Evaluasi Kinerja Algoritma AES-128 dan SPECK-128/128 pada Sistem Smart Door Lock Berbasis IoT
DOI:
https://doi.org/10.30865/jurikom.v13i1.9524Keywords:
Internet of Things(IoT), Smart Door Lock, RFID, MQTT, Algoritma AES, Algoritma SPECK, ESP8266Abstract
The Internet of Things (IoT) is increasingly being used in smart home systems, one of which is the Smart Door Lock. However, data communication on IoT devices is vulnerable to network attacks such as sniffing and man-in-the-middle, especially since many devices are still designed with weak security mechanisms. The main issue studied in this research is how to protect RFID data from being easily intercepted, while maintaining efficiency on devices with limited resources. The proposed solution is the implementation of AES-128 and SPECK-128/128 cryptographic algorithms on the MQTT communication protocol using ESP8266 devices. The research was conducted experimentally with 50 measurements for each algorithm, covering encryption and decryption time parameters, memory usage, and encryption effectiveness against sniffing. The results show that AES-128 has stable performance but requires more execution time and memory because its algorithm is complex with many stages. In contrast, SPECK-128/128 is faster and more memory-efficient thanks to its simple ARX-based structure, although its consistency is slightly lower. Sniffing analysis shows that both algorithms are capable of encrypting all packets with 100% security, so that no plaintext data can be read. Thus, this study confirms that there is a trade-off between security and efficiency
References
[1] F. Nahdi and H. Dhika, “Analisis Dampak Internet of Things (IoT) Pada Perkembangan Teknologi di Masa Yang Akan Datang,” INTEGER J. Inf. Technol., vol. 6, no. 1, Jun. 2021, doi: 10.31284/j.integer.2021.v6i1.1423.
[2] N. F. Jannah, H. P. Pratama, and S. Fuada, "IoT-Based Smart Door Selector for Double Security: Integration of RFID and Blynk App for Economical Solution," Eduvest - Journal of Universal Studies, vol. 4, no. 10, pp. 8097–8102, Oct. 2024, doi: 10.55927/eduvest.v4i10.14125.
[3] H. P. Pratama, A. S. Prihatmanto, and A. Sukoco, “Implementation Messaging Broker Middleware for Architecture of Public Transportation Monitoring System,” in 2020 6th International Conference on Interactive Digital Media (ICIDM), Bandung, Indonesia: IEEE, Dec. 2020, pp. 1–5. doi: 10.1109/ICIDM51048.2020.9339673.
[4] M. T. Mbejo and I. Sufian, "Analisis Tantangan Keamanan Jaringan IoT dan Strategi Mitigasinya," Jurnal Responsive Teknik Informatika, vol. 9, no. 1, pp. 53–60, Jun. 2025, doi: 10.36352/jr.v9i01.1178.
[5] H. Ulfa, A. I. Basuki, G. M. Suranegara, and A. Fauzi, “DDoS Protection System for SDN Network Based on Multi Controller and Load Balancer,” SISTEMASI, vol. 13, no. 2, p. 555, Mar. 2024, doi: 10.32520/stmsi.v13i2.3802.
[6] A. P. Paramaputra, G. M. Suranegara, and E. Setyowati, "Mitigation of Multi Target Denial of Service (DoS) Attacks Using Wazuh Active Response," Journal of Computer Networks, Architecture and High Performance Computing, vol. 7, no. 2, pp. 483–493, Apr. 2025, doi: 10.47709/cnahpc.v7i2.5755.
[7] M. A. Aziz, T. Sutikno, H. Yuliansyah, A. I. Dewi, Y. E. Rohmadi, and D. Setiawati, “Vulnerability Analysis of Smart Lock Using NIST SP 800-115 Method,” J. Penelit. Pendidik. IPA, vol. 11, no. 8, pp. 264–272, Aug. 2025, doi: 10.29303/jppipa.v11i8.12219.
[8] D. Alfatah, “Penggunaan Kriptografi Asimetris Dalam Pengamanan Komunikasi IOT”.
[9] M. Sari, H. D. Purnomo, and I. Sembiring, “Review : Algoritma Kriptografi Sistem Keamanan SMS di Android,” J. Inf. Technol., vol. 2, no. 1, pp. 11–15, Mar. 2022, doi: 10.46229/jifotech.v2i1.292.
[10] R. K. Endrayanto, A. Muttaqin, and R. A. Setyawan, “Advanced Encryption Standard (AES) pada Modul Internet of Things (IoT)”.
[11] M. Apriannur, D. T. Nugrahadi, A. Farmadi, and M. I. Mazdadi, “ANALISIS IMPLEMENTASI ALGORITMA ENKRIPSI AES-128 BIT DATA RFID PADA JARINGAN 802.11n UNTUK MONITORING JARAK JAUH BERBASIS MQTT,” vol. 10, 2023.
[12] Muhammad Naufal Rabbani and D Farah Afianti, “Analisis Performansi Algoritma Small AES Menggunakan Arduino UNO, Studi Kasus : Pemantauan Suhu,” Log. J. Penelit. Inform., vol. 2, no. 2, Jan. 2025, doi: 10.25124/logic.v2i2.8814.
[13] National Institute of Standards and Technology (US), “Advanced Encryption Standard (AES),” National Institute of Standards and Technology (U.S.), Washington, D.C., NIST FIPS 197-upd1, May 2023. doi: 10.6028/NIST.FIPS.197-upd1.
[14] G. Avoine and J. Hernandez-Castro, Eds., *Security of Ubiquitous Computing Systems: Selected Topics*. Cham, Switzerland: Springer, 2021. doi: 10.1007/978-3-030-10591-4



