Penerapan Sistem Keamanan (Firewall) Pada Jaringan Smart Home

  • Algazali Raihan Batubara * Mail Program Studi Teknik Informatika, Fakultas Teknik dan Komputer, Universitas Harapan Medan, Indonesia
  • Ilham Faisal Program Studi Teknik Informatika, Fakultas Teknik dan Komputer, Universitas Harapan Medan, Indonesia
  • Imran Lubis Program Studi Teknik Informatika, Fakultas Teknik dan Komputer, Universitas Harapan Medan, Indonesia
Keywords: Smart Home; Firewall; Internet of Things; Simulation; Cisco Packet Tracer

Abstract

Currently, technological developments are increasingly advanced and developing, technological developments that are very rapid with the development of the times to meet human needs. One of them is the need for safe and comfortable home technology. The application of technology in the house is to use the concept of smart home by using firewall network security. Firewall on a smart home network is a concept where Internet of Things devices are safe from hacking by unknown people and cannot be controlled by other smartphone devices. Simulation is an important part of the application of the concept that will be carried out, especially to find out that research and studies are carried out using the simulation method as a way to solve problems. Cisco Packet Tracer 7.3 is an application that can help in terms of simulating Internet of Things devices. The results obtained from the firewall security concept simulation are that in the use of IoT devices such as house doors, windows, garages, lights, webcams and air conditioners are guaranteed to be secure because the devices that have permissions that can be connected.

References

[1] T. Aziz and R. Liza, “Model Simulasi Smarthome Berbasis Internet of Things dan Cloud Computing Menggunakan Cisco Packet Tracer,” Snastikom, 2022, [Online]. Available: https://prosiding.snastikom.com/index.php/SNASTIKOM2020/article/download/41/37
[2] R. I. Akbar, D. G. Purnama, and A. Salsabila, “Pengembangan Model SmartHome berbasis IoT,” Pros. Semin. Nas. Penelit. LPPM UMJ, pp. 1–8, 2023.
[3] D. Durianto, Ananta, “Konfigurasi Cicso ASA Firewall Menggunakan ASDM,” vol. 5, no. Volume 5 No. 2, p. 305, 2021.
[4] M. U. Dewi, “Kelebihan Firewall Kekurangan Firewall,” 2021.
[5] A. Restu Mukti, C. Mukmin, E. Randa Kasih, D. Palembang Jalan Jenderal Ahmad Yani No, S. I. Ulu, and S. Selatan, “Perancangan Smart Home Menggunakan Konsep Internet of Things (IOT) Berbasis Microcontroller,” J. JUPITER, vol. 14, no. 2, pp. 516–522, 2022.
[6] H. Andrianto and G. Intan Saputra, “Smart Home System Berbasis IoT dan SMS Smart Home System Based on IoT and SMS,” Telka, vol. 6, no. 1, pp. 40–48, 2020.
[7] A. Gallileo et al., “Rancangan smarthome berbasis mikrokontroler sebagai pengendali pintu rumah dan garasi serta lampu,” vol. 12, no. 1, 2025.
[8] Y. Efendi, “Internet Of Things (Iot) Sistem Pengendalian Lampu Menggunakan Raspberry Pi Berbasis Mobile,” J. Ilm. Ilmu Komput., vol. 4, no. 2, pp. 21–27, 2018, doi: 10.35329/jiik.v4i2.41.
[9] D. Suarna and E. S. Edy, “Implementasi Internet of Things (IoT) dalam Memonitoring Komsumsi Listrik,” Bull. Inf. Technol., vol. 4, no. 2, pp. 163–170, 2023, doi: 10.47065/bit.v4i2.631.
[10] A. N. Ismail and F. Nuryana, “Angan Jaringan Smart Home,” 2024.
[11] F. Adani and S. Salsabil, “Internet of Things: Sejarah Teknologi Dan Penerapannya,” Isu Teknol. Stt Mandala, vol. 14, no. 2, pp. 92–99, 2019.
[12] M. Faqih Febriansyah, R. Setiawan, and T. Sutabri, “IJM: Indonesian Journal of Multidisciplinary Kemudahan dan Keamanan Dalam Rumah Pintar: Tinjauan Terhadap Teknologi Smart Home,” IJM Indones. J. Multidiscip., vol. 2, pp. 24–31, 2024, [Online]. Available: https://journal.csspublishing/index.php/ijm
[13] A. Dogman and M. Jewiley, “Design and Implement IoT Smart Home via Cisco Packet Tracer : Applications & Simulations,” Sixth Int. Conf. - Smart Cities State Map –Libya, no. December, p. 2, 2020.
[14] S. T. Kurniawan, “Perancangan Dan Penerapan Stateful Firewall Pada Arsitektur Dual-Homed Host,” J. Teknol. Pint., vol. 3, no. 2, pp. 1–17, 2023, [Online]. Available: http://teknologipintar.org/index.php/teknologipintar/article/view/356%0Ahttp://teknologipintar.org/index.php/teknologipintar/article/download/356/340
[15] D. Wicaksono, “Firewall Sistem Keamanan Jaringan Menggunakan Firewall dengan Metode Port Blocking dan Firewall Filtering,” JATISI (Jurnal Tek. Inform. dan Sist. Informasi), vol. 9, no. 2, pp. 1380–1392, 2022, doi: 10.35957/jatisi.v9i2.2103.
[16] F. A. Syaifuddin, D. A. Maulana, and M. F. Amrulloh, “Analisis Keamanan Jaringan Menggunakan Firewall untuk Mencegah Serangan Brute Force dan Fraud,” vol. 4, no. 2, pp. 895–902, 2024.
[17] R. Sulaiman, R. S. Al Fathul, and A. M. Raya, “Implementasi Metode Access Control List Pada Mikrotik Dalam Mengamankan Jaringan Internet Di Kantor Lurah Air Selemba,” J. Tek. Inform. dan Teknol. Inf., vol. 4, no. 1, pp. 75–85, 2024, doi: 10.55606/jutiti.v4i1.2880.
[18] S. Dewi, F. Firmansyah, and U. Hasan, “Penerapan Metode Access Control List Pada Jaringan VLAN Menggunakan Router Cisco,” IMTechno J. Ind. Manag. Technol., vol. 3, no. 1, pp. 37–41, 2022, doi: 10.31294/imtechno.v3i1.927.
[19] K. Kamarudin and M. Gazali, “Sistem Keamanan Berlapis Menggunakan Metode Access Control List Dan Enkripsi Source Code Pada Web Login,” J. Teknol. Inf., vol. 2, no. 2, pp. 48–60, 2021, doi: 10.32546/jutech.v2i2.1657.
[20] S. Jayanto, A. Tantoni, and H. Asyari, “Implementasi Keamanan Jaringan dengan Packet Filtering Berbasis Mikrotik Untuk Internet Positif Di SMKN 1 Praya,” J. Ranah Publik Indones. Kontemporer, vol. 1, no. 2, pp. 65–77, 2021, doi: 10.47134/rapik.v1i2.10.
[21] R. Prahastian, “Penggunaan Simulator Cisco Packet Tracer 7.2 Pada Rumah Kaca Pintar Untuk Tanaman Kopi Berbasis IoT,” Universitas Islam Negeri Sayarif Hidayatullah Jakarta, 2019.
[22] A. Afrizal and F. Fitriani, “Penerapan IPV4 dan IPV6 pada Jaringan yang Terhubung,” J. JTIK (Jurnal Teknol. Inf. dan Komunikasi), vol. 3, no. 1, p. 13, 2019, doi: 10.35870/jtik.v3i1.78.
Dimensions Badge
Published
2025-07-29
Section
Articles