Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Emir Husni is active.

Publication


Featured researches published by Emir Husni.


international conference on instrumentation, communications, information technology, and biomedical engineering | 2011

Efficient tag-to-tag near field communication (NFC) protocol for secure mobile payment

Emir Husni; Kuspriyanto; Noor Cholis Basjaruddin; Tito Waluyo Purboyo; Sugeng Purwantoro; Huda Ubaya

Communication between the near field communication (NFC) devices occurs in a very close distance of less than 10 cm. In the NFC-based payment system, close proximity between devices will increase the security of transactions. The disadvantage is the interaction between devices requires more physical activity of device owners because the device must be brought near to other devices some times. Besides requiring more physical activity, NFC-based interaction also takes a longer time because the device needs to be moved from one position to another. This paper proposed Secure and efficient protocol that will reduce the physical activity of the device owners and reducing transaction time. The data sending between merchant and payer will be executed without waiting for each other and one transaction will require two data transmissions are performed by the merchant and payer. Transactions are secured by the use of encryption on each data which sent by the merchant and payer. In addition, the protocol also guarantees the security of offline micro transactions and online macros transactions.


international conference on electrical engineering and informatics | 2011

Rural Internet service system based on Delay Tolerant Network (DTN) using train system

Emir Husni

A Delay Tolerant Network (DTN) technique is used in this research for approaching the digital divide problem in Indonesia. In this research, a train system was chosen as infrastructures as DTN routers using Wi-Fi. Tens/hundreds/thousands of remote areas are passed through by a train, this makes Internet services proposed having low costs and appropriate for remote areas. The complete Internet services system was successfully designed and implemented.


international conference on information and communication technology | 2010

Delay Tolerant Network utilizing train for news portal and email services

Emir Husni; Ari Rinaldi Sumarmo

Delay Tolerant Network (DTN) is an end-to-end network architecture designed to provide communication in highly stressed networking environments. Stressed networking environments are those with intermittent connectivity, large and/or variable delays, and high bit error rate. In this paper, basic concept, system architecture, services scheme, and DTN-based network design for delivering news portal and email services to remote villages by utilizing train as a DTN router and wireless LAN or WiFi as intermediate network will be discussed. To illustrate the system, we perform an experiment by modeling the system based on the network design and then simulate the services.


international seminar on intelligent technology and its applications | 2016

Applied Internet of Things (IoT): Car monitoring system using IBM BlueMix

Emir Husni; Galuh Boy Hertantyo; Daniel Wahyu Wicaksono; Faisal Hasibuan; Andri Ulus Rahayu; Muhamad Agus Triawan

Wide application of Internet technology brings the technology Internet of Things (IoT), a technology where any object can be on the internet and communicate with each other. This research will bring IoT technology to build the smart car system, which can be monitored and can actively report the condition to predict routine maintenance and provide information in order to achieve an efficient way of driving. Smart Car is realized by utilizing a standard On-Board Diagnostic (OBD) which is applied to the vehicles available at this time. OBD allows any vehicle parameters can be monitored electronically using the OBD Scanner tool. Monitored parameters will be uploaded to a cloud server utilizing IBM BlueMix applications and make the car as the IoT that can be analyzed in order to obtain information for predictive maintenance and monitoring of the Smart Car. The purpose of this research is to apply IoT in the smart car system so that cars predictive maintenance and monitoring functions can be realized. Big data analysist from the cloud would be informed to either driver, owners, or technician. This system is expected to be able to increase the efficiency of the car because of observed and supervised driving behavior which is able to reduce fuel consumption and exhaust emissions.


2012 International Conference on Green and Ubiquitous Technology | 2012

Energy efficient network method using delay tolerant network

Emir Husni; Aska Narendra

Computer usage with network has been growing rapidly. The problem is that the energy usage of the networked computer sending data and one not sending data are similir. In this paper we build the method for network power saving by suing delay tolerant network. DTN method will be suitable for energy efficient network because every node in the network will store the data transmitted untill the destination is on. The method used in energy efficient network is to make every node is on and off based on the schedule. This on-off method will reduce the energy usage.


international conference on electrical engineering and informatics | 2011

Telemedicine system based on Delay Tolerant Network

Emir Husni; Jacquline Waworundeng

The exchange of medical information between rural areas with urban areas still hampered by the network infrastructure and communication systems that have not been adequate. With the rate of development of communication technology is very rapid, there are still rural areas unreached by the Internet. The mechanism of communication in rural areas that have not been connected to the Internet, can be bridged with the Delay Tolerant Network protocol. This means that, the communication occurs between DTN and Internet networks. DTN is a protocol which tolerant to unavailable end-to-end link, temporary connection with a high level of latency, nodes that rarely connected, and often susceptible to interferences. Medical consultation in komed-kampoeng.net system is a media communication and data exchange. The service in this system involves discussion and diagnosis among general practitioners in rural area at community health centres and medical specialists in urban hospitals. The development of telemedicine system based on DTN refers to store and forward data using email system in DTN.


asian internet engineering conference | 2012

Delay tolerant network based e-mail system using trains

Emir Husni; Agus Wibowo

DTN protocol can overcome network problems such as intermittent connectivity, long or variable delay, asymmetric data rates, and high error rates. TCP/IP protocol, a common network protocol currently used for the internet, cannot handle these problems. By using postfix and DTN2, we can build a DTN-based e-mail server that is capable of sending and receiving e-mails even the server is not continuously connected to a network. This also requires a new method to send and receive e-mails. Postfix is used for managing and processing e-mail users. DTN2 is used for processing e-mails into bundles and bundles into e-mails based on DTN protocol. This requires programs that integrate the postfix email system with DTN2, implemented using bash shell and awk, for sending and receiving e-mail. The email system has been tested in the real condition using trains. The results show that the DTN based email system is working properly.


international conference on telecommunication systems services and applications | 2014

Application of Mean Time-to-Compromise and VEA-bility security metrics in auditing computer network security

Emir Husni; Yustika Kurniati

This study focuses on the application of security metrics to a computer network. Mean Time-to-Compromise (MTTC) metric and VEA-bility metric are selected for this study. MTTC is calculated using a set of equations based on the known vulnerabilities of the system. VEA-bility is selected because it uses CVSS that has a wide coverage of security aspects. The input data for both metrics are obtained from Nessus, a network security tool. Both metrics give numerical results which are simple to comprehend to average clients. The purpose of this study are to calculate MTTC and VEA-bility values of the network, to compare the security level of different network configurations, also to compare the feasibility and convenience of using both metrics. The results of the study can be used as recommendations for network security assessment and references to determine policies relating to computer network management.


international conference on telecommunication systems services and applications | 2014

Development of integrated mobile money system using Near Field Communication (NFC)

Emir Husni; Adrian Ariono

Nowadays smartphone is widely used in every part of the world. Trend that is happening now is mobile phone penetration tends to decrease while the smartphone tend to increase. More and more newly launched smartphone offers support for Near Field Communication (NFC). NFC technology enables simple and safe two-way interactions between electronic devices. This research has developed a smartphone-based electronic payment system using NFC. Besides being used to make a payment, the system can be expanded to other applications such as time and attendance machine for a community. To compensate the lack of physical secure element, registration, synchronization, top-up, and attendance record process is done online, while the transaction is done offline. Various cryptographic algorithms are used, such as password-based key derivation function and key wrap algorithm to maintain the security of the system. Devices used in this research are Android smartphones and NFC reader module CN-370S-2.


international seminar on intelligent technology and its applications | 2016

Digital signing using national identity as a mobile ID

Emir Husni

Todays implementation of digital signature consist of uniquely generated key connected with someones digital identity (certificate). However, the current implementation of digital signature may present problem in official agreement, which needs legitimate identity information and needs to involve notary. This paper covers the method of digital signature creation which mimic physical signature in official agreement, and helps involve party being able to work with digital documents as well as working with physical documents. Using cloud computing approach, and mobile devices, we integrate signing service to users national identity.

Collaboration


Dive into the Emir Husni's collaboration.

Top Co-Authors

Avatar

Adrian Ariono

Bandung Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Angga Pratama Putra

Bandung Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Nazmi Febrian

Bandung Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Agus Wibowo

Bandung Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Arief Syaichu Rohman

Bandung Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Aska Narendra

Bandung Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Faisal Hasibuan

Bandung Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Kuspriyanto

Bandung Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Noor Cholis Basjaruddin

Bandung Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Sugeng Purwantoro

Bandung Institute of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge