Mega Apriani, Diwandaru Rousstia, Fajar Achmad Rifai, R. Harwahyu, R. F. Sari
{"title":"Implementation of Secure Work From Home System Based on Blockchain using NS3 Simulation","authors":"Mega Apriani, Diwandaru Rousstia, Fajar Achmad Rifai, R. Harwahyu, R. F. Sari","doi":"10.23919/EECSI50503.2020.9251877","DOIUrl":null,"url":null,"abstract":"Work from Home (WFH) is an activity carrying out official duties, completing outputs, coordination, meetings, and other tasks from the residence of employees. Implement WFH many users use the zoom application has vulnerabilities. The network architecture used refers to the simple experiment network. In Secure WFH there are 3 offices connected through a router. Each client in each office is connected to the router via a Virtual Private Network (VPN) on a peer-to-peer (P2P). That architecture has 18 nodes that will be simulated. Secure WFH simulation with blockchain combines secure WFH with a bitcoin code simulator from Arthur Gervais's. Implementation of blockchain on secure WFH can increase security but the resulting speed decreases. The decrease in speed when implementing secure WFH is due to the generate block process and the verification process.","PeriodicalId":6743,"journal":{"name":"2020 7th International Conference on Electrical Engineering, Computer Sciences and Informatics (EECSI)","volume":"33 1","pages":"54-59"},"PeriodicalIF":0.0000,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 7th International Conference on Electrical Engineering, Computer Sciences and Informatics (EECSI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.23919/EECSI50503.2020.9251877","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
Work from Home (WFH) is an activity carrying out official duties, completing outputs, coordination, meetings, and other tasks from the residence of employees. Implement WFH many users use the zoom application has vulnerabilities. The network architecture used refers to the simple experiment network. In Secure WFH there are 3 offices connected through a router. Each client in each office is connected to the router via a Virtual Private Network (VPN) on a peer-to-peer (P2P). That architecture has 18 nodes that will be simulated. Secure WFH simulation with blockchain combines secure WFH with a bitcoin code simulator from Arthur Gervais's. Implementation of blockchain on secure WFH can increase security but the resulting speed decreases. The decrease in speed when implementing secure WFH is due to the generate block process and the verification process.