Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 2 dokumen yang sesuai dengan query
cover
Sabet Maulana Mubarok
"Tingginya angka kejahatan, seperti pencurian dan perampokan, memicu perlunya peningkatan sistem keamanan rumah. Keamanan pintu rumah yang masih mengandalkan kunci konvensional dianggap kurang efektif karena mudah dibobol, hilang, atau diduplikasi. Oleh karena itu, diperlukan pengembangan teknologi keamanan yang lebih canggih, seperti penggunaan kunci berbasis NFC, untuk meningkatkan perlindungan dan mengurangi risiko tindak kejahatan di rumah. Perancangan kunci pintu yang memanfaatkan teknologi NFC merupakan salah satu solusi untuk meningkatkan keamanan rumah. Sistem ini terdiri dari NFC reader, Mikrokontroler, Relay Module, LCD Display, Buzzer, dan Solenoid Door lock. NFC reader membaca NFC tag yang kemudian diverifikasi di mikrokontroler. Ketika UID terverifikasi, mikrokontroler akan memicu hardware yang terhubung pada sistem sehingga Solenoid Door lock terbuka. Pada penelitian ini pengambilan data dilakukan sebanyak 30 kali untuk masing-masing pengujian. Dari pengujian akses diperoleh hasil bahwa sistem dapat membedakan antara NFC tag yang terdaftar dan tidak terdaftar di database. Jarak maksimal yang mampu terbaca oleh NFC reader yaitu 3 cm tanpa material penghalang dan 2 cm dengan material penghalang. Untuk pengujian tanpa penghalang diperoleh nilai rata-rata waktu respons pada jarak 0 cm, 1 cm, 2 cm, dan 3 cm masing-masing 214,4 ms, 210,7 ms, 217,7 ms, dan 219,2 ms. Untuk pengujian dengan penghalang diuji menggunakan material berupa kayu MDF, plastik, kaca, dan aluminium foil dengan hasil paling optimal yaitu material kayu MDF. Hasil pengujian rata-rata waktu respons pada jarak 0 cm, 1 cm, dan 2 cm masing-masing 192,2 ms, 227,1 ms, dan 218,4 ms. Penelitian ini diharapkan dapat membantu meningkatkan keamanan bagi pemilik rumah dari risiko pencurian.

The high rate of crimes, such as theft and robbery, has triggered the need for enhanced home security systems. The security of home doors that still rely on conventional locks is considered ineffective because they are easy to break into, can be lost, or duplicated. Therefore, there is a need for the development of more advanced security technology, such as using NFC-based locks, to improve protection and reduce the risk of criminal activities at home. The design of door locks utilizing NFC technology is one solution to enhance home security. This system consists of an NFC reader, a microcontroller, a relay module, an LCD display, a buzzer, and a solenoid door lock. The NFC reader scans the NFC tag, which is then verified by the microcontroller. Once the UID is verified, the microcontroller triggers the connected hardware, allowing the solenoid door lock to open. In this study, data collection was conducted 30 times for each test. From the access testing, it was found that the system could distinguish between registered and unregistered NFC tags in the database. The maximum distance readable by the NFC reader was 3 cm without a barrier material and 2 cm with a barrier material. For testing without barriers, the average response times at distances of 0 cm, 1 cm, 2 cm, and 3 cm were 214.4 ms, 210.7 ms, 217.7 ms, and 219.2 ms, respectively. For testing with barriers, materials such as MDF wood, plastic, glass, and aluminum foil were used, with the most optimal results achieved using MDF wood. The average response times for testing with barriers at distances of 0 cm, 1 cm, and 2 cm were 192.2 ms, 227.1 ms, and 218.4 ms, respectively. This research is expected to help enhance security for homeowners against the risk of theft. "
Depok: Fakultas Teknik Universitas Indonesia, 2025
S-pdf
UI - Skripsi Membership  Universitas Indonesia Library
cover
Ray, Sandip
"This book offers readers comprehensive coverage of security policy specification using new policy languages, implementation of security policies in Systems-on-Chip (SoC) designs – current industrial practice, as well as emerging approaches to architecting SoC security policies and security policy verification. The authors focus on a promising security architecture for implementing security policies, which satisfies the goals of flexibility, verification, and upgradability from the ground up, including a plug-and-play hardware block in which all policy implementations are enclosed. Using this architecture, they discuss the ramifications of designing SoC security policies, including effects on non-functional properties (power/performance), debug, validation, and upgrade. The authors also describe a systematic approach for “hardware patching”, i.e., upgrading hardware implementations of security requirements safely, reliably, and securely in the field, meeting a critical need for diverse Internet of Things (IoT) devices.
- Provides comprehensive coverage of SoC security requirements, security policies, languages, and security architecture for current and emerging computing devices;
- Explodes myths and ambiguities in SoC security policy implementations, and provide a rigorous treatment of the subject;
- Demonstrates a rigorous, step-by-step approach to developing a diversity of SoC security policies;
- Introduces a rigorous, disciplined approach to “hardware patching”, i.e., secure technique for updating hardware functionality of computing devices in-field;
- Includes discussion of current and emerging approaches for security policy verification."
Switzerland: Springer Cham, 2019
e20502835
eBooks  Universitas Indonesia Library