Hatma Suryotrisongko, Ridho Rahman Hariadi, Muh Reza Aisyi, K. Ghozali, R. W. Sholikah
{"title":"Evaluation and Recommendations for Improvements to the Security and Speed of the ITS RFID Gate System","authors":"Hatma Suryotrisongko, Ridho Rahman Hariadi, Muh Reza Aisyi, K. Ghozali, R. W. Sholikah","doi":"10.1109/ISITIA59021.2023.10220973","DOIUrl":null,"url":null,"abstract":"Sepuluh Nopember Institute of Technology is one of Indonesia's largest campuses in Indonesia, used RFID to access entrances and exits within the ITS environment to increase security in the campus area. However, several problems occurred after the gate system was implemented at ITS. Namely, there was no security method for cards so that other people can copy and use data. The ITS RFID Gate Server has several security vulnerabilities and the occurrence of long queues of vehicles on the RFID Gate system ITS. This research begins with the planning stage, then the data collection stage in the form of primary and secondary data, followed by analysis and discussion, as well as the documentation stage. The analysis and discussion stage is carried out by analyzing the queuing system at ITS RFID Gate, then providing recommendations for queuing systems at ITS RFID Gate. Security analysis was conducted on access cards and ITS RFID Gate system servers. Then score the findings of security vulnerabilities using the Common Vulnerability Scoring System (CVSS) and give security recommendations on the ITS RFID Gate system. Based on the research results, the number of RFID gates that correspond to the arrival rate of existing two-wheeled vehicles so that there will not be long queues is two RFID gates. Six security vulnerabilities are found in the ITS RFID Gate System, with two critical-level vulnerabilities, one high-level vulnerability, and three medium-level vulnerabilities.","PeriodicalId":116682,"journal":{"name":"2023 International Seminar on Intelligent Technology and Its Applications (ISITIA)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 International Seminar on Intelligent Technology and Its Applications (ISITIA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISITIA59021.2023.10220973","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Sepuluh Nopember Institute of Technology is one of Indonesia's largest campuses in Indonesia, used RFID to access entrances and exits within the ITS environment to increase security in the campus area. However, several problems occurred after the gate system was implemented at ITS. Namely, there was no security method for cards so that other people can copy and use data. The ITS RFID Gate Server has several security vulnerabilities and the occurrence of long queues of vehicles on the RFID Gate system ITS. This research begins with the planning stage, then the data collection stage in the form of primary and secondary data, followed by analysis and discussion, as well as the documentation stage. The analysis and discussion stage is carried out by analyzing the queuing system at ITS RFID Gate, then providing recommendations for queuing systems at ITS RFID Gate. Security analysis was conducted on access cards and ITS RFID Gate system servers. Then score the findings of security vulnerabilities using the Common Vulnerability Scoring System (CVSS) and give security recommendations on the ITS RFID Gate system. Based on the research results, the number of RFID gates that correspond to the arrival rate of existing two-wheeled vehicles so that there will not be long queues is two RFID gates. Six security vulnerabilities are found in the ITS RFID Gate System, with two critical-level vulnerabilities, one high-level vulnerability, and three medium-level vulnerabilities.