slot maxwin slot gacor slot Thailand slot maxwin terbaru rekomendasi slot gacor jpterus66 slot maxwin slot gacor malam ini slot gacor SLOT ONLINE slot bet 200 888slot slot gacor malam ini Situs Slot Gacor 888slot slot777 slot terbaru slot88 slot gacor malam ini slot maxwin Situs Slot Gacor slot gacor malam ini slot maxwin Situs Slot Gacor 888slot slot777 slot terbaru slot88 slot gacor malam ini slot maxwin Situs Slot Gacor slot88 rtp slot gacor slot online slot gacor maxwin slot bet 200 slot gacor slot maxwin SLOT THAILAND Slot Gacor Maxwin slot gacor maxwin lk21 Layarkaca Bokep Xvideos Powergaming88 Slot Gacor Slot Online lk21 INDOXXI Croxy Proxy SAVEFROM Joker123 Slot Gacor Mpo Slot Slot Gacor Maxwin slot maxwin slot gacor slot Thailand slot gacor maxwin rekomendasi slot gacor jpterus66 slot maxwin slot gacor malam ini slot gacor SLOT ONLINE slot bet 200 888slot slot777 slot terbaru slot88 slot gacor malam ini slot maxwin Situs Slot Gacor 888slot slot777 slot terbaru slot88 slot gacor malam ini slot maxwin slot88 Situs Slot Gacor slot gacor malam ini slot maxwin Situs Slot Gacor 888slot slot777 slot terbaru slot88 slot gacor malam ini slot online slot maxwin slot 888slot link slot gacor 888slot slot online
TY - JOUR AU - Axel Natanael Salim, AU - Tata Sutabri, AU - Edi Surya Negara, AU - M Izman Herdiansyah, PY - 2024/04/04 Y2 - 2025/11/16 TI - COMMUNICATION SECURITY IN THE MQTT PROTOCOL FOR MONITORING INTERNET OF THINGS DEVICES USING METHODS ELLIPTIC CURVE CRYPTOGRAPHY JF - Jurnal Teknik Informatika (Jutif) JA - J. Tek. Inform. (JUTIF) VL - 5 IS - 2 SE - Articles DO - 10.52436/1.jutif.2024.5.2.1916 UR - https://jutif.if.unsoed.ac.id/index.php/jurnal/article/view/1916 SP - 377-387 AB - <p>The emergence of the IoT has become one of the most significant technology trends. The application of IoT is aimed at enhancing efficiency, comfort, and facilitating various human activities. One key aspect of IoT implementation is efficient communication between devices, with one of the most commonly used protocols being MQTT protocol. MQTT enables the transmission of data in real-time or based on specific events, although there are still several challenges that need to be addressed. One of the main challenges of MQTT is information security issues, prompting this research to examine effective solutions to enhance communication security in IoT applications that utilize MQTT protocol. One method of securing communication between IoT devices can involve using lightweight cryptographic communication security methods such as ECC method. ECC method is chosen because it utilizes shorter keys while still providing high security, making it more efficient when implemented on IoT devices. The results obtained indicate that data sent to MQTT Broker cannot be read and converted manually, ensuring much safer data transmission. Based on the test results, the tool can effectively read, process, and send data to MQTT Broker. QoS measurements on the system revealed that data encrypted and sent from the subscriber to MQTT Broker had an average delay time of 54.1 ms, throughput of 410.4 bps, zero packet loss, and jitter of 0.00 ms. Looking at the research findings, it can be concluded that this ECC method could serve as a solution to data communication security issues in the MQTT protocol.</p> ER -