Hatma Suryotrisongko, Ridho Rahman Hariadi, Muh Reza Aisyi, K. Ghozali, R. W. Sholikah
{"title":"ITS射频识别门系统安全性和速度改进的评估和建议","authors":"Hatma Suryotrisongko, Ridho Rahman Hariadi, Muh Reza Aisyi, K. Ghozali, R. W. Sholikah","doi":"10.1109/ISITIA59021.2023.10220973","DOIUrl":null,"url":null,"abstract":"Sepuluh Nopember Institute of Technology is one of Indonesia's largest campuses in Indonesia, used RFID to access entrances and exits within the ITS environment to increase security in the campus area. However, several problems occurred after the gate system was implemented at ITS. Namely, there was no security method for cards so that other people can copy and use data. The ITS RFID Gate Server has several security vulnerabilities and the occurrence of long queues of vehicles on the RFID Gate system ITS. This research begins with the planning stage, then the data collection stage in the form of primary and secondary data, followed by analysis and discussion, as well as the documentation stage. The analysis and discussion stage is carried out by analyzing the queuing system at ITS RFID Gate, then providing recommendations for queuing systems at ITS RFID Gate. Security analysis was conducted on access cards and ITS RFID Gate system servers. Then score the findings of security vulnerabilities using the Common Vulnerability Scoring System (CVSS) and give security recommendations on the ITS RFID Gate system. Based on the research results, the number of RFID gates that correspond to the arrival rate of existing two-wheeled vehicles so that there will not be long queues is two RFID gates. Six security vulnerabilities are found in the ITS RFID Gate System, with two critical-level vulnerabilities, one high-level vulnerability, and three medium-level vulnerabilities.","PeriodicalId":116682,"journal":{"name":"2023 International Seminar on Intelligent Technology and Its Applications (ISITIA)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Evaluation and Recommendations for Improvements to the Security and Speed of the ITS RFID Gate System\",\"authors\":\"Hatma Suryotrisongko, Ridho Rahman Hariadi, Muh Reza Aisyi, K. Ghozali, R. W. Sholikah\",\"doi\":\"10.1109/ISITIA59021.2023.10220973\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Sepuluh Nopember Institute of Technology is one of Indonesia's largest campuses in Indonesia, used RFID to access entrances and exits within the ITS environment to increase security in the campus area. However, several problems occurred after the gate system was implemented at ITS. Namely, there was no security method for cards so that other people can copy and use data. The ITS RFID Gate Server has several security vulnerabilities and the occurrence of long queues of vehicles on the RFID Gate system ITS. This research begins with the planning stage, then the data collection stage in the form of primary and secondary data, followed by analysis and discussion, as well as the documentation stage. The analysis and discussion stage is carried out by analyzing the queuing system at ITS RFID Gate, then providing recommendations for queuing systems at ITS RFID Gate. Security analysis was conducted on access cards and ITS RFID Gate system servers. Then score the findings of security vulnerabilities using the Common Vulnerability Scoring System (CVSS) and give security recommendations on the ITS RFID Gate system. Based on the research results, the number of RFID gates that correspond to the arrival rate of existing two-wheeled vehicles so that there will not be long queues is two RFID gates. Six security vulnerabilities are found in the ITS RFID Gate System, with two critical-level vulnerabilities, one high-level vulnerability, and three medium-level vulnerabilities.\",\"PeriodicalId\":116682,\"journal\":{\"name\":\"2023 International Seminar on Intelligent Technology and Its Applications (ISITIA)\",\"volume\":\"7 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-07-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 International Seminar on Intelligent Technology and Its Applications (ISITIA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISITIA59021.2023.10220973\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 International Seminar on Intelligent Technology and Its Applications (ISITIA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISITIA59021.2023.10220973","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
摘要
Sepuluh十一月理工学院是印度尼西亚最大的校园之一,在ITS环境中使用RFID来访问出入口,以增加校园区域的安全性。然而,闸门系统在ITS实施后出现了几个问题。也就是说,卡片没有安全措施,其他人可以复制和使用数据。RFID门禁服务器存在多个安全漏洞,在RFID门禁系统中存在车辆排队问题。本研究从计划阶段开始,然后以一手和二手数据的形式进行数据收集阶段,然后是分析和讨论,以及文档阶段。分析和讨论阶段通过对ITS RFID登机口的排队系统进行分析,然后对ITS RFID登机口的排队系统提出建议。对门禁卡和ITS RFID门禁系统服务器进行了安全性分析。然后使用通用漏洞评分系统(CVSS)对发现的安全漏洞进行评分,并给出ITS RFID Gate系统的安全建议。根据研究结果,与现有两轮车辆的到达率相对应的RFID门的数量为两个RFID门,以避免长时间排队。该系统共发现6个安全漏洞,其中2个为临界漏洞,1个为高级漏洞,3个为中级漏洞。
Evaluation and Recommendations for Improvements to the Security and Speed of the ITS RFID Gate System
Sepuluh Nopember Institute of Technology is one of Indonesia's largest campuses in Indonesia, used RFID to access entrances and exits within the ITS environment to increase security in the campus area. However, several problems occurred after the gate system was implemented at ITS. Namely, there was no security method for cards so that other people can copy and use data. The ITS RFID Gate Server has several security vulnerabilities and the occurrence of long queues of vehicles on the RFID Gate system ITS. This research begins with the planning stage, then the data collection stage in the form of primary and secondary data, followed by analysis and discussion, as well as the documentation stage. The analysis and discussion stage is carried out by analyzing the queuing system at ITS RFID Gate, then providing recommendations for queuing systems at ITS RFID Gate. Security analysis was conducted on access cards and ITS RFID Gate system servers. Then score the findings of security vulnerabilities using the Common Vulnerability Scoring System (CVSS) and give security recommendations on the ITS RFID Gate system. Based on the research results, the number of RFID gates that correspond to the arrival rate of existing two-wheeled vehicles so that there will not be long queues is two RFID gates. Six security vulnerabilities are found in the ITS RFID Gate System, with two critical-level vulnerabilities, one high-level vulnerability, and three medium-level vulnerabilities.