Abstract

The digital era is an era everyone has used technology and they are connected to each other very easily. The Smart Payment application is one of the applications that is developing in the digital era. This application is not equipped with security, so there is a concern that hackers will try to change user or even change user data. One of the possible attacks on this application is a cross-site attack (XSS). It is a code injection attack on the user side. Security in the Smart Payment application needs to be improved so that data integrity is maintained. In this research, security optimization is carried out by implementing blockchain. Blockchain has the advantage in terms of security with the concept of decentralization by utilizing a consensus algorithm that can eliminate and make improvements to data changes made by hackers. The result obtained from this study is the implementation of blockchain to maintain the security of payment transaction data on the Smart Payment application from XSS attacks. It is proven by the results of the vulnerability before and after blockchain implementation. Before the implementation of the vulnerability is found, 1 XSS vulnerability had a high level of overall risk. Meanwhile, the result of the vulnerability after blockchain implementation was not found from XSS attacks (the XSS vulnerability was 0 or not found).

Highlights

  • The digital era is an era when everyone has used technology and they are connected to each other very

  • The second stage is the determination of Internet of Things (IoT) design using RS232 and NodeMCU

  • The chain containing interconnected block blocks will be carried out by consensus so that blocks containing invalid data can be ignored by other members and even deleted from the blockchain network automatically

Read more

Summary

INTRODUCTION

The digital era is an era when everyone has used technology and they are connected to each other very . If the attack is successful, the data is sent to the hacker's web so that the hacker can use it to log into the smart payment application and disguise himself as a user who was successfully hacked. The tools needed in the previous study is used for IoT design including NodeMCU, RS232, USB cable, and laptop. 3. USB and laptop are two tools which are used to assist the IoT design process. RS232 must be connected to the laptop using a USB cable so that the input data can be read and processed by RS232 and NodeMCU.

RESULTS AND DISCUSSION
XSS Vulnerability Scanner
CONCLUSIONS AND RECOMMENDATIONS
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.