scholarly journals Sistem Presensi Siswa berbasis Internet of Things menggunakan Sensor Sidik Jari pada SMK Perhotelan 45 Mataram

Author(s):  
Baiq Rizki Putri Utami ◽  
I Wayan Agus Arimbawa ◽  
Fitri Bimantoro

Fingerprint is one of the unique part of human body that can be used as a personal identity with the help of fingerprint biometric technology to help identify it. The use of fingerprint biometric technology can be a solution for student attendance that helps minimize errors or fraud such as manipulation or falsification in the process of recording attendance. The application of computerized attendance recording can be done by utilizing the concept of the Internet of Things (IoT) which assumes that electronic devices can be connected to each other to communicate or exchange data independently through internet networks that using protocols to communicate, including the MQTT (Message Queue Telemetry Transport protocol), which is lightweight message and designed for devices with limited resources. Therefore, an Internet of Things based attendance system was created by utilizing fingerprint sensor technology on the MQTT protocol to assist schools in improving attendance recording performance, as well simplifying the process of recording student attendance at SMK Perhotelan 45 Mataram which still applies conventional attendance recording procedure. The fingerprint enroll process is carried out with a system interface in the form of a web application using the MQTT protocol. Fingerprint feature data is stored on the fingerprint sensor memory module.  The total time used to record attendance for 10 respondents is 11,241 seconds with the average time obtained is 1.1241 seconds. It was found that 50% of users agreed to the application of the internet-based fingerprint presence system based on MOS testing.

2021 ◽  
Author(s):  
Mohamad Oubai Al-Rejleh

The Internet of Things (IoT) is a revolutionary concept that emerged in the late 21st century, whereby everyday objects such as household items, cars, and wearables, equipped with sensors and (Radio Frequency Identification) RFID chips, can communicate with the internet and to their physical surroundings. These chips allow the connected items to share information, and allow the user to collect information about his/her “quantified self”, measuring personal data such as habits of usage, lifestyle, and location through internet networks. IoT enabled devices are designed to collect, store, share, and analyze of highly personal data ubiquitously and in real time. However, with this new affordance of connectivity, comes a potential loss of privacy for users, as ever increasing sets of personal data are collected and tracked. As such, there is a pressing need for privacy considerations to be embedded within the early stages of design of connected devices and networks.


Author(s):  
Zelal Gültekin Kutlu

In this study, the periodical differences of industrial revolutions, which is one of the effects of technological developments in the industrial field, and the last stage of it are mentioned. With the latest industrial revolution called Industry 4.0, machines work in harmony with technology at every stage of industrial areas. This period, known as Industry 4.0 or the fourth industrial revolution, refers to the system in which the latest production technologies, automation systems, and the technologies that make up this system exchange data with each other. In addition to the information technologies and automation systems used in Industry 3.0, industrial production has gained a whole new dimension with the use of the internet. With internet networks, machines, operators, and robots now work in harmony. At this point, the concept of internet of objects becomes important. Therefore, another focus of the study is the concept of internet of objects. There are some assumptions about the uses, benefits, and future status of the internet of things.


Sensors ◽  
2020 ◽  
Vol 20 (10) ◽  
pp. 2932
Author(s):  
Ivan Vaccari ◽  
Maurizio Aiello ◽  
Enrico Cambiaso

Security of the Internet of Things is a crucial topic, due to the criticality of the networks and the sensitivity of exchanged data. In this paper, we target the Message Queue Telemetry Transport (MQTT) protocol used in IoT environments for communication between IoT devices. We exploit a specific weakness of MQTT which was identified during our research, allowing the client to configure the behavior of the server. In order to validate the possibility to exploit such vulnerability, we propose SlowITe, a novel low-rate denial of service attack aimed to target MQTT through low-rate techniques. We validate SlowITe against real MQTT services, considering both plain text and encrypted communications and comparing the effects of the threat when targeting different daemons. Results show that the attack is successful and it is able to exploit the identified vulnerability to lead a DoS on the victim with limited attack resources.


2021 ◽  
Vol 2021 ◽  
pp. 1-12
Author(s):  
Dongqing Zhu ◽  
Ting Li ◽  
Can Zhang ◽  
Ying Ren ◽  
Huan Wang ◽  
...  

In recent years, the business scale of my country’s circulation industry has continued to expand, and the output value has continued to increase. The leading role in guiding the transformation of the industrial economy has become more and more important. Based on this, this article discusses the research on the promotion of the Internet of Things technology to the circulation industry in the transformation of the resource-based economy. The application of RFID technology and wireless sensor technology in the Internet of Things in the circulation industry can greatly improve work efficiency and information transmission accuracy. This article establishes the circulation industry based on the principles of science, system, safety, and relative independence. The evaluation index system analyzes the role of the circulation industry in the transformation of the resource-based economy in terms of circulation scale, circulation structure, circulation efficiency, circulation innovation, etc., and uses the analytic hierarchy process and entropy method to analyze the collected data. With the support of RFID technology, the output value of the circulation industry in Province Y has reached 140.508 billion yuan in 2019, accounting for about 27% of the tertiary industry, and the number of employees in the circulation industry has also increased to 57.88%, which is a strong boost to the economy of Province Y. It has a greater contribution to the total economic volume. The research of this article has realized the economic transformation of resource-based cities in the circulation industry and has a certain reference effect for the transformation and upgrading of similar cities.


Author(s):  
Saad Hikmat Haji ◽  
Amira B. Sallow

Air pollution, water pollution, and radiation pollution are significant environmental factors that need to be addressed. Proper monitoring is crucial with the goal that by preserving a healthy society, the planet can achieve sustainable development. With advancements in the internet of things (IoT) and the improvement of modern sensors, environmental monitoring has evolved into a smart environment monitoring (SEM) system in recent years. This article aims to have a critical overview of significant contributions and SEM research, which include monitoring the quality of air , water pollution, radiation pollution, and agricultural systems. The review is divided based on the objectives of applying SEM methods, analyzing each objective about the sensors used, machine learning, and classification methods. Moreover, the authors have thoroughly examined how advancements in sensor technology, the Internet of Things, and machine learning methods have made environmental monitoring into a truly smart monitoring system.


2020 ◽  
Vol 2020 (3) ◽  
pp. 276-1-276-15
Author(s):  
Franziska Schwarz ◽  
Klaus Schwarz ◽  
Reiner Creutzburg

Since its invention, the Internet has changed the world, but above all, it has connected people. With the advent of the Internet of Things, the Internet connects things today much more than people do. A large part of the Internet of Things consists of IoT controlled Smart Home devices. The Internet of Things and the Smart Home have become an increasingly important topic in recent years. The growing popularity of Smart Home devices such as Smart TVs, Smart Door Locks, Smart Light Bulbs, and others is causing a rapid increase in vulnerable areas. In the future, many IoT devices could be just as many targets. The many new and inexperienced manufacturers and the absence of established uniform standards also contribute to the precarious situation. Therefore, new methods are needed to sensitize and detect these threats. In this paper, different existing approaches like those of the National Institute of Standards and Technology (NIST) and the Open Web Application Security Project (OWASP) are combined with concepts of this work like the Smart Home Device Life Cycle. In the context of this paper, a universal 31-page question-based test procedure is developed that can be applied to any Smart Home device. Based on this new, innovative security checklist, the communication between device, app, and the manufacturer's servers, as well as the firmware of IoT devices, can be analyzed and documented in detail. In the course of this paper, also a handout in the abbreviated form will be created, which serves the same purpose.


Author(s):  
Zelal Gültekin Kutlu

In this study, the periodical differences of industrial revolutions, which is one of the effects of technological developments in the industrial field, and the last stage of it are mentioned. With the latest industrial revolution called Industry 4.0, machines work in harmony with technology at every stage of industrial areas. This period, known as Industry 4.0 or the fourth industrial revolution, refers to the system in which the latest production technologies, automation systems, and the technologies that make up this system exchange data with each other. In addition to the information technologies and automation systems used in Industry 3.0, industrial production has gained a whole new dimension with the use of the internet. With internet networks, machines, operators, and robots now work in harmony. At this point, the concept of internet of objects becomes important. Therefore, another focus of the study is the concept of internet of objects. There are some assumptions about the uses, benefits, and future status of the internet of things.


2011 ◽  
Vol 97-98 ◽  
pp. 664-668 ◽  
Author(s):  
Chen Zhao ◽  
Xi Sheng Li ◽  
Jun Song Chen

The origin, the composition, the function, the application and the developing trend of the Internet of Things (IOT) were reviewed. The application of internet of things would greatly improve the information technology in logistics. The internet of things supported by RFID and sensor technology has been applied in the area of logistics. A framework of three technical systems of sensing, communication and network, and intelligence has been established. The present technology of internet of things in logistics of forest industry was analyzed. The application cases of the internet of things in timber storage, wood transportation and logistics of forestry biomass materials were shown with their system composition, management function and development.


Sensors ◽  
2020 ◽  
Vol 20 (18) ◽  
pp. 5194
Author(s):  
Yingpei Zeng ◽  
Mingmin Lin ◽  
Shanqing Guo ◽  
Yanzhao Shen ◽  
Tingting Cui ◽  
...  

The publish/subscribe model has gained prominence in the Internet of things (IoT) network, and both Message Queue Telemetry Transport (MQTT) and Constrained Application Protocol (CoAP) support it. However, existing coverage-based fuzzers may miss some paths when fuzzing such publish/subscribe protocols, because they implicitly assume that there are only two parties in a protocol, which is not true now since there are three parties, i.e., the publisher, the subscriber and the broker. In this paper, we propose MultiFuzz, a new coverage-based multiparty-protocol fuzzer. First, it embeds multiple-connection information in a single input. Second, it uses a message mutation algorithm to stimulate protocol state transitions, without the need of protocol specifications. Third, it uses a new desockmulti module to feed the network messages into the program under test. desockmulti is similar to desock (Preeny), a tool widely used by the community, but it is specially designed for fuzzing and is 10x faster. We implement MultiFuzz based on AFL, and use it to fuzz two popular projects Eclipse Mosquitto and libCoAP. We reported discovered problems to the projects. In addition, we compare MultiFuzz with AFL and two state-of-the-art fuzzers, MOPT and AFLNET, and find it discovering more paths and crashes.


Constrained devices are commonly used in the Internet of Things systems. Since these devices have limited communication and computation resources, communication protocols which are lightweight are needed. A lightweight protocol called Message Queue Telemetry Transport, which is a publish/subscribe messaging protocol, is utilized with the constrained devices. Hence, this paper is aimed at monitoring data by using machine-to-machine communication protocol with the help of an IoT device, Raspberry Pi.


Sign in / Sign up

Export Citation Format

Share Document