Two Sequential Authentication Method on Locker Security System Using Open-Sourced Smartphone
Main Article Content
Abstract
Lockers are commonly used to store luggages temporarly. For security purposes, lockers are equipped with conventional lock keys to keep it safe. In order to enhance the security aspects, there are several options by optimalizing current emerging technology that is two-factors authentication. This method is commencing by inputting some PIN (Personal Identification Numbers) code then it would trigger confirmation access by smartphone to unlock the lockers. By having this security schemes, any unauthorized users could not allowed any attempt to unseal the locker. More over, the owner could immediately recognize if there was any suspicious access. The result of this research shows that the system could unlock the locker by inputting the correct PIN and verified access by achieving the successful percentage of 100%. The averages response time is around 6.647 seconds, while any attempt to unlock the locker by inputting the incorrect access gain 100% percentages
Downloads
Article Details
Please find the rights and licenses in the Journal of Information Technology and Computer Engineering (JITCE).
1. License
The non-commercial use of the article will be governed by the Creative Commons Attribution license as currently displayed on Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
2. Author(s)’ Warranties
The author(s) warrants that the article is original, written by stated author(s), has not been published before, contains no unlawful statements, does not infringe the rights of others, is subject to copyright that is vested exclusively in the author and free of any third party rights, and that any necessary permissions to quote from other sources have been obtained by the author(s).
3. User Rights
JITCE adopts the spirit of open access and open science, which disseminates articles published as free as possible under the Creative Commons license. JITCE permits users to copy, distribute, display, and perform the work for non-commercial purposes only. Users will also need to attribute authors and JITCE on distributing works in the journal.
4. Rights of Authors
Authors retain the following rights:
- Copyright, and other proprietary rights relating to the article, such as patent rights,
- the right to use the substance of the article in future own works, including lectures and books,
- the right to reproduce the article for own purposes,
- the right to self-archive the article.
- the right to enter into separate, additional contractual arrangements for the non-exclusive distribution of the article's published version (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal (Journal of Information Technology and Computer Engineering).
5. Co-Authorship
If the article was jointly prepared by other authors; upon submitting the article, the author is agreed on this form and warrants that he/she has been authorized by all co-authors on their behalf, and agrees to inform his/her co-authors. JITCE will be freed on any disputes that will occur regarding this issue.
7. Royalties
By submitting the articles, the authors agreed that no fees are payable from JITCE.
8. Miscellaneous
JITCE will publish the article (or have it published) in the journal if the article’s editorial process is successfully completed and JITCE or its sublicensee has become obligated to have the article published. JITCE may adjust the article to a style of punctuation, spelling, capitalization, referencing and usage that it deems appropriate. The author acknowledges that the article may be published so that it will be publicly accessible and such access will be free of charge for the readers.
References
[2] Prawiroredjo, Kiki., dkk. 2016. Locker Dengan Pengamanan Kata Kunci Berbasis Mikrokontroler. Jurnal JETri Volume 13 Nomor 2 – Februari 2016 Hal 29 - 42.
[3] Triyono. 2017. Rancang Bangun Loker Penyimpanan Aset Menggunakan Voice Berbasis Arduino Uno pada Dinas Marga dan Pengairan Kabupaten Tanggerang. Jurnal IJCCS Volume 1 – November 2017 Hal 283 – 287.
[4] Herwandi. 2017. Rancang Bangun Sistem Keamanan Loker dengan Menggunakan Fingerprint. Jurnal Eltek Vol.15 No.1 Hal 59-70 – Oktober 2017.
[5] Marza, I. (2019, March 29). Pembuatan Alat Tracking Artefak pada Museum Menggunakan Modul GSM Berbasis Mikrokontroler dan Short Massage System. Journal of Information Technology and Computer Engineering, 3(01), 18-24.
[6] Parallax Inc. Datasheet 4x4 Matrix Membrane Keypad. https://www.parallax.com/sites/default/files/downloads/27899-4x4-Matrix-Membrane-Keypad-v1.2.pdf. Diakses pada 27/02/2018 pukul 14:04.
[7] Parallax Inc. Datasheet Parallax Serial LCD. https://www.parallax.com/sites/default/files/downloads/27979-Parallax-Serial-LCDs-Product-Guide-v3.1.pdf. Diakses pada 27/02/2018 pukul 14:07.
[8] Shandy, Yan Detha., dkk. 2015. Implementasi Sistem Kunci Pintu Otomatis Untuk Smart Home Menggunakan SMS Gateway. Jurnal e-Proceeding of Engineering Vol.2, No.2 Agustus 2015.
[9] WiFi Module ESP8266 Datasheet. Sparkfun Electronics. www.sparkfun.com. Diakses pada 20/07/2018 pukul 13.54.
[10] ThingSpeak. http://www.mathworks.com/help/thingspeak/. Diakses pada 27/10/2018 pukul 12:32.
[11] Yendri, D., & Putri, R. (2018, March 29). Sistem Pengontrolan Dan Keamanan Rumah Pintar (Smart Home) Berbasis Android. Journal of Information Technology and Computer Engineering, 2(01), 1-6.
[12] Suprianto, Dodit. 2012. Pemrograman Aplikasi Android. Jakarta: MediaKom.