DETEKSI SERANGAN DENIAL OF SERVICE (DOS) DALAM JARINGAN 6LOWPAN DENGAN METODE BERDASARKAN BASIS KEPERCAYAAN (TRUST BASED DETECTION)

LONCIMITA, ARIFAN and Ubaya, Huda (2025) DETEKSI SERANGAN DENIAL OF SERVICE (DOS) DALAM JARINGAN 6LOWPAN DENGAN METODE BERDASARKAN BASIS KEPERCAYAAN (TRUST BASED DETECTION). Undergraduate thesis, Sriwijaya University.

[thumbnail of RAMA_56201_0901138025129_cover .jpeg] Image
RAMA_56201_0901138025129_cover .jpeg - Cover Image
Available under License Creative Commons Public Domain Dedication.

Download (71kB)
[thumbnail of RAMA_56201_09011382025129.pdf] Text
RAMA_56201_09011382025129.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (3MB) | Request a copy
[thumbnail of RAMA_56201_09011382025129_TURNITIN.pdf] Text
RAMA_56201_09011382025129_TURNITIN.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (4MB) | Request a copy
[thumbnail of RAMA_56201_09011382025129_0216068101_01_front_ref.pdf] Text
RAMA_56201_09011382025129_0216068101_01_front_ref.pdf - Accepted Version
Available under License Creative Commons Public Domain Dedication.

Download (497kB)
[thumbnail of RAMA_56201_09011382025129_0216068101_02.pdf] Text
RAMA_56201_09011382025129_0216068101_02.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (319kB) | Request a copy
[thumbnail of RAMA_56201_09011382025129_0216068101_03.pdf] Text
RAMA_56201_09011382025129_0216068101_03.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (533kB) | Request a copy
[thumbnail of RAMA_56201_09011382025129_0216068101_04.pdf] Text
RAMA_56201_09011382025129_0216068101_04.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (1MB) | Request a copy
[thumbnail of RAMA_56201_09011382025129_0216068101_05.pdf] Text
RAMA_56201_09011382025129_0216068101_05.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (112kB) | Request a copy
[thumbnail of RAMA_56201_09011382025129_0216068101_06_ref.pdf] Text
RAMA_56201_09011382025129_0216068101_06_ref.pdf - Bibliography
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (139kB) | Request a copy
[thumbnail of RAMA_56201_09011382025129_0216068101_07_lamp.pdf] Text
RAMA_56201_09011382025129_0216068101_07_lamp.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (533kB) | Request a copy

Abstract

Jaringan Internet of Things (IoT), khususnya 6LoWPAN yang mengadopsi protokol routing RPL, sangat rentan terhadap ancaman keamanan seperti serangan Denial-of-Service (DoS). Serangan UDP Flooding secara spesifik dapat mengganggu ketersediaan layanan dan menguras sumber daya terbatas node. Penelitian ini mengusulkan dan mengevaluasi kinerja metode Trust-based detection untuk mendeteksi serangan DoS dalam jaringan 6LoWPAN. Metode ini menilai tingkat kepercayaan node melalui dua parameter utama: Direct Trust (DT), yang dihitung dari rasio paket valid, dan Indirect Trust (IT), yang didapatkan dari skor reputasi node tetangga. Simulasi Contiki Cooja menunjukkan bahwa node malicious terdeteksi dengan jelas karena menghasilkan jumlah paket yang sangat tinggi dan memiliki nilai Direct Trust yang sangat rendah (0.73%–0.97%), serta Indirect Trust yang mencerminkan ketidakpercayaan tinggi (18%–20%). Selain itu, implementasi mekanisme deteksi Trust-based terbukti efisien dengan konsumsi daya yang stabil atau sedikit hemat energi dibandingkan kondisi serangan tanpa deteksi, memastikan kelayakan metode ini untuk jaringan 6LoWPAN yang terbatas sumber daya.

Item Type: Thesis (Undergraduate)
Uncontrolled Keywords: Internet of Things, 6LoWPAN, Denial-of-Service,UDP Flood, Trust-based detection, Contiki, Cooja.
Subjects: T Technology > TA Engineering (General). Civil engineering (General) > TA1-2040 Engineering (General). Civil engineering (General) > TA158.7 Computer network resources Including the Internet
T Technology > TA Engineering (General). Civil engineering (General) > TA329-348 Engineering mathematics. Engineering analysis > TA347.F5C4665 Finite Element Method, Computer System Engineering Mathematics,
Divisions: 09-Faculty of Computer Science > 56201-Computer Systems (S1)
Depositing User: Arifan Loncimita
Date Deposited: 24 Oct 2025 08:07
Last Modified: 24 Oct 2025 08:07
URI: http://repository.unsri.ac.id/id/eprint/185327

Actions (login required)

View Item View Item