Developing a Prototype for Enhancing Data Security in LoRaBased Theft Detection Systems Using ASCON-128 Encryption

Fetty Amelia, Bella Wulandari Hartejo

Abstract


Asset protection is crucial for organizations to prevent theft. This study presents a LoRa-based theft detection prototype enhanced with ASCON-128 encryption for secure data transmission. The system consists of a transmitter attached to assets and a receiver in a monitoring room, featuring a web-based digital map for real-time tracking. ASCON-128, a NIST-standard lightweight encryption algorithm, ensures data confidentiality and integrity against ManIn-The-Middle (MITM) attacks. The system was evaluated based on transmission speed, power consumption, and security performance. Results indicate that ASCON-128 integration reduces data transmission speed by 42.7% in Line-of-Sight (LOS) and 45.35% in Non-Line-of-Sight (NLOS) conditions. Power consumption increased by 2.7% in standby mode and 12.85% under simulated attack scenarios. Despite these trade-offs, encryption provides significant security benefits with acceptable resource overhead, making it a viable solution for LoRa-based asset tracking and theft detection.


Keywords


Theft Detector, Asset Tracking System, ASCON-128, LoRa (Long Range)

References


Presiden Republik Indonesia, Peraturan Pemerintah Republik Indonesia Nomor 71 Tahun 2010 Tentang Standar Akuntansi Pemerintahan. 2010. Accessed: Jan. 17, 2024. [Online]. Available: https://peraturan.bpk.go.id/Details/5095/pp-no-71-tahun-2010

Menteri Dalam Negeri Republik Indonesia, Peraturan Menteri Dalam Negeri Republik Indonesia Nomor 1 Tahun 2019 Tentang Penyusunan Barang Milik Daerah. 2019, p. 3. Accessed: Jan. 17, 2024. [Online]. Available: https://peraturan.bpk.go.id/Details/121739/permendagri-no-1-tahun-2019

ISO/IEC 2022, ISO/IEC 27001-2022 (E) Information security, cybersecurity and privacy protection — Information security management systems — Requirements, vol. 3. Switzerland, 2022.

NI Business Info, “Business Asset.” Accessed: Jan. 17, 2024. [Online]. Available: https://www.nibusinessinfo.co.uk/content/tangible-assets

ISO/IEC 2022, ISO/IEC 27002-2022 (E) Information security, cybersecurity and privacy protection — Information security controls, vol. 3. Switzerland, 2022.

K. Lappanitchayakul, “Anti-theft device for car : Alert system using radio wave,” The 9th International Conference on Intelligent Informatics and BioMedical Sciences (ICIIBMS), pp. 351–355, 2019, doi: 10.1109/ICIIBMS46890.2019.8991531.

F. Yao, Y. Ding, S. Hong, and S.-H. Yang, “A Survey on Evolved LoRa-Based Communication Technologies for Emerging Internet of Things Applications,” International Journal of Network Dynamics and Intelligence, pp. 4–19, Dec. 2022, doi: 10.53941/ijndi0101002.

Menteri Komunikasi dan Informatika Republik Indonesia, Peraturan Menteri Komunikasi dan Informatika Republik Indonesia Nomor 12 Tahun 2022 Tentang Tabel Alokasi Spektrum Frekuensi Radio Indonesia. 2022. Accessed: Dec. 04, 2023. [Online]. Available: https://jdih.kominfo.go.id/produk_hukum/view/id/834/t/peraturan+menteri+komunikasi+dan+informatika+nomor+12+tahun+2022

Menteri Komunikasi dan Informatika Republik Indonesia, “Menteri Komunikasi dan Informatika Republik Indonesia, Peraturan Menteri Komunikasi dan Informatika Republik Indonesia Nomor 2 Tahun 2023 Tentang Penggunaan Spektrum Frekuensi Radio Berdasarkan Izin Kelas,” 2023. Accessed: Dec. 04, 2023. [Online]. Available: https://jdih.kominfo.go.id/produk_hukum/view/id/862/t/peraturan+menteri+komunikasi+dan+informatika+nomor+2+tahun+2023

M. Saari, A. Muzaffar Bin Baharudin, P. Sillberg, S. Hyrynsalmi, and W. Yan, “LoRa-A Survey of Recent Research Trends,” 2018 41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), pp. 872–877, 2018, doi: https://doi.org/10.23919/MIPRO.2018.8400161.

L. HOPE MICROELECTRONICS CO., “Datasheet RFM95/96/97/98(W) - Low Power Long Range Transceiver Module” [Online]. Available: http://www.hoperf.com

F. Amelia and M. F. Ramadhani, “LoRa-Based Asset Tracking System with Data Encryption Using AES-256 Algorithm,” Proceeding - 2022 International Conference on Radar, Antenna, Microwave, Electronics, and Telecommunications: Emerging Science and Industrial Innovation in Electronics and Telecommunication, ICRAMET 2022, pp. 194–199, 2022, doi: 10.1109/ICRAMET56917.2022.9991210.

A. S. Tamba, “TUGAS AKHIR Implementasi Algoritma Present pada Prototipe Asset Tracking System berbasis LoRa,” Politeknik Siber dan Sandi Negara, Bogor, 2023.

NIST, “NIST Selects ‘Lightweight Cryptography’ Algorithms to Protect Small Devices,” NIST. Accessed: Jan. 17, 2024. [Online]. Available: https://www.nist.gov/news-events/news/2023/02/nist-selects-lightweight-cryptography-algorithms-protect-small-devices

S. B. Mishra and S. Alok, Handbook of Research Methodology. 2017. [Online]. Available: https://www.researchgate.net/publication/319207471

A. Dennis, B. H. Wixom, and D. Tegarden, SYSTEMS ANALYSIS & DESIGN : An Object-Oriented Approach with UML, 5th ed. USA, 2015. [Online]. Available: http://store.visible.com/Wiley.aspx

GOCodes, “7 Ways to Protect Fixed Assets Against Theft.” Accessed: Jan. 17, 2024. [Online]. Available: https://gocodes.com/7-ways-to-protect-fixed-assets-against-theft/

R. F. Rizal and H. Dwi Atmaja, “Analisis Chekup Pemeliharaan Batteray Capacity Test (BCT) 110 VDC Di PT. PLN (Persero) Gardu Induk 150 KV Jatigedong Jombang,” 2022. [Online]. Available: www.elektro.itn.ac.id

T. L. . Floyd, Principles of electric circuits : conventional current version. Pearson Education Limited, 2014.

CUEMATH, “Percentage Change,” https://www.cuemath.com/commercial-math/percentage-change/.

Tess Loucka, “How to Calculate Elapsed Time,” doodle learning by Discovery Education.

W. J. Buchanan, The Handbook of Data Communications and Networks. Springer US, 2004. doi: 10.1007/978-1-4020-7870-5.

P. Devi Dama Istianti, N. Bogi Aditya Karna, and I. Ali Nur Safa, “Perancangan dan implementasi Device Tentang Teknologi Akses LPWAN LoRa untuk Monitoring Air Sungai Citarum Device Design and Implementation about LPWAN LoRa Access Technology for Citarum River Water Monitoring,” eProceedings of Engineering, vol. 6, no. 2, p. 4477, 2019.

P. Syverson, “A Taxonomy of Replay Attacks,” Proceedings The Computer Security Foundations Workshop VII, pp. 187–191, 1994, doi: https://doi.org/10.1109/CSFW.1994.315935.

D. Basu, T. Gu, and P. Mohapatra, “Security Issues of Low Power Wide Area Networks in the Context of LoRa Networks,” Jun. 2020, [Online]. Available: http://arxiv.org/abs/2006.16554

C. Dobraunig, M. Eichlseder, F. Mendel, and M. Schläffer, “Ascon v1.2: Lightweight Authenticated Encryption and Hashing,” Journal of Cryptology, vol. 34, no. 3, Jul. 2021, doi: 10.1007/s00145-021-09398-9.


Full Text: PDF

Refbacks

  • There are currently no refbacks.


 

Indonesian Journal of Electrical Engineering and Informatics (IJEEI)
ISSN 2089-3272

Creative Commons Licence

This work is licensed under a Creative Commons Attribution 4.0 International License.

web analytics
View IJEEI Stats