SISTEM KEAMANAN OTENTIKASI USER DENGAN NOTIFIKASI REALTIME MELALUI TELEGRAM BERBASIS DALORADIUS
DOI:
https://doi.org/10.58982/krisnadana.v1i2.115Keywords:
authentication user, daloRADIUS, telegram, security systems, hotspotAbstract
The use of wireless network technology is rapidly increasing at this time causing problems in the security system. Ease of internet access through a wireless network, is also a security hole in the user authentication process. Various smart devices can be used to connect with only one account via the captive portal. In this research, a security system is designed to authenticate hotspot users with daloRADIUS-based telegram notifications. This system integrates hotspot routers, daloRADIUS servers and telegrams to improve the security system during the authentication process. Users are able to monitor the accounts they have used by any device. If there is a suspicious device, the user can also disconnect the device that uses his account to connect to the internet via the telegram application in realtime. Testing is done using the blackbox method by testing the ability of the system to carry out its functions. The test results show that the system is able to function properly and the user can control the use of the hotspot account that is owned through the telegram application in realtime
References
I. G. M. N. Desnanjaya, I. B. A. I. Iswara, A. A. G. Ekayana, P. P. Santika, and I. N. B. Hartawan, “Automatic high speed photography based microcontroller,” J. Phys. Conf. Ser., vol. 1469, no. 1, 2020.
A. A. G. Ekayana, I. N. B. Hartawan, I. G. M. N. Desnanjaya, and I. D. M. A. B. Joni, “Body mass index measurement system as a desktop-based nutrition monitor,” J. Phys. Conf. Ser., vol. 1469, no. 1, 2020.
D. Bruneo et al., “An IoT service ecosystem for Smart Cities: The #SmartME project,” Internet of Things, vol. 5, pp. 12–33, 2019.
P. Jariyayothin, K. Jeravong-Aram, N. Ratanachaijaroen, T. Tantidham, and P. Intakot, “IoT Backyard: Smart watering control system,” Proceeding 2018 7th ICT Int. Student Proj. Conf. ICT-ISPC 2018, pp. 1–6, 2018.
I. N. B. Hartawan and I. W. Sudiarsa, “Analisis Kinerja Internet of Things Berbasis Firebase Real-Time Database,” J. Resist. (Rekayasa Sist. Komputer), vol. 2, no. 1, pp. 6–17, 2019.
APJII, “Penetrasi & Profil Perilaku Pengguna Internet Indonesia Tahun 2018,” Apjii, p. 51, 2019.
S. Pengajar, T. Elektro, F. Teknik, and U. Udayana, “Implementasi Sistem Autentikasi Jaringan Hotspot Universitas Udayana Dengan Menggunakan Open Source Freeradius,” Maj. Ilm. Teknol. Elektro, vol. 9, no. 1, 2010.
S. Hanadwiputra, S. Subandri, and P. K. Murti, “Optimalisasi Radius Server Sebagai Sistem Otentikasi Dan Otorisasi Untuk Proses Login Multi Aplikasi Mikhmon Menggunakan,” Semin. Nas. Inform. 2011, vol. 2011, no. semnasIF, pp. 17–23, 2011.
H. Kuswanto, “Sistem Autentikasi Hotspot Menggunakan Radius Server Mikrotik Router Herman,” Sist. Autentikasi Hotspot Menggunakan Radius Serv. Mikrotik Router Herman, vol. 2, no. 1, pp. 43–50, 2017.
B. Rifai, N. Nuryadi, and A. Ripai, “Implementasi Telegram Notification Alert Pada Network Monitoring System Dengan Nagios,” J. Mantik Penusa, vol. 3, no. 3, pp. 54–60, 2019.
F. Panjaitan et al., “Pemanfaatan Notifikasi Telegram Untuk Monitoring,” vol. 10, no. 2, pp. 725–732, 2019.
J. Fahana, R. Umar, and F. Ridho, “Pemanfaatan Telegram sebagai Notifikasi Serangan untuk Jaringan Forensik,” Query J. Inf. Syst., vol. 1, no. 2, pp. 6–14, 2017.
Downloads
Published
Versions
- 2022-01-31 (2)
- 2022-01-31 (1)