KAFA consisting three parts of platform shows in Figure 1 the reader, IoT and
database. e-KTP Reader is an open hardware now with arduino and PN532 sensor.
Middle-ware has bridging between e-KTP Reader to Web Service. Middleware read serial
communication from e-KTP Reader using USB and pass it to the Web Service.
Figure 1. Architecture design of KAFA
URL Encryption was used between Middleware and Web Service using AES-CBC
cipher algoritm base additional random character called Cilok Library. The algorithm of Cilok
library shows in Figure 2, Cilok is a library that uses AES CBC. Web Service receive e-KTP ID
data from Middleware and follow up to the next process in Application or Database. Application
and Database is business process area where is it come from any service of Application to
integrate with e-KTP Open Middleware Platform.
TELKOMNIKA ISSN: 1693-6930 
KAFA: A novel interoperability open framework to... (Rolly Maulana Awangga)
715
Figure 2. AES-CBC function on python code
3.1. e-KTP Reader
Open Hardware was chosen to built e-KTP Reader to fullfill Open Standar of this
Frame-work. e-KTP reader consisting PN532 sensor and Arduino. PN532 Sensor connects
ed to Arduino to read NFC on e-KTP. The wiring between arduino and PN532 sensor shows in
Table 1. PN532 has set in the I2C mode. After wiring, the code from 3 push to the Arduino,
Figure 3 show some code in Arduino to read NFC tags in e-ktp. The readers read NFC ID of
e-KTP and pass it to serial communication to the computer.
Figure 3. Arduino code to read e-KTP ID
 ISSN: 1693-6930
TELKOMNIKA Vol. 17, No. 2, April 2019: 712-718
716
Table 1. PN532 and Arduino Wiring
PN532 Sensor Pin Arduino Pin
VCC 5V
GND GND
SDA A4
SCL A5
3.2. Middleware and Web Service Deployment
The middleware code using python shows in Figure 4. The e-KTP ID passes from
Mid-dleware to web service after encrypted using AES-CBC cipher algorithm in Figure 4. The
Web service receiving e-KTP ID data and decrypt is. The web service code shows in Figure 5.
The web service is customable to connect many API or Application or database in existing
business environment. The demonstration shows in Figure 6.
Figure 4. ser2http middleware to establish communication between arduino and web service
Figure 5. e-KTP 1.0 web service code using
python flask
Figure 6. e-KTP
device demonstration
4. Conclusion
KAFA is a first release of open standard for e-KTP interoperability. The framework is
independent for utilizing indonesian electronic identity card into many business process.
TELKOMNIKA ISSN: 1693-6930 
KAFA: A novel interoperability open framework to... (Rolly Maulana Awangga)
717
The connection of Interoperability can develop in many ways using web service on Framework.
Every components in Framework can be develop to the next version of Framework. e-KTP
reader can be replaced with other sensor or device which is open hardware. Middleware
development can be use another programming and implement more efficient encryption to be
more functional. Communication between Middleware and Web Service can be develop in
others internet protocol.
Acknowledgement
This research was funded by Direktorat Riset dan Pengabdian Masyarakat, Direktorat
Jendral Penguat Riset dan Pengembangan Kementrian Riset, Teknologi, dan Pendidikan Tinggi
Republik Indonesia by Penelitian Dosen Pemula Scheme.
References
[1] Sekretariat Negara. Presidential Regulation of The Republic Of Indonesia Number 35 OF 2010 (in
Indonesia: Peraturan Presiden Republik Indonesia Nomor 35 Tahun 2010). 2012: 23–25.
[2] M E Aminanto, S Sutikno. Development of Protection Profile and Security Target for Indonesia
Electronic ID Card’s (KTP-e) Card Reader Based on Common Criteria v3. 1: 2012/SNI ISO/IEC
15408: 2014. in Advanced Informatics: Concept, Theory and Application (ICAICTA), 2014
International Conference of, IEEE. 2014: 1–6.
[3] AK Darwis, C Lim. Design and Implementation of e-ktp (Indonesian Electronic Identity Card) Key
Management System. in Advanced Computer Science and Information System (ICACSIS), 2011
International Conference on, IEEE. 2011: 143–146.
[4] NE Tabet, MA Ayu. Analysing The Security of NFC Based Payment Systems. in Informatics and
Computing (ICIC), International Conference on, IEEE. 2016: 169–174.
[5] S Batool, NA Saqib, MA. Khan. Internet of Things Data Analytics for User Authentication and Activity
Recognition. in Fog and Mobile Edge Computing (FMEC), 2017 Second International Conference on,
IEEE. 2017: 183–187.
[6] N Hakiem, A Mutholib, U Aditiawarman. Mobile Based Development of A Voter Information
Management System (Sipendalih) for the 2014 Indonesian Presidential Election: Case of indonesian
voters in Malaysia. in Information and Communication Technology for The Muslim World (ICT4M).
2014 The 5
th
International Conference on, IEEE. 2014: 1–4.
[7] M Andriansyah, M Subali, I Purwanto, SA Irianto, RA Pramono. e-KTP as The Basis of Home
Security System Using Arduino UNO. in Computer Applications and Information Processing
Technology (CAIPT), 2017 4
th
International Conference on, IEEE. 2017: 1–5.
[8] J Cui, D She, J Ma, Q Wu, J Liu. A New Logistics Distribution Scheme Based on NFC. in Network
and Information Systems for Computers (ICNISC), 2015 International Conference on, IEEE.
2015: 492–495.
[9] NH Harani, AA Arman, RM Awangga. Improving togaf adm 9.1 migration planning phase by itil v3
service transition. Journal of Physics: Conference Series. 2018; 1007(1): 012036.
[10] D Navani, S Jain, M S Nehra. The Internet of Things (IoT): A Study of Architectural Elements. in
Signal-Image Technology & Internet-Based Systems (SITIS). 2017 13
th
International Conference on,
IEEE. 2017: 473–478.
[11] R Awangga. Sampeu: Servicing Web Map Tile Service Over Web Map Service to Increase
Computation Performance. in IOP Conference Series: Earth and Environmental Science. IOP
Publishing. 2018; 145(1): 012057.
[12] HK¨ostinger, M Gobber, T Grechenig, B Tappeiner, W Schramm. Developing a NFC Based Patient
Iden-Tification and Ward Round System for Mobile Devices Using the Android Platform.
In Point-of-Care Healthcare Technologies (PHT). IEEE. 2013: 176–179.
[13] N Saparkhojayev, A Nurtayev, G Baimenshina. Access Control and Management System Based On
NFC-Technology by The Use of Smart Phones as Keys. Middle-East Journal of Scientific Research.
2014; 21(7): 1130–1135.
[14] RS Basyari, SM Nasution, B Dirgantara. Implementation of Host Card Emulation Mode Over Android
Smartphone as Alternative ISO 14443a for Arduino NFC Shield. in Control, Electronics, Renewable
Energy and Communications (ICCEREC), 2015 International Conference on, IEEE. 2015: 160–165.
[15] RM Awangga, NS Fathonah, TI Hasanudin. Colenak: GPS Tracking Model for Post-Stroke
Rehabilitation Program Using AES-CBC url Encryption and QR-Code. in Information Technology,
Information Systems and Electrical Engineering (ICITISEE). 2017 2
nd
International conferences on.
IEEE. 2017: 255–260.
[16] M Vaidehi, BJ Rabi. Design and Analysis of AES-CBC Mode for High Security Applications. in
Current Trends in Engineering and Technology (ICCTET). 2014 2
nd
International Conference on.
IEEE. 2014: 499–502.
 ISSN: 1693-6930
TELKOMNIKA Vol. 17, No. 2, April 2019: 712-718
718
[17] R Awangga. Peuyeum: A Geospatial url Encrypted Web Framework Using Advance Encryption
Standard-Cipher Block Chaining Mode. in IOP Conference Series: Earth and Environmental Science,
2018; 145(1). IOP Publishing: 012055.
[18] SB Venkata, P Yellai, GD Verma, A Lokesh, K Adithya, SSS. Sanagapati. A New Light Weight
Transport Method for Secured Transmission of Data for IOT. in Advanced Networks and
Telecommunications Systems (ANTS), 2016 IEEE International Conference on, IEEE. 2016: 1–6.
[19] P Mittra, N Rakesh. A Desktop Application of Qr Code for Data Security and Authentication. in
Inventive Computation Technologies (ICICT). International Conference on IEEE. 2016; 2: 1–5.
[20] F Nadeem. A Taxonomy of Data Management Models in Distributed and Grid Environments.
International Journal of Information Technology and Computer Science (IJITCS). 2016; 8: 19.
[21] A Celesti, F Tusa, M Villari, and A Puliafito, Three-phase cross-cloud federation model: The cloud
sso authentication. In Advances in Future Internet (AFIN), 2010 second international conference on,
IEEE. 2010: 94–101.
[22] X Yang, B Nasser, M Surridge, and S Middleton. A business-oriented cloud federation model for
real-time applications. Future Generation Computer Systems. 2012; 28(8): 1158–1167.
[23] D Villegas, N Bobroff, I Rodero, J Delgado, Y Liu, A Devarakonda, L Fong, SM Sadjadi, and
M Parashar. Cloud federation in a layered service model. Journal of Computer and System Sciences.
2012; 78(5): 1330–1344.
[24] T Iimura, H Hazeyama, and Y Kadobayashi. Zoned federation of game servers: a peer-to-peer
approach to scalable multi-player online games. in Proceedings of 3
rd
ACM SIGCOMM workshop on
Network and system support for games. ACM. 2004: 116–120.
[25] B Rochwerger, D Breitgand, E Levy, A Galis, K Nagin, IM Llorente, R Montero, Y Wolfsthal,
E Elmroth, J Caceres et al. The reservoir model and architecture for open federated cloud computing.
IBM Journal of Research and Development. 2009; 53(4): 4–1.

More Related Content

What's hot

Io t protocols overview
Io t protocols overviewIo t protocols overview
Io t protocols overviewClint Smith
 
The technology behind the internet of things -C&T RF Antennas Inc
The technology behind the internet of things -C&T RF Antennas IncThe technology behind the internet of things -C&T RF Antennas Inc
The technology behind the internet of things -C&T RF Antennas IncAntenna Manufacturer Coco
 
A Review Study on Secure Authentication in Mobile System
A Review Study on Secure Authentication in Mobile SystemA Review Study on Secure Authentication in Mobile System
A Review Study on Secure Authentication in Mobile SystemEditor IJCATR
 
IOT Based Smart Home System Technologies
IOT Based Smart Home System TechnologiesIOT Based Smart Home System Technologies
IOT Based Smart Home System TechnologiesIJERDJOURNAL
 
Bluetooth Based Automatic Hotel Service System Using Python
Bluetooth Based Automatic Hotel Service System Using PythonBluetooth Based Automatic Hotel Service System Using Python
Bluetooth Based Automatic Hotel Service System Using PythonIOSR Journals
 
Architectural Layers of Internet of Things: Analysis of Security Threats and ...
Architectural Layers of Internet of Things: Analysis of Security Threats and ...Architectural Layers of Internet of Things: Analysis of Security Threats and ...
Architectural Layers of Internet of Things: Analysis of Security Threats and ...Scientific Review SR
 
IOT introduction
IOT introductionIOT introduction
IOT introductionxinoe
 
IRJET- Review On Semantic Open IoT Service Platform
IRJET- Review On Semantic Open IoT Service PlatformIRJET- Review On Semantic Open IoT Service Platform
IRJET- Review On Semantic Open IoT Service PlatformIRJET Journal
 
2015 security for the internet of things a survey of
2015 security for the internet of things a survey of2015 security for the internet of things a survey of
2015 security for the internet of things a survey ofVinod Salunkhe
 
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSSECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSIJNSA Journal
 
A Study on Internet of Things
A Study on Internet of ThingsA Study on Internet of Things
A Study on Internet of ThingsIRJET Journal
 
IRJET - A Study on Smart Way for Securing IoT Devices
IRJET -  	  A Study on Smart Way for Securing IoT DevicesIRJET -  	  A Study on Smart Way for Securing IoT Devices
IRJET - A Study on Smart Way for Securing IoT DevicesIRJET Journal
 
Internet of things .pptx [repaired]
Internet of things .pptx [repaired]Internet of things .pptx [repaired]
Internet of things .pptx [repaired]Self-employed
 
DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...
DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...
DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...ijait
 

What's hot (18)

Iot intro
Iot introIot intro
Iot intro
 
Io t protocols overview
Io t protocols overviewIo t protocols overview
Io t protocols overview
 
Patenting in Mobile Application (App) & Software Based Technology | How to Pa...
Patenting in Mobile Application (App) & Software Based Technology | How to Pa...Patenting in Mobile Application (App) & Software Based Technology | How to Pa...
Patenting in Mobile Application (App) & Software Based Technology | How to Pa...
 
The technology behind the internet of things -C&T RF Antennas Inc
The technology behind the internet of things -C&T RF Antennas IncThe technology behind the internet of things -C&T RF Antennas Inc
The technology behind the internet of things -C&T RF Antennas Inc
 
A Review Study on Secure Authentication in Mobile System
A Review Study on Secure Authentication in Mobile SystemA Review Study on Secure Authentication in Mobile System
A Review Study on Secure Authentication in Mobile System
 
575 579
575 579575 579
575 579
 
IOT Based Smart Home System Technologies
IOT Based Smart Home System TechnologiesIOT Based Smart Home System Technologies
IOT Based Smart Home System Technologies
 
Bluetooth Based Automatic Hotel Service System Using Python
Bluetooth Based Automatic Hotel Service System Using PythonBluetooth Based Automatic Hotel Service System Using Python
Bluetooth Based Automatic Hotel Service System Using Python
 
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THINGCOMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
 
Architectural Layers of Internet of Things: Analysis of Security Threats and ...
Architectural Layers of Internet of Things: Analysis of Security Threats and ...Architectural Layers of Internet of Things: Analysis of Security Threats and ...
Architectural Layers of Internet of Things: Analysis of Security Threats and ...
 
IOT introduction
IOT introductionIOT introduction
IOT introduction
 
IRJET- Review On Semantic Open IoT Service Platform
IRJET- Review On Semantic Open IoT Service PlatformIRJET- Review On Semantic Open IoT Service Platform
IRJET- Review On Semantic Open IoT Service Platform
 
2015 security for the internet of things a survey of
2015 security for the internet of things a survey of2015 security for the internet of things a survey of
2015 security for the internet of things a survey of
 
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSSECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
 
A Study on Internet of Things
A Study on Internet of ThingsA Study on Internet of Things
A Study on Internet of Things
 
IRJET - A Study on Smart Way for Securing IoT Devices
IRJET -  	  A Study on Smart Way for Securing IoT DevicesIRJET -  	  A Study on Smart Way for Securing IoT Devices
IRJET - A Study on Smart Way for Securing IoT Devices
 
Internet of things .pptx [repaired]
Internet of things .pptx [repaired]Internet of things .pptx [repaired]
Internet of things .pptx [repaired]
 
DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...
DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...
DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...
 

Similar to KAFA: A novel interoperability open framework to utilize Indonesian electronic identity card

Data Communication in Internet of Things: Vision, Challenges and Future Direc...
Data Communication in Internet of Things: Vision, Challenges and Future Direc...Data Communication in Internet of Things: Vision, Challenges and Future Direc...
Data Communication in Internet of Things: Vision, Challenges and Future Direc...TELKOMNIKA JOURNAL
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoTIRJET Journal
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoTIRJET Journal
 
A Brief Review on Internet of Things
A Brief Review on Internet of ThingsA Brief Review on Internet of Things
A Brief Review on Internet of ThingsIRJET Journal
 
IoT–smart contracts in data trusted exchange supplied chain based on block ch...
IoT–smart contracts in data trusted exchange supplied chain based on block ch...IoT–smart contracts in data trusted exchange supplied chain based on block ch...
IoT–smart contracts in data trusted exchange supplied chain based on block ch...IJECEIAES
 
NEAR FIELD COMMUNICATION, IT’S VULNERABILITY AND COUNTER MEASURES
NEAR FIELD COMMUNICATION, IT’S VULNERABILITY AND COUNTER MEASURESNEAR FIELD COMMUNICATION, IT’S VULNERABILITY AND COUNTER MEASURES
NEAR FIELD COMMUNICATION, IT’S VULNERABILITY AND COUNTER MEASURESIRJET Journal
 
DNA computing based stream cipher for internet of things using MQTT protocol
DNA computing based stream cipher for internet of things using MQTT protocol DNA computing based stream cipher for internet of things using MQTT protocol
DNA computing based stream cipher for internet of things using MQTT protocol IJECEIAES
 
NFiD: An NFC based system for Digital Business Cards
NFiD: An NFC based system for Digital Business CardsNFiD: An NFC based system for Digital Business Cards
NFiD: An NFC based system for Digital Business CardsIRJET Journal
 
Security system with RFID control using E-KTP and internet of things
Security system with RFID control using E-KTP and internet of thingsSecurity system with RFID control using E-KTP and internet of things
Security system with RFID control using E-KTP and internet of thingsjournalBEEI
 
A dynamic data encryption method based on addressing the data importance on ...
A dynamic data encryption method based on addressing the  data importance on ...A dynamic data encryption method based on addressing the  data importance on ...
A dynamic data encryption method based on addressing the data importance on ...IJECEIAES
 
Application Layer Security for IoT: The Case Study of a Smart Home
Application Layer Security for IoT: The Case Study of a Smart HomeApplication Layer Security for IoT: The Case Study of a Smart Home
Application Layer Security for IoT: The Case Study of a Smart HomeIRJET Journal
 
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...IRJET Journal
 
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin AlgorithmA Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin AlgorithmEditor IJMTER
 
KANSA: high interoperability e-KTP decentralised database network using distr...
KANSA: high interoperability e-KTP decentralised database network using distr...KANSA: high interoperability e-KTP decentralised database network using distr...
KANSA: high interoperability e-KTP decentralised database network using distr...TELKOMNIKA JOURNAL
 
IRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: ReviewIRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: ReviewIRJET Journal
 
IRJET- A Review Paper on Internet of Things(IoT) and its Applications
IRJET- A Review Paper on Internet of Things(IoT) and its ApplicationsIRJET- A Review Paper on Internet of Things(IoT) and its Applications
IRJET- A Review Paper on Internet of Things(IoT) and its ApplicationsIRJET Journal
 
IRJET- Plug and Play Approach: Sensors to Cloud Communication
IRJET- Plug and Play Approach: Sensors to Cloud CommunicationIRJET- Plug and Play Approach: Sensors to Cloud Communication
IRJET- Plug and Play Approach: Sensors to Cloud CommunicationIRJET Journal
 
A new algorithm to enhance security against cyber threats for internet of thi...
A new algorithm to enhance security against cyber threats for internet of thi...A new algorithm to enhance security against cyber threats for internet of thi...
A new algorithm to enhance security against cyber threats for internet of thi...IJECEIAES
 
Architectural design of IoT-cloud computing integration platform
Architectural design of IoT-cloud computing integration platformArchitectural design of IoT-cloud computing integration platform
Architectural design of IoT-cloud computing integration platformTELKOMNIKA JOURNAL
 
Integrated smart door system in apartment room based on internet
Integrated smart door system in apartment room based on internetIntegrated smart door system in apartment room based on internet
Integrated smart door system in apartment room based on internetTELKOMNIKA JOURNAL
 

Similar to KAFA: A novel interoperability open framework to utilize Indonesian electronic identity card (20)

Data Communication in Internet of Things: Vision, Challenges and Future Direc...
Data Communication in Internet of Things: Vision, Challenges and Future Direc...Data Communication in Internet of Things: Vision, Challenges and Future Direc...
Data Communication in Internet of Things: Vision, Challenges and Future Direc...
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoT
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoT
 
A Brief Review on Internet of Things
A Brief Review on Internet of ThingsA Brief Review on Internet of Things
A Brief Review on Internet of Things
 
IoT–smart contracts in data trusted exchange supplied chain based on block ch...
IoT–smart contracts in data trusted exchange supplied chain based on block ch...IoT–smart contracts in data trusted exchange supplied chain based on block ch...
IoT–smart contracts in data trusted exchange supplied chain based on block ch...
 
NEAR FIELD COMMUNICATION, IT’S VULNERABILITY AND COUNTER MEASURES
NEAR FIELD COMMUNICATION, IT’S VULNERABILITY AND COUNTER MEASURESNEAR FIELD COMMUNICATION, IT’S VULNERABILITY AND COUNTER MEASURES
NEAR FIELD COMMUNICATION, IT’S VULNERABILITY AND COUNTER MEASURES
 
DNA computing based stream cipher for internet of things using MQTT protocol
DNA computing based stream cipher for internet of things using MQTT protocol DNA computing based stream cipher for internet of things using MQTT protocol
DNA computing based stream cipher for internet of things using MQTT protocol
 
NFiD: An NFC based system for Digital Business Cards
NFiD: An NFC based system for Digital Business CardsNFiD: An NFC based system for Digital Business Cards
NFiD: An NFC based system for Digital Business Cards
 
Security system with RFID control using E-KTP and internet of things
Security system with RFID control using E-KTP and internet of thingsSecurity system with RFID control using E-KTP and internet of things
Security system with RFID control using E-KTP and internet of things
 
A dynamic data encryption method based on addressing the data importance on ...
A dynamic data encryption method based on addressing the  data importance on ...A dynamic data encryption method based on addressing the  data importance on ...
A dynamic data encryption method based on addressing the data importance on ...
 
Application Layer Security for IoT: The Case Study of a Smart Home
Application Layer Security for IoT: The Case Study of a Smart HomeApplication Layer Security for IoT: The Case Study of a Smart Home
Application Layer Security for IoT: The Case Study of a Smart Home
 
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
 
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin AlgorithmA Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
 
KANSA: high interoperability e-KTP decentralised database network using distr...
KANSA: high interoperability e-KTP decentralised database network using distr...KANSA: high interoperability e-KTP decentralised database network using distr...
KANSA: high interoperability e-KTP decentralised database network using distr...
 
IRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: ReviewIRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: Review
 
IRJET- A Review Paper on Internet of Things(IoT) and its Applications
IRJET- A Review Paper on Internet of Things(IoT) and its ApplicationsIRJET- A Review Paper on Internet of Things(IoT) and its Applications
IRJET- A Review Paper on Internet of Things(IoT) and its Applications
 
IRJET- Plug and Play Approach: Sensors to Cloud Communication
IRJET- Plug and Play Approach: Sensors to Cloud CommunicationIRJET- Plug and Play Approach: Sensors to Cloud Communication
IRJET- Plug and Play Approach: Sensors to Cloud Communication
 
A new algorithm to enhance security against cyber threats for internet of thi...
A new algorithm to enhance security against cyber threats for internet of thi...A new algorithm to enhance security against cyber threats for internet of thi...
A new algorithm to enhance security against cyber threats for internet of thi...
 
Architectural design of IoT-cloud computing integration platform
Architectural design of IoT-cloud computing integration platformArchitectural design of IoT-cloud computing integration platform
Architectural design of IoT-cloud computing integration platform
 
Integrated smart door system in apartment room based on internet
Integrated smart door system in apartment room based on internetIntegrated smart door system in apartment room based on internet
Integrated smart door system in apartment room based on internet
 

More from TELKOMNIKA JOURNAL

Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...TELKOMNIKA JOURNAL
 
Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...TELKOMNIKA JOURNAL
 
Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...TELKOMNIKA JOURNAL
 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...TELKOMNIKA JOURNAL
 
Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...TELKOMNIKA JOURNAL
 
Efficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaEfficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaTELKOMNIKA JOURNAL
 
Design and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireDesign and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireTELKOMNIKA JOURNAL
 
Wavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkWavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkTELKOMNIKA JOURNAL
 
A novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsA novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsTELKOMNIKA JOURNAL
 
Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...TELKOMNIKA JOURNAL
 
Brief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesBrief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesTELKOMNIKA JOURNAL
 
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...TELKOMNIKA JOURNAL
 
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemEvaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemTELKOMNIKA JOURNAL
 
Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...TELKOMNIKA JOURNAL
 
Reagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorReagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorTELKOMNIKA JOURNAL
 
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...TELKOMNIKA JOURNAL
 
A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...TELKOMNIKA JOURNAL
 
Electroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksElectroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksTELKOMNIKA JOURNAL
 
Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingTELKOMNIKA JOURNAL
 
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...TELKOMNIKA JOURNAL
 

More from TELKOMNIKA JOURNAL (20)

Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...
 
Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...
 
Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...
 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
 
Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...
 
Efficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaEfficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antenna
 
Design and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireDesign and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fire
 
Wavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkWavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio network
 
A novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsA novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bands
 
Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...
 
Brief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesBrief note on match and miss-match uncertainties
Brief note on match and miss-match uncertainties
 
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
 
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemEvaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
 
Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...
 
Reagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorReagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensor
 
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
 
A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...
 
Electroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksElectroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networks
 
Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imaging
 
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
 

Recently uploaded

(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 

Recently uploaded (20)

(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 

KAFA: A novel interoperability open framework to utilize Indonesian electronic identity card

  • 1. TELKOMNIKA, Vol.17, No.2, April 2019, pp.712~718 ISSN: 1693-6930, accredited First Grade by Kemenristekdikti, Decree No: 21/E/KPT/2018 DOI: 10.12928/TELKOMNIKA.v17i2.11755  712 Received August 6, 2018; Revised October 20, 2018; Accepted December 25, 2018 KAFA: A novel interoperability open framework to utilize Indonesian electronic identity card Rolly Maulana Awangga*, Nisa Hanum Harani, Muhammad Yusril Helmi Setyawan Applied of Informatics Engineering Politeknik Pos Indonesia, Indonesia *Corresponding author, e-mail: awangga@poltekpos.ac.id Abstract Indonesian people have electronic citizen card called e-KTP. e-KTP is NFC based technology embedded inside Indonesian citizenship identity card. e-KTP technology has never been used until now since it was launch officially by the government. This research proposes an independent framework for bridging the gap between Indonesia regulation for e-KTP and commercial use in the many commercial or organization sector. The Framework proposes interoperability framework using novel combination component, there are e-KTP reader, Middleware and Web Service. KAFA (e-KTP Middleware and Framework) implementing Internet of Things (IoT) concept to make it as open standard and independent. The framework use federation mode or decentralized data for interoperability, to make sure not breaking the law of privacy. Extended development of AES-CBC cipher algorithm was used to encrypt the data on the transport between middleware and web service. Keywords: AES-CBC, e-KTP, interoperability, KAFA, web service Copyright © 2019 Universitas Ahmad Dahlan. All rights reserved. 1. Introduction The use of ID on identity is essential as a single identity number that distinguishes one data from another. As stated in the Presidential Regulation of The Republic of Indonesia Number 35 The Year 2010 that NIK-based ID cards contain security codes and electronic recordings as a means of verifying and validating the identity data of the population [1]. Currently, Indonesia applies the identity identifier with a technology-based identity card system with electronic ID card (e-KTP card). The e-KTP card technology is the technology incorporated into the contactless smart card technology [2]. The identity or resident information of the e-KTP card stored in a data center [3] and stored in a physical form of an e-ID card. e-KTP use Near Field Communication (NFC) technology. NFC is a short-range radio technology that allows communication between devices by touching each other or holding adjacent devices [4]. NFC itself is quite simple, done by using radio frequency. NFC device itself is divided into two classes, namely the target device and initiator [5]. Near Field Communication (NFC) is one of the new technologies used in faster, cheaper and more secure data transfers [4]. At the present time, several research in e-KTP card among others can be used for the needs in transactional activities that assist in the validity of the data for example in the general election system [6] besides e-KTP card can be used as a tool in home security system [7]. and has been im-plemented in several sectors, including electronic payments [4]. In this case, there is a gap problem in interoperability standard for using e-KTP to integrate in the organization process business. In the logistics sector for example, require consumer data such as data sender and receiver. Currently, there are many disadvantages in logistic distribution schemes, such as consumer information errors. Also, the use of paper in recording consumer information is quite tricky because the courier must perform manual authentication data [8]. So with the e-KTP card can be used for authentication of data validity so that data used more accurate compared to manual recording. Frameworks are used as guides to build something that extends the structure into something useful. TOGAF is a framework that provides detailed methods for building and managing enterprise information sys-tems and architectures [9]. TOGAF can optimize the overall aspect of the company’s environment in order to respond to changes. This framework is suitable for designing corporate governance. Federation Model is a method in enterprise architecture that allows interoperability and division of business lines and information technology semi-autonomously. This research proposes a novel interoperability Framework for
  • 2. TELKOMNIKA ISSN: 1693-6930  KAFA: A novel interoperability open framework to... (Rolly Maulana Awangga) 713 e-KTP. The framework proposing as open standard and independent using open hardware and software. 2. Research Method KAFA (e-KTP Middleware and Framework) is a framework developing using IoT concept. IoT is a concept that has the purpose of expanding the benefits of internet connection. In IoT it provides connectivity on physical sensors that can generate messages between objects. IOT works by translating the programming language we have put into the tool called Microcontroller. Arduino provides you with a library that is relatively clean, and trades flexibility for simplicity. Given the data, the AES-CBC method involves a process of encryption and decryption that can produce plaintext. AES-CBC cipher algoritm was use to secure communication flow. And to be able to visualize all the models in one tool we will use the concept of federation modeling. 2.1. IoT The IoT concept is that we can connect, communicate and manage multiple devices au-tomatically with countless remote networks. It is a scenario in which storage, computing and communication technologies are embedded in everyday objects. Processing, storage and commu-nication capabilities attached to an object turns object into a service for which users pay per use [10]. Web service is also a big part of IoT. The low computational web service [11] also developing in this research. 2.2. Open Hardware Arduino is an open-source platform to facilitate the use of electronics in various fields. Arduino uses Atmel AVR processor and its software has its own programming language (often referred to as a microcontroller) or IDE (Integrated Development Environment) that runs on your computer, used to write and upload computer code to the physical board. IDE is a software used to write and compile programs for Arduino. Arduino IDE is also used to upload compiled programs to the Arduino board program memory [7]. 2.3. NFC Near Field Communication (NFC) is a kind of communicational technology, which run wirelessly at a high frequency; and it can work in 20 cm by 13.56 MHz. It can transmit data at three speeds which are respectively 106 Kbit/s, 212 Kbit/s and 424Kbit/s. The NFC has two work modes which are initiative mode and passive mode [12]. Card emulation mode: In this mode, the NFC tag is equivalent to an IC card which adopts RFID technology. The NFC tag can replace many IC cards used now (including credit, card entrance card used in supermarket, easy card, control card, ticket to vehicle, ticket to door and so on). In this mode, it is a great advantageous that the RF domain of Non-contact card reader can supply power to NFC tags; so, the tag can work even the host device is out of battery. The NFC tag must be equipped with Security Element (SE for short) if it wants to apply the function of Card Emulation [8]. NFC reader has two tasks, receive commands from software and communicate between NFC tags. NFC reader is a link between software applications with antenna will radiate radio waves to NFC tags. Radio waves emitted by the antenna gathered in the room around it. so that the data can be transferred wirelessly from or to the NFC tag located adjacent to the antenna [13]. In this discussion, NFC reader built by two microcontrollers that are arduino UNO board and NFC shield PN532. Communications between arduino UNO board and NFC shield PN532 can be using I2C (Inter-Integrated Circuit Communications, pronounced I squared C) protocol or SPI (Serial-Peripheral or Interface) protocol [14]. 2.4. AES-CBC URL Encrypt AES-CBC is one of the standard methods of encryption also known as The Rijndael algorithm [15]. AES is a symmetric key algorithm to helps prevent information from being passed in clear text. Both the sender and the receiver use a single key for encryption and decryption of up to 16 characters, and an initialization vector. [16]. This process requires a minimum of 128 bits of data in the encryption. The AESCBC method involves an Initialization Vector (IV) for XOR operations. Both encryption and decryption process is done with a key.
  • 3.  ISSN: 1693-6930 TELKOMNIKA Vol. 17, No. 2, April 2019: 712-718 714 They must have a data length of 128 bits [17]. The process of encryption and decryption is as follows: To perform an encryption operation, a plaintext must have a length of multiple data of 128 bits XOR and IV will be operated on the first plaintext before it is encrypted by the key. The encryption process creates a ciphertext. Then it will be decrypted by the key first. After the decryption process, XOR operation and IV are performed to the decryption result to produce plaintext [16]. AES-CBC is adopted by many organizations around the world. Because it has simplicity and flexibility in the implementation stage. AES-CBC is used in various applications ranging from smart cards to large servers. In fact, hardware implementations of AES are well suited to resource-constrained embedded applications like satellites [16]. Several other advantages of choosing AES-CBC is that these are symmetric key ciphers, lightweight and more secured when compared to others [18]. The cipher is merged with the created instance of the AES algorithm [19]. Typically, the CPU memory on these IoT devices is a scarce resource. Hence, implementation of AES CBC will not cause memory footprint overloads [18]. 2.5. Federation Model The federation model best suits in the situation where an existing collection of autonomous and possibly heterogeneous databases are required to be shared. After authentication, the user can request data from any one of the databases within the federation. The owner institution has full control over local databases and has liberty of choosing among different configurations for different levels of autonomy, degree of replication, and cross-registration of each data resource [20]. The Cloud Architecture also implementing Federation model as single-sign-on authentication [21], real-time application [22], a service model [23], scalable peer-to-peer approach [24], and a reservoir model [25]. 3. Experiment and Results KAFA consisting three parts of platform shows in Figure 1 the reader, IoT and database. e-KTP Reader is an open hardware now with arduino and PN532 sensor. Middle-ware has bridging between e-KTP Reader to Web Service. Middleware read serial communication from e-KTP Reader using USB and pass it to the Web Service. Figure 1. Architecture design of KAFA URL Encryption was used between Middleware and Web Service using AES-CBC cipher algoritm base additional random character called Cilok Library. The algorithm of Cilok library shows in Figure 2, Cilok is a library that uses AES CBC. Web Service receive e-KTP ID data from Middleware and follow up to the next process in Application or Database. Application and Database is business process area where is it come from any service of Application to integrate with e-KTP Open Middleware Platform.
  • 4. TELKOMNIKA ISSN: 1693-6930  KAFA: A novel interoperability open framework to... (Rolly Maulana Awangga) 715 Figure 2. AES-CBC function on python code 3.1. e-KTP Reader Open Hardware was chosen to built e-KTP Reader to fullfill Open Standar of this Frame-work. e-KTP reader consisting PN532 sensor and Arduino. PN532 Sensor connects ed to Arduino to read NFC on e-KTP. The wiring between arduino and PN532 sensor shows in Table 1. PN532 has set in the I2C mode. After wiring, the code from 3 push to the Arduino, Figure 3 show some code in Arduino to read NFC tags in e-ktp. The readers read NFC ID of e-KTP and pass it to serial communication to the computer. Figure 3. Arduino code to read e-KTP ID
  • 5.  ISSN: 1693-6930 TELKOMNIKA Vol. 17, No. 2, April 2019: 712-718 716 Table 1. PN532 and Arduino Wiring PN532 Sensor Pin Arduino Pin VCC 5V GND GND SDA A4 SCL A5 3.2. Middleware and Web Service Deployment The middleware code using python shows in Figure 4. The e-KTP ID passes from Mid-dleware to web service after encrypted using AES-CBC cipher algorithm in Figure 4. The Web service receiving e-KTP ID data and decrypt is. The web service code shows in Figure 5. The web service is customable to connect many API or Application or database in existing business environment. The demonstration shows in Figure 6. Figure 4. ser2http middleware to establish communication between arduino and web service Figure 5. e-KTP 1.0 web service code using python flask Figure 6. e-KTP device demonstration 4. Conclusion KAFA is a first release of open standard for e-KTP interoperability. The framework is independent for utilizing indonesian electronic identity card into many business process.
  • 6. TELKOMNIKA ISSN: 1693-6930  KAFA: A novel interoperability open framework to... (Rolly Maulana Awangga) 717 The connection of Interoperability can develop in many ways using web service on Framework. Every components in Framework can be develop to the next version of Framework. e-KTP reader can be replaced with other sensor or device which is open hardware. Middleware development can be use another programming and implement more efficient encryption to be more functional. Communication between Middleware and Web Service can be develop in others internet protocol. Acknowledgement This research was funded by Direktorat Riset dan Pengabdian Masyarakat, Direktorat Jendral Penguat Riset dan Pengembangan Kementrian Riset, Teknologi, dan Pendidikan Tinggi Republik Indonesia by Penelitian Dosen Pemula Scheme. References [1] Sekretariat Negara. Presidential Regulation of The Republic Of Indonesia Number 35 OF 2010 (in Indonesia: Peraturan Presiden Republik Indonesia Nomor 35 Tahun 2010). 2012: 23–25. [2] M E Aminanto, S Sutikno. Development of Protection Profile and Security Target for Indonesia Electronic ID Card’s (KTP-e) Card Reader Based on Common Criteria v3. 1: 2012/SNI ISO/IEC 15408: 2014. in Advanced Informatics: Concept, Theory and Application (ICAICTA), 2014 International Conference of, IEEE. 2014: 1–6. [3] AK Darwis, C Lim. Design and Implementation of e-ktp (Indonesian Electronic Identity Card) Key Management System. in Advanced Computer Science and Information System (ICACSIS), 2011 International Conference on, IEEE. 2011: 143–146. [4] NE Tabet, MA Ayu. Analysing The Security of NFC Based Payment Systems. in Informatics and Computing (ICIC), International Conference on, IEEE. 2016: 169–174. [5] S Batool, NA Saqib, MA. Khan. Internet of Things Data Analytics for User Authentication and Activity Recognition. in Fog and Mobile Edge Computing (FMEC), 2017 Second International Conference on, IEEE. 2017: 183–187. [6] N Hakiem, A Mutholib, U Aditiawarman. Mobile Based Development of A Voter Information Management System (Sipendalih) for the 2014 Indonesian Presidential Election: Case of indonesian voters in Malaysia. in Information and Communication Technology for The Muslim World (ICT4M). 2014 The 5 th International Conference on, IEEE. 2014: 1–4. [7] M Andriansyah, M Subali, I Purwanto, SA Irianto, RA Pramono. e-KTP as The Basis of Home Security System Using Arduino UNO. in Computer Applications and Information Processing Technology (CAIPT), 2017 4 th International Conference on, IEEE. 2017: 1–5. [8] J Cui, D She, J Ma, Q Wu, J Liu. A New Logistics Distribution Scheme Based on NFC. in Network and Information Systems for Computers (ICNISC), 2015 International Conference on, IEEE. 2015: 492–495. [9] NH Harani, AA Arman, RM Awangga. Improving togaf adm 9.1 migration planning phase by itil v3 service transition. Journal of Physics: Conference Series. 2018; 1007(1): 012036. [10] D Navani, S Jain, M S Nehra. The Internet of Things (IoT): A Study of Architectural Elements. in Signal-Image Technology & Internet-Based Systems (SITIS). 2017 13 th International Conference on, IEEE. 2017: 473–478. [11] R Awangga. Sampeu: Servicing Web Map Tile Service Over Web Map Service to Increase Computation Performance. in IOP Conference Series: Earth and Environmental Science. IOP Publishing. 2018; 145(1): 012057. [12] HK¨ostinger, M Gobber, T Grechenig, B Tappeiner, W Schramm. Developing a NFC Based Patient Iden-Tification and Ward Round System for Mobile Devices Using the Android Platform. In Point-of-Care Healthcare Technologies (PHT). IEEE. 2013: 176–179. [13] N Saparkhojayev, A Nurtayev, G Baimenshina. Access Control and Management System Based On NFC-Technology by The Use of Smart Phones as Keys. Middle-East Journal of Scientific Research. 2014; 21(7): 1130–1135. [14] RS Basyari, SM Nasution, B Dirgantara. Implementation of Host Card Emulation Mode Over Android Smartphone as Alternative ISO 14443a for Arduino NFC Shield. in Control, Electronics, Renewable Energy and Communications (ICCEREC), 2015 International Conference on, IEEE. 2015: 160–165. [15] RM Awangga, NS Fathonah, TI Hasanudin. Colenak: GPS Tracking Model for Post-Stroke Rehabilitation Program Using AES-CBC url Encryption and QR-Code. in Information Technology, Information Systems and Electrical Engineering (ICITISEE). 2017 2 nd International conferences on. IEEE. 2017: 255–260. [16] M Vaidehi, BJ Rabi. Design and Analysis of AES-CBC Mode for High Security Applications. in Current Trends in Engineering and Technology (ICCTET). 2014 2 nd International Conference on. IEEE. 2014: 499–502.
  • 7.  ISSN: 1693-6930 TELKOMNIKA Vol. 17, No. 2, April 2019: 712-718 718 [17] R Awangga. Peuyeum: A Geospatial url Encrypted Web Framework Using Advance Encryption Standard-Cipher Block Chaining Mode. in IOP Conference Series: Earth and Environmental Science, 2018; 145(1). IOP Publishing: 012055. [18] SB Venkata, P Yellai, GD Verma, A Lokesh, K Adithya, SSS. Sanagapati. A New Light Weight Transport Method for Secured Transmission of Data for IOT. in Advanced Networks and Telecommunications Systems (ANTS), 2016 IEEE International Conference on, IEEE. 2016: 1–6. [19] P Mittra, N Rakesh. A Desktop Application of Qr Code for Data Security and Authentication. in Inventive Computation Technologies (ICICT). International Conference on IEEE. 2016; 2: 1–5. [20] F Nadeem. A Taxonomy of Data Management Models in Distributed and Grid Environments. International Journal of Information Technology and Computer Science (IJITCS). 2016; 8: 19. [21] A Celesti, F Tusa, M Villari, and A Puliafito, Three-phase cross-cloud federation model: The cloud sso authentication. In Advances in Future Internet (AFIN), 2010 second international conference on, IEEE. 2010: 94–101. [22] X Yang, B Nasser, M Surridge, and S Middleton. A business-oriented cloud federation model for real-time applications. Future Generation Computer Systems. 2012; 28(8): 1158–1167. [23] D Villegas, N Bobroff, I Rodero, J Delgado, Y Liu, A Devarakonda, L Fong, SM Sadjadi, and M Parashar. Cloud federation in a layered service model. Journal of Computer and System Sciences. 2012; 78(5): 1330–1344. [24] T Iimura, H Hazeyama, and Y Kadobayashi. Zoned federation of game servers: a peer-to-peer approach to scalable multi-player online games. in Proceedings of 3 rd ACM SIGCOMM workshop on Network and system support for games. ACM. 2004: 116–120. [25] B Rochwerger, D Breitgand, E Levy, A Galis, K Nagin, IM Llorente, R Montero, Y Wolfsthal, E Elmroth, J Caceres et al. The reservoir model and architecture for open federated cloud computing. IBM Journal of Research and Development. 2009; 53(4): 4–1.