Implementation Cryptography and Access Control on IoT-Based Warehouse Inventory Management System
DOI:
https://doi.org/10.30812/matrik.v22i1.1849Keywords:
Cryptography, Database, Raspberry Pi 3, Two-Factor Auhentication, Warehouse Inventory Management SystemAbstract
Warehousing is a product storage management activity to ensure product availability, so inventory management is needed to oversee the movement of logistics and equipment. Some things need to be considered in the storage process, such as the suitability of the storage location, safe from theft, and safe from physical disturbances. Vulnerabilities can occur when unauthorized users find out information from the database regarding stored goods, so a security mechanism for the warehouse database is needed. In addition, proper identification needs to be made of someone trying to access the database. In this research, a Warehouse Inventory Management System (WIMS) was created by implementing the AES-128 cryptographic algorithm, which was built using ESP32 and Raspberry Pi 3 devices. Time Password (T-OTP). The results show that the built system can overcome inventory problems in conventional warehousing management systems and implement data security using the AES-128 algorithm. The application of two-factor authentication in the form of smartcards and T-OTP shows very good results in testing its accuracy to overcome the vulnerability of unauthorized access to the system database
Downloads
References
[2] A. Mude and L. B. F. Mando, “Implementasi Keamanan Rumah Cerdas Menggunakan Internet of Things dan Biometric System,†Matrik: Jurnal Manajemen, Teknik Informatika, dan Rekayasa Komputer, vol. 21, no. 1, pp. 179–188, 2021.
[3] R. de Assis and J. K. Sagawa, “Assessment of the Implementation of a Warehouse Management System in a Multinational Company of Industrial Gears and Drives,†Gestão & Produção, vol. 25, no. 2, pp. 370–383, 2018.
[4] C. K. N. Guptha, M. G. Bhaskar, and V. Meghasree, “Design of IoT Architecture for order picking in a typical warehouse,†in 2018 3rd International Conference on Computational Systems and Information Technology for Sustainable Solutions (CSITSS), 2018, pp. 50–53.
[5] G. M. Cidal, Y. A. Cimbek, G. Karahan, Ö. E. Böler, Ö. Özkardesler, and H. Üvet, “A Study on the development of semi automated warehouse stock counting system,†in 2019 6th International Conference on Electrical and Electronics Engineering (ICEEE), 2019, pp. 323–326.
[6] S. Xu, H. Yu, Y. Yang, and Q. Tan, “A portable warehouse management terminal based on internet of things,†in 2019 IEEE 2nd International Conference on Computer and Communication Engineering Technology (CCET), 2019, pp. 168–171.
[7] BNPB RI, “Peraturan Kepala Badan Nasional Penanggulangan Bencana Nomor 06 Tahun 2009 Tentang Pedoman Pergudangan,†2009.
[8] A. A. Shastri and P. N. Chatur, “Efficient and effective security model for database specially designed to avoid internal threats,†in 2015 International Conference on Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials (ICSTM), 2015, pp. 165–167.
[9] R. Andriani, S. E. Wijayanti, and F. W. Wibowo, “Comparision Of AES 128, 192 And 256 Bit Algorithm For Encryption And Description File,†in 2018 3rd International Conference on Information Technology, Information System and Electrical Engineering (ICITISEE), 2018, pp. 120–124.
[10] A. M. Abdullah, “Advanced encryption standard (AES) algorithm to encrypt and decrypt data,†Cryptography and Network Security, vol. 16, pp. 1–11, 2017.
[11] P. Patil, P. Narayankar, D. G. Narayan, and S. M. Meena, “A comprehensive evaluation of cryptographic algorithms: DES, 3DES, AES, RSA and Blowfish,†Procedia Computer Science, vol. 78, pp. 617–624, 2016.
[12] T. Heller, All in one. 2009.
[13] A. Apriani, H. Zakiyudin, and K. Marzuki, “Penerapan Algoritma Cosine Similarity dan Pembobotan TF-IDF System Penerimaan Mahasiswa Baru pada Kampus Swasta,†Jurnal Bumigora Information Technology (BITe), vol. 3, no. 1, pp. 19–27, 2021, doi: 10.30812/bite.v3i1.1110.
[14] A. Prameshwari and N. P. Sastra, “Implementasi Algoritma Advanced Encryption Standard (AES) 128 untuk Enkripsi dan Dekripsi File Dokumen,†Eksplora Informatika, vol. 8, no. 2, pp. 52–58, 2018.
[15] T. S. Rao, P. Pranay, S. Narayana, Y. Reddy, Sunil, and P. Kaur, “ESP32 Based Implementation of Water Quality and Quantity Regulating System,†Atlantis Higlight in Computer Sciences, vol. 4, pp. 122–129, 2021.
[16] L. Lumburovska, J. Dobreva, S. Andonov, H. M. Trpcheska, and V. Dimitrova, “Comparative Analysis of HOTP and TOTP Authentication Algorithms. Which one to choose?,†International Scientific Journal “Security & Future,†vol. V, no. 4, pp. 131–136, 2021.
[17] I. Permana, M. Hardjianto, and K. A. Baihaqi, “Securing the Website Login System with the SHA256 Generating Method and Time-based One-Time Password (TOTP),†Systematics, vol. 2, no. 2, pp. 65–71, 2020.
[18] B. Vaidya, J. H. Park, S.-S. Yeo, and J. J. P. C. Rodrigues, “Robust one-time password authentication scheme using smart card for home network environment,†Computer Communications, vol. 34, no. 3, pp. 326–336, 2011.
[19] H. Rezaeighaleh, R. Laurens, and C. C. Zou, “Secure smart card signing with time-based digital signature,†in 2018 International Conference on Computing, Networking and Communications (ICNC), 2018, pp. 182–187.
[20] B. H. Wixom and R. M. Roth, System Analysis and Design, 4th ed. Wiley Publishing, 2008.
Downloads
Published
Issue
Section
How to Cite
Similar Articles
- Evan Tanuwijaya, Angelica Roseanne, Modifikasi Arsitektur VGG16 untuk Klasifikasi Citra Digital Rempah-Rempah Indonesia , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 21 No. 1 (2021)
- Hepatika Zidny Ilmadina, Muhammad Naufal, Dega Surono Wibowo, Drowsiness Detection Based on Yawning Using Modified Pre-trained Model MobileNetV2 and ResNet50 , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 22 No. 3 (2023)
- Djoko Kuswanto, Athirah Hersyadea Alifah Putri, Ellya Zulaikha, Tedy Apriawan, Yuri Pamungkas, Evi Triandini, Nadya Paramitha Jafari, Thassaporn Chusak, Cranioplasty Training Innovation Using Design Thinking: AugmentedReality and Interchangeability-Based Mannequin Prototype , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 24 No. 3 (2025)
- Tukino Paryono, Ahmad Fauzi, Rizki Aulia Nanda, Saepul Aripiyanto, Muhammad Khaerudin, Detecting Vehicle Numbers Using Google Lens-Based ESP32CAM to Read Number Characters , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 22 No. 3 (2023)
- Bobby Poerwanto, Fajriani Fajriani, Resilient Backpropagation Neural Network on Prediction of Poverty Levels in South Sulawesi , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 20 No. 1 (2020)
- Muchlis Nurseno, Umar Aditiawarman, Haris Al Qodri Maarif, Teddy Mantoro, Detecting Hidden Illegal Online Gambling on .go.id Domains Using Web Scraping Algorithms , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 23 No. 2 (2024)
- Khairul Imtihan, Muhamad Rodi, Maulana Ashari, Mohamad Taufan Asri Zaen, Khairan Marzuki, Audit Tata Kelola Teknologi Informasi Menggunakan Framework Cobit 4.1 , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 21 No. 2 (2022)
- Gustin Setyaningsih, Hera Fitra, Hanun Karomatunnisa, Palupi Pandanarum, Aplikasi Monitoring Laporan Aduan Masyarakat pada Desa Kedunggede Kecamatan Lumbir , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 20 No. 1 (2020)
- Sirojul Hadi, Puspita Dewi, Radimas Putra Muhammad Davi Labib, Parama Diptya Widayaka, Sistem Rumah Pintar Menggunakan Google Assistant dan Blynk Berbasis Internet of Things , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 21 No. 3 (2022)
- Putu Tisna Putra, Anthony Anggrawan, Hairani Hairani, Comparison of Machine Learning Methods for Classifying User Satisfaction Opinions of the PeduliLindungi Application , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 22 No. 3 (2023)
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- Annisa Nurul Puteri, Arizal Arizal, Andini Dani Achmad, Feature Selection Correlation-Based pada Prediksi Nasabah Bank Telemarketing untuk Deposito , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 20 No. 2 (2021)