TY - GEN
T1 - Evaluation and Recommendations for Improvements to the Security and Speed of the ITS RFID Gate System
AU - Suryotrisongko, Hatma
AU - Hariadi, Ridho Rahman
AU - Aisyi, Muh Reza
AU - Ghozali, Khakim
AU - Sholikah, Rizka Wakhidatus
N1 - Publisher Copyright:
© 2023 IEEE.
PY - 2023
Y1 - 2023
N2 - Sepuluh Nopember Institute of Technology is one of Indonesia's largest campuses in Indonesia, used RFID to access entrances and exits within the ITS environment to increase security in the campus area. However, several problems occurred after the gate system was implemented at ITS. Namely, there was no security method for cards so that other people can copy and use data. The ITS RFID Gate Server has several security vulnerabilities and the occurrence of long queues of vehicles on the RFID Gate system ITS. This research begins with the planning stage, then the data collection stage in the form of primary and secondary data, followed by analysis and discussion, as well as the documentation stage. The analysis and discussion stage is carried out by analyzing the queuing system at ITS RFID Gate, then providing recommendations for queuing systems at ITS RFID Gate. Security analysis was conducted on access cards and ITS RFID Gate system servers. Then score the findings of security vulnerabilities using the Common Vulnerability Scoring System (CVSS) and give security recommendations on the ITS RFID Gate system. Based on the research results, the number of RFID gates that correspond to the arrival rate of existing two-wheeled vehicles so that there will not be long queues is two RFID gates. Six security vulnerabilities are found in the ITS RFID Gate System, with two critical-level vulnerabilities, one high-level vulnerability, and three medium-level vulnerabilities.
AB - Sepuluh Nopember Institute of Technology is one of Indonesia's largest campuses in Indonesia, used RFID to access entrances and exits within the ITS environment to increase security in the campus area. However, several problems occurred after the gate system was implemented at ITS. Namely, there was no security method for cards so that other people can copy and use data. The ITS RFID Gate Server has several security vulnerabilities and the occurrence of long queues of vehicles on the RFID Gate system ITS. This research begins with the planning stage, then the data collection stage in the form of primary and secondary data, followed by analysis and discussion, as well as the documentation stage. The analysis and discussion stage is carried out by analyzing the queuing system at ITS RFID Gate, then providing recommendations for queuing systems at ITS RFID Gate. Security analysis was conducted on access cards and ITS RFID Gate system servers. Then score the findings of security vulnerabilities using the Common Vulnerability Scoring System (CVSS) and give security recommendations on the ITS RFID Gate system. Based on the research results, the number of RFID gates that correspond to the arrival rate of existing two-wheeled vehicles so that there will not be long queues is two RFID gates. Six security vulnerabilities are found in the ITS RFID Gate System, with two critical-level vulnerabilities, one high-level vulnerability, and three medium-level vulnerabilities.
KW - Information and Communication Technology
KW - Queue
KW - RFID
KW - Security
KW - Smart Cities
UR - http://www.scopus.com/inward/record.url?scp=85171139483&partnerID=8YFLogxK
U2 - 10.1109/ISITIA59021.2023.10220973
DO - 10.1109/ISITIA59021.2023.10220973
M3 - Conference contribution
AN - SCOPUS:85171139483
T3 - 2023 International Seminar on Intelligent Technology and Its Applications: Leveraging Intelligent Systems to Achieve Sustainable Development Goals, ISITIA 2023 - Proceeding
SP - 130
EP - 135
BT - 2023 International Seminar on Intelligent Technology and Its Applications
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 24th International Seminar on Intelligent Technology and Its Applications, ISITIA 2023
Y2 - 26 July 2023 through 27 July 2023
ER -