Search Word(s) in Title, Keywords, Authors, and Abstract:
Widyawan Widyawan
Two-Phase Security Protection for the Internet of Things Object
Vera Suryani, Selo Sulistyo and Widyawan Widyawan
Page: 1431~1437, Vol. 14, No.6, 2018
10.3745/JIPS.03.0106
Keywords: Attacks, Authentication, Internet of Things, Security, Statistic
Show / Hide Abstract
Internet of Things (IoT) Framework for Granting Trust among Objects
Vera Suryani, Selo Sulistyo and Widyawan Widyawan
Page: 1613~1627, Vol. 13, No.6, 2017
10.3745/JIPS.03.0088
Keywords: Framework, Internet of Things, Privacy, Security, Trust
Show / Hide Abstract
Two-Phase Security Protection for the Internet of Things Object
Vera Suryani, Selo Sulistyo and Widyawan Widyawan
Page: 1431~1437, Vol. 14, No.6, 2018

Keywords: Attacks, Authentication, Internet of Things, Security, Statistic
Show / Hide Abstract
Securing objects in the Internet of Things (IoT) is essential. Authentication model is one candidate to secure
an object, but it is only limited to handle a specific type of attack such as Sybil attack. The authentication
model cannot handle other types of attack such as trust-based attacks. This paper proposed two-phase
security protection for objects in IoT. The proposed method combined authentication and statistical models.
The results showed that the proposed method could handle other attacks in addition to Sybil attacks, such as
bad-mouthing attack, good-mouthing attack, and ballot stuffing attack.
Internet of Things (IoT) Framework for Granting Trust among Objects
Vera Suryani, Selo Sulistyo and Widyawan Widyawan
Page: 1613~1627, Vol. 13, No.6, 2017

Keywords: Framework, Internet of Things, Privacy, Security, Trust
Show / Hide Abstract
The concept of the Internet of Things (IoT) enables physical objects or things to be virtually accessible for both consuming and providing services. Undue access from irresponsible activities becomes an interesting issue to address. Maintenance of data integrity and privacy of objects is important from the perspective of security. Privacy can be achieved through various techniques: password authentication, cryptography, and the use of mathematical models to assess the level of security of other objects. Individual methods like these are less effective in increasing the security aspect. Comprehensive security schemes such as the use of frameworks are considered better, regardless of the framework model used, whether centralized, semi-centralized, or distributed ones. In this paper, we propose a new semi-centralized security framework that aims to improve privacy in IoT using the parameters of trust and reputation. A new algorithm to elect a reputation coordinator, i.e., ConTrust Manager is proposed in this framework. This framework allows each object to determine other objects that are considered trusted before the communication process is implemented. Evaluation of the proposed framework was done through simulation, which shows that the framework can be used as an alternative solution for improving security in the IoT.