Implementasi Autentifikasi 2 Langkah Pada Sistem Keamanan Pintu Rumah Menggunakan Arduino Uno

Muhammad, Afghan Bawafie Syarifudin (2022) Implementasi Autentifikasi 2 Langkah Pada Sistem Keamanan Pintu Rumah Menggunakan Arduino Uno. Undergraduate Thesis thesis, Institut Teknologi Telkom Purwokerto.

[img] Text
Cover.pdf

Download (724kB)
[img] Text
ABSTRACT.pdf

Download (26kB)
[img] Text
ABSTRAK.pdf

Download (53kB)
[img] Text
BAB I.pdf

Download (20kB)
[img] Text
BAB II .pdf

Download (486kB)
[img] Text
BAB III.pdf

Download (298kB)
[img] Text
BAB IV.pdf
Restricted to Registered users only

Download (458kB) | Request a copy
[img] Text
BAB V.pdf

Download (40kB)
[img] Text
DAFTAR PUSTAKA.pdf

Download (141kB)
[img] Text
LAMPIRAN.pdf
Restricted to Registered users only

Download (48kB) | Request a copy

Abstract

Along with the development of time, a new problem arises which is quite worrying, namely when leaving the house for a long time with an empty house without anyone at home. This is often a target or target for criminals to carry out their actions, namely by committing theft in a house. From these problems, a home security system design was made by utilizing 2-step security authentication that can provide even more secure security and e-KTP as the opening of this security system, which when attaching the e-KTP to the RFID reader will read a UID from e-KTP then the LCD displays the words "UID is correct, Enter OTP code", then enter the password to unlock this automatic lock. The method used is the Black Box method for testing the functionality and testing the durability of the tool. This method is used to perform a test of the software and hardware that has been made whether it is running as expected or not. The results of testing this system obtained results that match the author's expectations. The RFID module can read UID well, the LCD can display writing as desired, the keypad works well, and the relay can act as a door lock solenoid switch properly. So that the system can run well and can open the door using an e-KTP then security authentication is 2 steps, which results in the conclusion that the system works well but requires a fairly high electrical power. Keywords : e-KTP, RFID, Microntroller, OTP, Autenfication level 2

Item Type: Thesis (Undergraduate Thesis)
Subjects: T Technology > TA Engineering (General). Civil engineering (General)
Divisions: Faculty of Informatics > Informatics Engineering
Depositing User: staff repository
Date Deposited: 18 Oct 2022 06:04
Last Modified: 18 Oct 2022 06:04
URI: http://repository.ittelkom-pwt.ac.id/id/eprint/8474

Actions (login required)

View Item View Item