ARTICLE
TITLE

Implementation Cryptography and Access Control on IoT-Based Warehouse Inventory Management System

SUMMARY

Warehousing is a product storage management activity to ensure product availability, so inventory management is needed to oversee the movement of logistics and equipment. Some things need to be considered in the storage process, such as the suitability of the storage location, safe from theft, and safe from physical disturbances. Vulnerabilities can occur when unauthorized users find out information from the database regarding stored goods, so a security mechanism for the warehouse database is needed. In addition, proper identification needs to be made of someone trying to access the database. In this research, a Warehouse Inventory Management System (WIMS) was created by implementing the AES-128 cryptographic algorithm, which was built using ESP32 and Raspberry Pi 3 devices. Time Password (T-OTP). The results show that the built system can overcome inventory problems in conventional warehousing management systems and implement data security using the AES-128 algorithm. The application of two-factor authentication in the form of smartcards and T-OTP shows very good results in testing its accuracy to overcome the vulnerability of unauthorized access to the system database

 Articles related

Arief Arfriandi    

The delivery of a letter electronically are very popular the last few years, so many people utilize to send important documents to the destination. Electronic mail that is commonly referred to by email, use the internet access in its operation. The email... see more


Aria Lesmana, Ruki Harwahyu, Yohan Suryanto    

In digital computing, cryptographic methods considers performance in both speed and security. This study aims to explore and improve a permutation-based symmetric chaotic cryptography technique called Chaotic Permutation Multicircular (CPMC). In this stu... see more

Revista: ULTIMATICS

Lauretha Rura,Biju Issac,Manas Kumar Haldar    

This paper discusses the implementation of an online voting system based on image steganography and visual cryptography. The system was implemented in Java EE on a web-based interface, with MySQL database server and Glassfish application server as the ba... see more


Ananda Dwi Putri, Dian Rachmawati, Heriyance Heriyance    

Komunikasi dan bertukar informasi secara jarak jauh sudah sangat mudah dan praktis. Kemudahan ini menuntut peningkatan keamanan terhadap kerahasiaan data yang dikirim. Kriptografi adalah salah satu cara yang digunakan untuk menjaga kerahasian dari sebuah... see more


Arif Sasongko,Hidayat Hidayat,Yusuf Kurniawan,Sarwono Sutikno    

Cryptography is a very important aspect in data security. The focus of research in this field is shifting from merely security aspect to consider as well the  implementation  aspect.  This  paper  aims  to  introduce&nb... see more