Quick jump to page content
  • Main Navigation
  • Main Content
  • Sidebar

  • Home
  • Current
  • Archives
  • Join As Reviewer
  • Info
  • Announcements
  • Statistics
  • About
    • About the Journal
    • Submissions
    • Editorial Team
    • Privacy Statement
    • Contact
  • Register
  • Login
  • Home
  • Current
  • Archives
  • Join As Reviewer
  • Info
  • Announcements
  • Statistics
  • About
    • About the Journal
    • Submissions
    • Editorial Team
    • Privacy Statement
    • Contact
  1. Home
  2. Archives
  3. Vol. 6, No. 4, November 2021
  4. Articles

Issue

Vol. 6, No. 4, November 2021

Issue Published : Nov 30, 2021
Creative Commons License

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

Optimization of System Authentication Services using Blockchain Technology

https://doi.org/10.22219/kinetik.v6i4.1325
Imam Riadi
Universitas Ahmad Dahlan, Yogyakarta
Herman Herman
Universitas Ahmad Dahlan, Yogyakarta
Aulyah Zakilah Ifani
Universitas Ahmad Dahlan, Yogyakarta

Corresponding Author(s) : Aulyah Zakilah Ifani

aulyah1908048022@webmail.uad.ac.id

Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control, Vol. 6, No. 4, November 2021
Article Published : Nov 30, 2021

Share
WA Share on Facebook Share on Twitter Pinterest Email Telegram
  • Abstract
  • Cite
  • References
  • Authors Details

Abstract

With the development of the era, one thing that must be considered for security is the Login System. In most cases, user login information is stored on the server. This gives access to sensitive informatio, many hackers easily break into data from users. Based on these problems, this research focuses on data security authentication in the form of usernames and passwords in the login system. Authentication using blockchain is used to reduce malicious access and increase security for the authentication process. One of the innovative technologies that can solve these problems is Blockchain Technology. Using blockchain technology, hackers will find it difficult to change and modify the same data on all computers at the same time because it takes a very long time to crack the encryption code on each block of data in the entire computer network. Data storage or transactions in the blockchain are stored in the form of hashes. This makes it difficult for hackers to break into it. Tests in this study using Wireshark tools and network miner. Based on the research conducted, the test was conducted as many as 5 times with two scenarios, namely authentication of the login system before using the blockchain and after using the blockchain. The results obtained. The, system built using blockchain can secure data. The test results obtained that data in the form of usernames and passwords were converted into hashes and with the immutable nature of the blockchain, data from users could not be changed or replaced by anyone.

Keywords

authentication blockchain networkminer nfldc wireshark
Riadi, I., Herman, H., & Ifani, A. Z. (2021). Optimization of System Authentication Services using Blockchain Technology. Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control, 6(4). https://doi.org/10.22219/kinetik.v6i4.1325
  • ACM
  • ACS
  • APA
  • ABNT
  • Chicago
  • Harvard
  • IEEE
  • MLA
  • Turabian
  • Vancouver
Download Citation
Endnote/Zotero/Mendeley (RIS)
BibTeX
References
  1. H. Lin, Z. Yan, Y. Chen, and L. Zhang, “A Survey on Network Security-Related Data Collection Technologies,” IEEE Access, vol. 6, pp. 18345–18365, 2018. https://doi.org/10.1109/ACCESS.2018.2817921
  2. M. Rusdan and M. Sabar, “Analisis dan Perancangan Jaringan Wireless Dengan Wireless Distribution System Menggunakan User Authentication Berbasis Multi-Factor Authentication,” Jt. (Journal Inf. Technol., vol. 02, no. 01, pp. 17–24, 2020. https://doi.org/10.47292/joint.v2i1.004
  3. A. W. P. Putra, A. Bhawiyuga, and M. Data, “Implementasi Autentikasi JSON Web Token ( JWT ) Sebagai Mekanisme Autentikasi Protokol MQTT Pada Perangkat NodeMCU,” J. Pengemb. Teknol. Inf. dan Ilmu Komput., vol. 2, no. 2, pp. 584–593, 2018.
  4. Y. N. Kunang and T. Ibadi, “Celah Keamanan Sistem Autentikasi Wireless Berbasis RADIUS,” Celah Keamanan Sist. Autentikasi Wirel. Berbas. Radius, vol. 34, no. 2, pp. 1907–5022, 2013, doi: 1. Yesi Novaria Kunang 2. Taqrim Ibadi 3. Suryayusra.
  5. U. Rahardja, E. P. Harahap, and D. D. Christianto, “Pengaruh Teknologi Blockchain Terhadap Tingkat Keaslian Ijazah,” Technomedia J., vol. 4, no. 2, pp. 211–222, 2019. https://doi.org/10.33050/tmj.v4i2.1107
  6. N. I. Fauzan, “Abstrak,” vol. 4, pp. 1–15, 2018.
  7. I. Riadi, R. Umar, and I. Busthomi, “Optimasi Keamanan Autentikasi dari Man in the Middle Attack ( MiTM ) Menggunakan Teknologi Blockchain,” vol. 04, pp. 15–19, 2020.
  8. S. Hattab and I. F. Taha Alyaseen, “Consensus Algorithms Blockchain: A comparative study,” Int. J. Perceptive Cogn. Comput., vol. 5, no. 2, pp. 66–71, 2019. https://doi.org/10.31436/ijpcc.v5i2.103
  9. Y. Zheng et al., “Blockchain-based privacy protection unified identity authentication,” Proc. - 2019 Int. Conf. Cyber-Enabled Distrib. Comput. Knowl. Discov. CyberC 2019, pp. 42–49, 2019. https://doi.org/10.1109/CyberC.2019.00017
  10. E. P. Harahap, Q. Aini, and R. K. Anam, “Pemanfaatan Teknologi Blockchain Pada Platform Crowdfunding,” Technomedia J., vol. 4, no. 2, pp. 199–210, 2019. https://doi.org/10.33050/tmj.v4i2.1108
  11. W. S. Raharjo, I. D. E. K. Ratri, H. Susilo, J. Wahidin, and S. Yogyakarta, “Implementasi Two Factor Authentication Dan Protokol Zero Knowledge Proof Pada Sistem Login,” vol. 3, no. April, pp. 127–136, 2017.
  12. S. Damai et al., “Implementasi Blockchain : Studi Kasus e-Voting,” J. Infra Petra, no. 031, 2019.
  13. L. Wan, D. Eyers, and H. Zhang, “Evaluating the impact of network latency on the safety of blockchain transactions,” Proc. - 2019 2nd IEEE Int. Conf. Blockchain, Blockchain 2019, pp. 194–201, 2019. https://doi.org/10.1109/Blockchain.2019.00033
  14. N. Lasla, L. Alsahan, M. Abdallah, and M. Younis, “Green-PoW: An Energy-Efficient Blockchain Proof-of-Work Consensus Algorithm,” pp. 1–11, 2020.
  15. G. Deep, R. Mohana, A. Nayyar, P. Sanjeevikumar, and E. Hossain, “Authentication protocol for cloud databases using blockchain mechanism,” Sensors (Switzerland), vol. 19, no. 20, pp. 1–13, 2019. https://doi.org/10.3390/s19204444
  16. H. F. Putra, W. Wirawan, and O. Penangsang, “Penerapan Blockchain dan Kriptografi untuk Keamanan Data pada Jaringan Smart Grid,” J. Tek. ITS, vol. 8, no. 1, 2019. http://dx.doi.org/10.12962/j23373539.v8i1.38525
  17. S. Gupta and M. Sadoghi, “Encyclopedia of Big Data Technologies,” Encycl. Big Data Technol., no. May, 2020. https://doi.org/10.1007/978-3-319-63962-8
  18. O. Novo, “Scalable access management in IoT using blockchain: A performance evaluation,” IEEE Internet Things J., vol. 6, no. 3, pp. 4694–4701, 2019. https://doi.org/10.1109/JIOT.2018.2879679
  19. H. Baharmand, N. Saeed, T. Comes, and M. Lauras, “Developing a framework for designing humanitarian blockchain projects,” Comput. Ind., vol. 131, p. 103487, 2021. https://doi.org/10.1016/j.compind.2021.103487
  20. T. Salman, M. Zolanvari, A. Erbad, R. Jain, and M. Samaka, “Security services using blockchains: A state of the art survey,” IEEE Commun. Surv. Tutorials, vol. 21, no. 1, pp. 858–880, 2019. https://doi.org/10.1109/COMST.2018.2863956
  21. S. Singh, A. S. M. Sanwar Hosen, and B. Yoon, “Blockchain Security Attacks, Challenges, and Solutions for the Future Distributed IoT Network,” IEEE Access, vol. 9, pp. 13938–13959, 2021. https://doi.org/10.1109/ACCESS.2021.3051602
  22. J. Fat, H. Candra, and W. Wiliam, “Sekuritisasi Data Sensor Pada Aplikasi Internet of Things (IoT) Dengan Menggunakan Blockchain Ethereum Di Jaringan Testnet,” TESLA J. Tek. Elektro, vol. 21, no. 1, p. 79, 2019. http://dx.doi.org/10.24912/tesla.v21i1.5886
  23. R. Zhang, R. Xue, and L. Liu, “Security and privacy on blockchain,” arXiv, vol. 1, no. 1, 2019.
  24. V. Singla, I. K. Malav, J. Kaur, and S. Kalra, “Develop Leave Application using Blockchain Smart Contract,” 2019 11th Int. Conf. Commun. Syst. Networks, COMSNETS 2019, vol. 2061, pp. 547–549, 2019. https://doi.org/10.1109/COMSNETS.2019.8711422
  25. F. Aprialim, Adnan, and A. W. Paundu, “Penerapan Blockchain dengan Integrasi Smart Contract pada Sistem Crowdfunding,” J. RESTI (Rekayasa Sist. dan Teknol. Informasi), vol. 5, no. 1, pp. 148–154, 2021. https://doi.org/10.29207/resti.v5i1.2613
  26. U. Rahardja, Q. Aini, M. Yusup, and A. Edliyanti, “Penerapan Teknologi Blockchain Sebagai Media Pengamanan Proses Transaksi E-Commerce,” Comput. Eng. Sci. Syst. J., vol. 5, no. 1, pp. 28–32, 2020. https://doi.org/10.24114/cess.v5i1.14893
  27. A. Fadlil, I. Riadi, and A. Nugrahantoro, “Data Security for School Service Top-Up Transactions Based on AES Combination Blockchain Technology,” Lontar Komput. J. Ilm. Teknol. Inf., vol. 11, no. 3, p. 155, 2020. https://doi.org/10.24843/LKJITI.2020.v11.i03.p04
  28. L. Ismanto, H. S. Ar, A. N. Fajar, Sfenrianto, and S. Bachtiar, “Blockchain as E-Commerce Platform in Indonesia,” J. Phys. Conf. Ser., vol. 1179, no. 1, 2019. https://doi.org/10.1088/1742-6596/1179/1/012114
  29. A. Rizky, S. Kurniawan, R. D. Gumelar, V. Kurniawan, and M. B. Prakoso, “Use Of blockchain technology in implementing information system security on education,” BEST (Journal Biol. Educ. Sains Technol., vol. 4, no. 1, pp. 62–70, 2021.
  30. Z. Wang, L. Yang, Q. Wang, D. Liu, Z. Xu, and S. Liu, “ArtChain: Blockchain-enabled platform for art marketplace,” Proc. - 2019 2nd IEEE Int. Conf. Blockchain, Blockchain 2019, pp. 447–454, 2019. https://doi.org/10.1109/Blockchain.2019.00068
  31. X. Zhu and D. Wang, “Research on Blockchain Application for E-Commerce, Finance and Energy,” IOP Conf. Ser. Earth Environ. Sci., vol. 252, no. 4, 2019. http://dx.doi.org/10.1088/1755-1315/252/4/042126
  32. A. Alam, S. M. Zia Ur Rashid, M. Abdus Salam, and A. Islam, “Towards Blockchain-Based E-voting System,” 2018 Int. Conf. Innov. Sci. Eng. Technol. ICISET 2018, pp. 351–354, 2018. https://doi.org/10.1109/ICISET.2018.8745613
  33. S. Shorman, M. Allaymoun, and O. Hamid, “Developing the E-Commerce Model a Consumer To Consumer Using Blockchain Network Technique,” Int. J. Manag. Inf. Technol., vol. 11, no. 02, pp. 55–64, 2019. http://dx.doi.org/10.5121/ijmit.2019.11204
  34. E. W. Richard Sharpe, “Wireshark User ’ s Guide,” Pp. 191, 2014.
  35. A. R. Shajina and P. Varalakshmi, “A novel dual authentication protocol (DAP) for multi-owners in cloud computing,” Cluster Comput., vol. 20, no. 1, pp. 507–523, 2017. https://doi.org/10.1007/s10586-017-0774-y
  36. X. Yang, Y. Chen, and X. Chen, “Effective scheme against 51% attack on proof-of-work blockchain with history weighted information,” Proc. - 2019 2nd IEEE Int. Conf. Blockchain, Blockchain 2019, pp. 261–265, 2019. https://doi.org/10.1109/Blockchain.2019.00041
  37. A. S. Anakath, S. Rajakumar, and S. Ambika, “Privacy preserving multi factor authentication using trust management,” Cluster Comput., vol. 22, pp. 10817–10823, 2019. https://doi.org/10.1007/s10586-017-1181-0
Read More

References


H. Lin, Z. Yan, Y. Chen, and L. Zhang, “A Survey on Network Security-Related Data Collection Technologies,” IEEE Access, vol. 6, pp. 18345–18365, 2018. https://doi.org/10.1109/ACCESS.2018.2817921

M. Rusdan and M. Sabar, “Analisis dan Perancangan Jaringan Wireless Dengan Wireless Distribution System Menggunakan User Authentication Berbasis Multi-Factor Authentication,” Jt. (Journal Inf. Technol., vol. 02, no. 01, pp. 17–24, 2020. https://doi.org/10.47292/joint.v2i1.004

A. W. P. Putra, A. Bhawiyuga, and M. Data, “Implementasi Autentikasi JSON Web Token ( JWT ) Sebagai Mekanisme Autentikasi Protokol MQTT Pada Perangkat NodeMCU,” J. Pengemb. Teknol. Inf. dan Ilmu Komput., vol. 2, no. 2, pp. 584–593, 2018.

Y. N. Kunang and T. Ibadi, “Celah Keamanan Sistem Autentikasi Wireless Berbasis RADIUS,” Celah Keamanan Sist. Autentikasi Wirel. Berbas. Radius, vol. 34, no. 2, pp. 1907–5022, 2013, doi: 1. Yesi Novaria Kunang 2. Taqrim Ibadi 3. Suryayusra.

U. Rahardja, E. P. Harahap, and D. D. Christianto, “Pengaruh Teknologi Blockchain Terhadap Tingkat Keaslian Ijazah,” Technomedia J., vol. 4, no. 2, pp. 211–222, 2019. https://doi.org/10.33050/tmj.v4i2.1107

N. I. Fauzan, “Abstrak,” vol. 4, pp. 1–15, 2018.

I. Riadi, R. Umar, and I. Busthomi, “Optimasi Keamanan Autentikasi dari Man in the Middle Attack ( MiTM ) Menggunakan Teknologi Blockchain,” vol. 04, pp. 15–19, 2020.

S. Hattab and I. F. Taha Alyaseen, “Consensus Algorithms Blockchain: A comparative study,” Int. J. Perceptive Cogn. Comput., vol. 5, no. 2, pp. 66–71, 2019. https://doi.org/10.31436/ijpcc.v5i2.103

Y. Zheng et al., “Blockchain-based privacy protection unified identity authentication,” Proc. - 2019 Int. Conf. Cyber-Enabled Distrib. Comput. Knowl. Discov. CyberC 2019, pp. 42–49, 2019. https://doi.org/10.1109/CyberC.2019.00017

E. P. Harahap, Q. Aini, and R. K. Anam, “Pemanfaatan Teknologi Blockchain Pada Platform Crowdfunding,” Technomedia J., vol. 4, no. 2, pp. 199–210, 2019. https://doi.org/10.33050/tmj.v4i2.1108

W. S. Raharjo, I. D. E. K. Ratri, H. Susilo, J. Wahidin, and S. Yogyakarta, “Implementasi Two Factor Authentication Dan Protokol Zero Knowledge Proof Pada Sistem Login,” vol. 3, no. April, pp. 127–136, 2017.

S. Damai et al., “Implementasi Blockchain : Studi Kasus e-Voting,” J. Infra Petra, no. 031, 2019.

L. Wan, D. Eyers, and H. Zhang, “Evaluating the impact of network latency on the safety of blockchain transactions,” Proc. - 2019 2nd IEEE Int. Conf. Blockchain, Blockchain 2019, pp. 194–201, 2019. https://doi.org/10.1109/Blockchain.2019.00033

N. Lasla, L. Alsahan, M. Abdallah, and M. Younis, “Green-PoW: An Energy-Efficient Blockchain Proof-of-Work Consensus Algorithm,” pp. 1–11, 2020.

G. Deep, R. Mohana, A. Nayyar, P. Sanjeevikumar, and E. Hossain, “Authentication protocol for cloud databases using blockchain mechanism,” Sensors (Switzerland), vol. 19, no. 20, pp. 1–13, 2019. https://doi.org/10.3390/s19204444

H. F. Putra, W. Wirawan, and O. Penangsang, “Penerapan Blockchain dan Kriptografi untuk Keamanan Data pada Jaringan Smart Grid,” J. Tek. ITS, vol. 8, no. 1, 2019. http://dx.doi.org/10.12962/j23373539.v8i1.38525

S. Gupta and M. Sadoghi, “Encyclopedia of Big Data Technologies,” Encycl. Big Data Technol., no. May, 2020. https://doi.org/10.1007/978-3-319-63962-8

O. Novo, “Scalable access management in IoT using blockchain: A performance evaluation,” IEEE Internet Things J., vol. 6, no. 3, pp. 4694–4701, 2019. https://doi.org/10.1109/JIOT.2018.2879679

H. Baharmand, N. Saeed, T. Comes, and M. Lauras, “Developing a framework for designing humanitarian blockchain projects,” Comput. Ind., vol. 131, p. 103487, 2021. https://doi.org/10.1016/j.compind.2021.103487

T. Salman, M. Zolanvari, A. Erbad, R. Jain, and M. Samaka, “Security services using blockchains: A state of the art survey,” IEEE Commun. Surv. Tutorials, vol. 21, no. 1, pp. 858–880, 2019. https://doi.org/10.1109/COMST.2018.2863956

S. Singh, A. S. M. Sanwar Hosen, and B. Yoon, “Blockchain Security Attacks, Challenges, and Solutions for the Future Distributed IoT Network,” IEEE Access, vol. 9, pp. 13938–13959, 2021. https://doi.org/10.1109/ACCESS.2021.3051602

J. Fat, H. Candra, and W. Wiliam, “Sekuritisasi Data Sensor Pada Aplikasi Internet of Things (IoT) Dengan Menggunakan Blockchain Ethereum Di Jaringan Testnet,” TESLA J. Tek. Elektro, vol. 21, no. 1, p. 79, 2019. http://dx.doi.org/10.24912/tesla.v21i1.5886

R. Zhang, R. Xue, and L. Liu, “Security and privacy on blockchain,” arXiv, vol. 1, no. 1, 2019.

V. Singla, I. K. Malav, J. Kaur, and S. Kalra, “Develop Leave Application using Blockchain Smart Contract,” 2019 11th Int. Conf. Commun. Syst. Networks, COMSNETS 2019, vol. 2061, pp. 547–549, 2019. https://doi.org/10.1109/COMSNETS.2019.8711422

F. Aprialim, Adnan, and A. W. Paundu, “Penerapan Blockchain dengan Integrasi Smart Contract pada Sistem Crowdfunding,” J. RESTI (Rekayasa Sist. dan Teknol. Informasi), vol. 5, no. 1, pp. 148–154, 2021. https://doi.org/10.29207/resti.v5i1.2613

U. Rahardja, Q. Aini, M. Yusup, and A. Edliyanti, “Penerapan Teknologi Blockchain Sebagai Media Pengamanan Proses Transaksi E-Commerce,” Comput. Eng. Sci. Syst. J., vol. 5, no. 1, pp. 28–32, 2020. https://doi.org/10.24114/cess.v5i1.14893

A. Fadlil, I. Riadi, and A. Nugrahantoro, “Data Security for School Service Top-Up Transactions Based on AES Combination Blockchain Technology,” Lontar Komput. J. Ilm. Teknol. Inf., vol. 11, no. 3, p. 155, 2020. https://doi.org/10.24843/LKJITI.2020.v11.i03.p04

L. Ismanto, H. S. Ar, A. N. Fajar, Sfenrianto, and S. Bachtiar, “Blockchain as E-Commerce Platform in Indonesia,” J. Phys. Conf. Ser., vol. 1179, no. 1, 2019. https://doi.org/10.1088/1742-6596/1179/1/012114

A. Rizky, S. Kurniawan, R. D. Gumelar, V. Kurniawan, and M. B. Prakoso, “Use Of blockchain technology in implementing information system security on education,” BEST (Journal Biol. Educ. Sains Technol., vol. 4, no. 1, pp. 62–70, 2021.

Z. Wang, L. Yang, Q. Wang, D. Liu, Z. Xu, and S. Liu, “ArtChain: Blockchain-enabled platform for art marketplace,” Proc. - 2019 2nd IEEE Int. Conf. Blockchain, Blockchain 2019, pp. 447–454, 2019. https://doi.org/10.1109/Blockchain.2019.00068

X. Zhu and D. Wang, “Research on Blockchain Application for E-Commerce, Finance and Energy,” IOP Conf. Ser. Earth Environ. Sci., vol. 252, no. 4, 2019. http://dx.doi.org/10.1088/1755-1315/252/4/042126

A. Alam, S. M. Zia Ur Rashid, M. Abdus Salam, and A. Islam, “Towards Blockchain-Based E-voting System,” 2018 Int. Conf. Innov. Sci. Eng. Technol. ICISET 2018, pp. 351–354, 2018. https://doi.org/10.1109/ICISET.2018.8745613

S. Shorman, M. Allaymoun, and O. Hamid, “Developing the E-Commerce Model a Consumer To Consumer Using Blockchain Network Technique,” Int. J. Manag. Inf. Technol., vol. 11, no. 02, pp. 55–64, 2019. http://dx.doi.org/10.5121/ijmit.2019.11204

E. W. Richard Sharpe, “Wireshark User ’ s Guide,” Pp. 191, 2014.

A. R. Shajina and P. Varalakshmi, “A novel dual authentication protocol (DAP) for multi-owners in cloud computing,” Cluster Comput., vol. 20, no. 1, pp. 507–523, 2017. https://doi.org/10.1007/s10586-017-0774-y

X. Yang, Y. Chen, and X. Chen, “Effective scheme against 51% attack on proof-of-work blockchain with history weighted information,” Proc. - 2019 2nd IEEE Int. Conf. Blockchain, Blockchain 2019, pp. 261–265, 2019. https://doi.org/10.1109/Blockchain.2019.00041

A. S. Anakath, S. Rajakumar, and S. Ambika, “Privacy preserving multi factor authentication using trust management,” Cluster Comput., vol. 22, pp. 10817–10823, 2019. https://doi.org/10.1007/s10586-017-1181-0

Author biographies is not available.
Download this PDF file
PDF
Statistic
Read Counter : 223 Download : 146

Downloads

Download data is not yet available.

Quick Link

  • Author Guidelines
  • Download Manuscript Template
  • Peer Review Process
  • Editorial Board
  • Reviewer Acknowledgement
  • Aim and Scope
  • Publication Ethics
  • Licensing Term
  • Copyright Notice
  • Open Access Policy
  • Important Dates
  • Author Fees
  • Indexing and Abstracting
  • Archiving Policy
  • Scopus Citation Analysis
  • Statistic
  • Article Withdrawal

Meet Our Editorial Team

Ir. Amrul Faruq, M.Eng., Ph.D
Editor in Chief
Universitas Muhammadiyah Malang
Google Scholar Scopus
Agus Eko Minarno
Editorial Board
Universitas Muhammadiyah Malang
Google Scholar  Scopus
Hanung Adi Nugroho
Editorial Board
Universitas Gadjah Mada
Google Scholar Scopus
Roman Voliansky
Editorial Board
Dniprovsky State Technical University, Ukraine
Google Scholar Scopus
Read More
 

KINETIK: Game Technology, Information System, Computer Network, Computing, Electronics, and Control
eISSN : 2503-2267
pISSN : 2503-2259


Address

Program Studi Elektro dan Informatika

Fakultas Teknik, Universitas Muhammadiyah Malang

Jl. Raya Tlogomas 246 Malang

Phone 0341-464318 EXT 247

Contact Info

Principal Contact

Amrul Faruq
Phone: +62 812-9398-6539
Email: faruq@umm.ac.id

Support Contact

Fauzi Dwi Setiawan Sumadi
Phone: +62 815-1145-6946
Email: fauzisumadi@umm.ac.id

© 2020 KINETIK, All rights reserved. This is an open-access article distributed under the terms of the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License