Difference between revisions of "Riset-disertasi"

From belajarwiki
Jump to navigation Jump to search
Line 7: Line 7:
 
#* Payload size (bytes dikirim).
 
#* Payload size (bytes dikirim).
 
#* Retransmisi (via pcap).
 
#* Retransmisi (via pcap).
 +
 
# QoE (Quality of Experience)
 
# QoE (Quality of Experience)
* SSIM/PSNR area non-ROI (harus ≈1 / ∞ → fidelity utuh).
+
#* SSIM/PSNR area non-ROI (harus ≈1 / ∞ → fidelity utuh).
* SSIM area ROI (rendah → privasi terlindungi).
+
#* SSIM area ROI (rendah → privasi terlindungi).
 +
 
 
# Cryptographic footprint
 
# Cryptographic footprint
* Distribusi bytes terenkripsi antar gambar/resolusi.
+
#* Distribusi bytes terenkripsi antar gambar/resolusi.
 +
 
 
# Privasi visual
 
# Privasi visual
* Apakah ROI (misalnya wajah) tak terbaca setelah enkripsi.
+
#* Apakah ROI (misalnya wajah) tak terbaca setelah enkripsi.
  
 
------------------------------------------------------------------------------------------------------------
 
------------------------------------------------------------------------------------------------------------
Line 19: Line 22:
 
==[[Riset-2]] (App-layer vs Transport-layer vs Hybrid) → Paper Q1 [port 5002 - 6002]==
 
==[[Riset-2]] (App-layer vs Transport-layer vs Hybrid) → Paper Q1 [port 5002 - 6002]==
 
Tujuan: membandingkan keamanan di layer aplikasi (ROI+Ascon) vs layer transport (OSCORE) vs kombinasi keduanya (cross layer).
 
Tujuan: membandingkan keamanan di layer aplikasi (ROI+Ascon) vs layer transport (OSCORE) vs kombinasi keduanya (cross layer).
1. Perbandingan overhead antar layer
+
# Perbandingan overhead antar layer
  * Latency (CoAP vs OSCORE vs ROI+Ascon+OSCORE).
+
#* Latency (CoAP vs OSCORE vs ROI+Ascon+OSCORE).
  * Payload size (besar header tambahan OSCORE).
+
#* Payload size (besar header tambahan OSCORE).
  * CPU usage: ROI+Ascon (app) vs OSCORE (transport).
+
#* CPU usage: ROI+Ascon (app) vs OSCORE (transport).
2. Reliabilitas komunikasi
+
 
  * Packet retransmission / packet loss.
+
# Reliabilitas komunikasi
  * Goodput (gambar/MBps efektif).
+
#* Packet retransmission / packet loss.
3. Security
+
#* Goodput (gambar/MBps efektif).
  * Transport: full payload protected, tapi tidak selective.
+
 
  * App-layer: selective encryption, lebih hemat.
+
# Security
  * Kombinasi: double protection, overhead lebih tinggi.
+
#* Transport: full payload protected, tapi tidak selective.
4. Platform diversity
+
#* App-layer: selective encryption, lebih hemat.
  * Evaluasi di VM (GNS3) vs Raspberry Pi vs ESP32.
+
#* Kombinasi: double protection, overhead lebih tinggi.
  * Apakah constraint hardware mempengaruhi performa signifikan.
+
 
 +
# Platform diversity
 +
#* Evaluasi di VM (GNS3) vs Raspberry Pi vs ESP32.
 +
#* Apakah constraint hardware mempengaruhi performa signifikan.
  
 
------------------------------------------------------------------------------------------------------------
 
------------------------------------------------------------------------------------------------------------
Line 39: Line 45:
 
Tujuan: membuktikan NanoCipher sebagai AEAD ringan khusus multimedia.
 
Tujuan: membuktikan NanoCipher sebagai AEAD ringan khusus multimedia.
 
Evaluasi inti (kriptografi + sistem):
 
Evaluasi inti (kriptografi + sistem):
1. Benchmark kriptografi (MCU/CPU level)
+
# Benchmark kriptografi (MCU/CPU level)
  * Cycles/byte (ukur dengan benchmark Ascon/PRESENT/ChaCha20).
+
#* Cycles/byte (ukur dengan benchmark Ascon/PRESENT/ChaCha20).
  * Throughput (MB/s).
+
#* Throughput (MB/s).
  * Code size (flash, KB).
+
#* Code size (flash, KB).
  * RAM usage.
+
#* RAM usage.
  * Energy/byte (estimasi via current measurement di Raspberry Pi/ESP32).
+
#* Energy/byte (estimasi via current measurement di Raspberry Pi/ESP32).
2. Keamanan algoritma
+
 
  * Correctness: Known Answer Test (KAT).
+
# Keamanan algoritma
  * Nonce misuse resistance (uji basic).
+
#* Correctness: Known Answer Test (KAT).
  * Konsistensi constant-time (cek dengan alat timing).
+
#* Nonce misuse resistance (uji basic).
3. Perbandingan dengan cipher lain
+
#* Konsistensi constant-time (cek dengan alat timing).
  * Ascon.
+
 
  * PRESENT.
+
# Perbandingan dengan cipher lain
  * ChaCha20.
+
#* Ascon.
  * AES.
+
#* PRESENT.
4. Integrasi
+
#* ChaCha20.
  * Kirim gambar (via libcoap) dengan NanoCipher.
+
#* AES.
  * Latency, payload, CPU, QoE → dibandingkan Ascon/AES/ChaCha20/PRESENT.
+
 
 +
# Integrasi
 +
#* Kirim gambar (via libcoap) dengan NanoCipher.
 +
#* Latency, payload, CPU, QoE → dibandingkan Ascon/AES/ChaCha20/PRESENT.
  
 
------------------------------------------------------------------------------------------------------------
 
------------------------------------------------------------------------------------------------------------
Line 63: Line 72:
 
Tujuan: menguji apakah NanoCipher bisa jadi alternatif AEAD di OSCORE (transport security).
 
Tujuan: menguji apakah NanoCipher bisa jadi alternatif AEAD di OSCORE (transport security).
 
Evaluasi:
 
Evaluasi:
1. Integrasi OSCORE
+
# Integrasi OSCORE
  * Modifikasi libcoap → NanoCipher jadi AEAD opsional di COSE.
+
#* Modifikasi libcoap → NanoCipher jadi AEAD opsional di COSE.
  * Kinerja encode/decode OSCORE.
+
#* Kinerja encode/decode OSCORE.
2. Perbandingan OSCORE-AES vs OSCORE-Ascon vs OSCORE-NanoCipher
+
 
  * Latency per message.
+
# Perbandingan OSCORE-AES vs OSCORE-Ascon vs OSCORE-NanoCipher
  * Payload overhead.
+
#* Latency per message.
  * CPU usage.
+
#* Payload overhead.
  * Energy consumption.
+
#* CPU usage.
3. Robustness
+
#* Energy consumption.
  * Correctness (uji KAT + interop message decrypt).
+
 
  * Replay protection (uji ulang id_context, sequence number).
+
# Robustness
4. Resource impact (IoT)
+
#* Correctness (uji KAT + interop message decrypt).
  * Memory footprint tambahan bila OSCORE pakai NanoCipher.
+
#* Replay protection (uji ulang id_context, sequence number).
  * Apakah Raspberry/ESP32 masih muat (RAM/flash).
+
 
 +
# Resource impact (IoT)
 +
#* Memory footprint tambahan bila OSCORE pakai NanoCipher.
 +
#* Apakah Raspberry/ESP32 masih muat (RAM/flash).

Revision as of 09:17, 29 October 2025

Riset-1 (ROI + Ascon via CoAP) → Paper Conference [port 5001 - 6001]

Tujuan: menunjukkan keunggulan selective encryption untuk multimedia di IoT. Evaluasi:

  1. Kinerja sistem
    • CPU usage / execution time enkripsi (per gambar, per resolusi).
    • Latency end-to-end (ClientA → ServerB).
    • Payload size (bytes dikirim).
    • Retransmisi (via pcap).
  1. QoE (Quality of Experience)
    • SSIM/PSNR area non-ROI (harus ≈1 / ∞ → fidelity utuh).
    • SSIM area ROI (rendah → privasi terlindungi).
  1. Cryptographic footprint
    • Distribusi bytes terenkripsi antar gambar/resolusi.
  1. Privasi visual
    • Apakah ROI (misalnya wajah) tak terbaca setelah enkripsi.

Riset-2 (App-layer vs Transport-layer vs Hybrid) → Paper Q1 [port 5002 - 6002]

Tujuan: membandingkan keamanan di layer aplikasi (ROI+Ascon) vs layer transport (OSCORE) vs kombinasi keduanya (cross layer).

  1. Perbandingan overhead antar layer
    • Latency (CoAP vs OSCORE vs ROI+Ascon+OSCORE).
    • Payload size (besar header tambahan OSCORE).
    • CPU usage: ROI+Ascon (app) vs OSCORE (transport).
  1. Reliabilitas komunikasi
    • Packet retransmission / packet loss.
    • Goodput (gambar/MBps efektif).
  1. Security
    • Transport: full payload protected, tapi tidak selective.
    • App-layer: selective encryption, lebih hemat.
    • Kombinasi: double protection, overhead lebih tinggi.
  1. Platform diversity
    • Evaluasi di VM (GNS3) vs Raspberry Pi vs ESP32.
    • Apakah constraint hardware mempengaruhi performa signifikan.

Riset-3 (NanoCipher – AEAD baru) → Paper Q1 [port 5003 - 6003]

Tujuan: membuktikan NanoCipher sebagai AEAD ringan khusus multimedia. Evaluasi inti (kriptografi + sistem):

  1. Benchmark kriptografi (MCU/CPU level)
    • Cycles/byte (ukur dengan benchmark Ascon/PRESENT/ChaCha20).
    • Throughput (MB/s).
    • Code size (flash, KB).
    • RAM usage.
    • Energy/byte (estimasi via current measurement di Raspberry Pi/ESP32).
  1. Keamanan algoritma
    • Correctness: Known Answer Test (KAT).
    • Nonce misuse resistance (uji basic).
    • Konsistensi constant-time (cek dengan alat timing).
  1. Perbandingan dengan cipher lain
    • Ascon.
    • PRESENT.
    • ChaCha20.
    • AES.
  1. Integrasi
    • Kirim gambar (via libcoap) dengan NanoCipher.
    • Latency, payload, CPU, QoE → dibandingkan Ascon/AES/ChaCha20/PRESENT.

Riset-4 (NanoCipher + OSCORE) → Paper Q1 [port 5004 - 6004]

Tujuan: menguji apakah NanoCipher bisa jadi alternatif AEAD di OSCORE (transport security). Evaluasi:

  1. Integrasi OSCORE
    • Modifikasi libcoap → NanoCipher jadi AEAD opsional di COSE.
    • Kinerja encode/decode OSCORE.
  1. Perbandingan OSCORE-AES vs OSCORE-Ascon vs OSCORE-NanoCipher
    • Latency per message.
    • Payload overhead.
    • CPU usage.
    • Energy consumption.
  1. Robustness
    • Correctness (uji KAT + interop message decrypt).
    • Replay protection (uji ulang id_context, sequence number).
  1. Resource impact (IoT)
    • Memory footprint tambahan bila OSCORE pakai NanoCipher.
    • Apakah Raspberry/ESP32 masih muat (RAM/flash).