scholarly journals Enhancing Security and Privacy in Local Area Network (LAN) with TORVPN Using Raspberry Pi as Access Point: A Design and Implementation

2021 ◽  
Vol 6 (2) ◽  
pp. 29-40
Author(s):  
Mohd Nizam Osman ◽  
Khairul Anwar Sedek ◽  
Nor Arzami Othman ◽  
Muhammad Afiqhakimi Rosli ◽  
Mushahadah Maghribi

Network security is designed to protect the integrity, confidentiality and accessibility of computer networks and data using both software and hardware technologies. Every person, including organization requires a degree of network security solutions in place to protect it from the ever-growing landscape of cyber threats in the wild today.  This paper aims to design and implement TorVPN as an access point using Raspberry Pi in enhancing security and privacy in Local Area Network (LAN).  This access point was implemented by using the combination of The Onion Router (Tor) and Virtual Private Network (VPN) services. Then, the graphical user interface application was developed to assist and facilitate the user to access the network securely without having the difficulties to configure and install any software. To determine the effectiveness of the proposed work, there were two experiments involved in this study. Firstly, the confidentiality test which to verify its privacy in keeping the information securely. Secondly, the performance test of the Internet connectivity in terms of ping, download and upload speed. The encourage results was expected as the confidentiality tested on the TorVPN access point network has shown the positive outcome by securing client’s Internet data packet. While, the Internet connectivity is not stable enough, when the client’s IP address changed in the network. Hence, the combination VPN and Tor service using Raspberry Pi as an access point inside the LAN is suitable and secure the information in the network, but do not suggest for user who wants a good Internet connectivity. 

2018 ◽  
Vol 8 (2) ◽  
pp. 254-281 ◽  
Author(s):  
Md. Manowarul Islam ◽  
Nobuo Funabiki ◽  
Minoru Kuribayashi ◽  
Sumon Kumar Debnath ◽  
Kwenga Ismael Munene ◽  
...  

Author(s):  
Rahardhita Widyatra Sudibyo ◽  
Nobuo Funabiki ◽  
Minoru Kuribayashi ◽  
Kwenga Ismael Munene ◽  
Hendy Briantoro ◽  
...  

The IEEE802.11n wireless local-area network (WLAN) has been widely adopted due to the flexible coverage and lower installation cost. However, the TCP throughput unfairness was detected when multiple hosts concurrently communicate with a single access-point (AP). Previously, the authors proposed the TCP fairness control method for only two hosts in the elastic WLAN system using Raspberry Pi AP, which dynamically adapts the topology according to the traffic demand. The delay is introduced in the packet transmission to the faster host from the AP, which is optimized by the PI feedback control such that the measured throughput becomes equal between the hosts. In this paper, the authors proposed a generalization of this method for any number of hosts by newly introducing the target throughput as the equal goal among the hosts. It is dynamically updated using the measured throughputs. The effectiveness of the proposal is verified through experiments using the elastic WLAN system testbed with one AP and up to four hosts.


Sensors ◽  
2019 ◽  
Vol 19 (8) ◽  
pp. 1880 ◽  
Author(s):  
Kristián Košťál ◽  
Rastislav Bencel ◽  
Michal Ries ◽  
Peter Trúchly ◽  
Ivan Kotuliak

Wireless Local Area Network (WLAN) infrastructure is a dominant technology for direct access to the Internet and for cellular mobile data traffic offloading to WLANs. Additionally, the enterprise infrastructure can be used to provide functionality for the Internet of Things and Machine to Machine scenarios. This work is focused on improvements of radio resources control scalability similar to mobile networks via handover between cells. We introduce an improved IEEE 802.11 architecture utilizing Software-Defined Networks (SDNs). The proposed architecture allows communications during device movements without losing a quality of service (QoS). The fast seamless handover with QoS enables efficient usage of radio resources in large networks. Our improvements consist of integrating wireless management to OpenFlow protocol, separating encryption and decryption from an access point. In parallel, this feature as a side effect unloads processing at the Access Points (APs). Finally, the functionality of architecture design and scalability was proven by Colored Petri Nets (CPNs). The second proof of our concept was performed on two scenarios. The first scenario was applied to a delay sensitive use case. The second scenario considers a network congestion in real world conditions. Client’s mobility was integrated into both scenarios. The design was developed to demonstrate SDN WLAN architecture efficiency.


Author(s):  
P.E. Orukpe ◽  
T.O. Erhiaguna ◽  
F.O. Agbontaen

The advent of wireless computing and massive processing power available within portable devices provides organizations with an unprecedented ability to provide flexible computing services on-demand to enable business initiatives and this development has increased the demand for wireless network security, which if unaddressed enables the theft of data, lowers productivity, and causes quantifiable financial losses. Flaws arising from wireless protocol with networking design and implementation errors present challenges to the Wireless Fidelity (Wi-Fi) community of users. In this paper, we attempt to document and classify the flaws in Wi-Fi Protected Setup (WPS), then proving the existence of this flaw with a WPS Pin Cracking Method, and presenting a Reverse Engineering countermeasure to eliminating WPS from an Access Point firmware, including other recommendations to helping the network administrators not repeat the errors that are the root causes of flaws of wireless networking in general from being exploited. By implementing the various techniques discussed in this paper, a better and more secure wireless network will be developed.


Author(s):  
Hendy Briantoro ◽  
Nobuo Funabiki ◽  
Minoru Kuribayashi ◽  
Kwenga Ismael Munene ◽  
Rahardhita Widyatra Sudibyo ◽  
...  

Currently, the IEEE 802.11 wireless local-area network (WLAN) has been prevalent around the world due to the advantages of mobility, flexibility, and scalability. WLAN offers the wireless internet-access method through an access-point (AP) at homes, schools, or offices. When multiple APs are deployed in the network field, the proper transmission power of each AP is essential to improve the performance, considering the coverage area, transmission capacity, and interference. In this paper, the authors study the transmission power optimization of concurrently communicating two APs in WLAN. Based on extensive experiment results, the authors propose a method of selecting the best power for each AP from the signal-to-noise ratio (SNR) of receiving signal strength (RSS). For evaluations, the authors implemented the proposed method on the elastic WLAN system testbed using Raspberry Pi for APs and conducted experiments for nine network topologies in two buildings at Okayama University. The results show that the proposal always selects the best power in any topology.


2019 ◽  
Vol 5 (1) ◽  
Author(s):  
Fitra Nugraha

AbstrakPenelitian ini membahas tentang analisis keamanan Wireless LAN (Wireless Local Area Network) terhadap serangan luar pada protokol Wireless Protected Access (WPA), Web Proxy, dan Virtual Private Network (VPN), yang digunakan untuk menyerang LAN.Penelitian akan dilakukan di Jaringan UNIKUNET (Jaringan Wireless Universitas Kuningan Kampus 1) yang menggunakan captive portal sebagai media autentikasi jaringan public hotspotnya. Tiga jenis perangkat lunak yang digunakan sebagai penyerang yaitu, penyerang Visual Network Stumbler, Aircrack dan Wireshark. Perangkat lunak tersebut digunakan di laptop pada jarak 5m sampai 25m dari titik akses LAN Nirkabel. Dari hasil experimen terlihat waktu tercepat direspon oleh Protokol WPA diberikan oleh penyerang Visual Network Stumbler, diikuti oleh Aircrack dan Wireshark, dan kemungkinan celah keamanan yang didapat.Kata kunci: Wireless Protected Access, Captive Portal, WLAN, Web Proxy dan Virtual Private Network�AbstractThis study discusses the analysis of Wireless LAN (Wireless Local Area Network) security against external attacks on the Wireless Protected Access (WPA), Web Proxy, and Virtual Private Network (VPN) protocols, which are used to attack LANs.The research will be conducted at the UNIKUNET Network (Kuningan University Campus Wireless Network 1) that uses captive portal as a media authentication for its public hotspot network. Three types of software are used as attackers, namely, attackers Visual Network Stumbler, Aircrack and Wireshark. The software is used on laptops at a distance of 5m to 25m from the Wireless LAN access point. From the experimental results, it was seen that the fastest time was responded to by the WPA Protocol provided by Visual Network Stumbler attackers, followed by Aircrack and Wireshark, and possible security gaps were obtained.Keywords: Wireless Protected Access, Captive Portal, WLAN, Web Proxy and Virtual Private Network�


2016 ◽  
Vol 3 (1) ◽  
pp. 31-39
Author(s):  
F Ammar ◽  
Hanafi Hanafi

WiFi bekerja pada band 2,4 GHz dan 5 GHz. Standar WiFi yang bekerja pada frekuensi ini antara lain IEEE802.11g dan IEEE802.11a. Pada penelitian ini dilakukan pengukuran terhadap transfer rate download dan upload data dengan standar IEEE802.11g dan IEEE802.11a. Pengukuran dilakukan pada kanal Line of Sight (LOS), menggunakan dua buah laptop yang dihubungkan dengan Access Point (AP) standar IEEE802.11g dan IEEE802.11a.  Hasil penelitian diperoleh, pada standar IEEE802.11g, transfer rate download dan upload data tertinggi 2.662,54.KB/s dan 2.549,60 KB/s, dan terendah 484,50.KB/s dan 477,40 KB/s, sedangkan pada standar IEEE802.11a, transfer rate download dan upload data tertinggi 8.104,68 KB/s dan 5.744,24 KB/s, dan terendah 872,24 KB/s dan 465,38.KB/s. Pada standar IEEE802.11g, transfer rate download dan upload data pada sinyal terendah hingga di bawah 35% dan 30%, dari transfer rate download dan upload data tertinggi. Pada standar IEEE802.11a, transfer rate download dan upload data pada kualitas sinyal terendah hingga di bawah 20% dan 30%, dari transfer rate download dan upload data tertinggi. Kemampuan transfer rate download data Standar IEEE802.11a, 2–3 kali lebih baik pada kondisi kualitas sinyal tertinggi, dan tidak lebih dari 2 kali pada kondisi kualitas sinyal terendah, dibandingkan kemampuan transfer rate download data standar IEEE802.11g. Kemampuan transfer rate upload data Standar IEEE802.11a, 1,4–3 kali lebih baik pada kondisi kualitas sinyal tertinggi, dan 1-3 kali lebih baik pada kondisi kualitas sinyal terendah, dibandingkan kemampuan transfer rate upload data standar IEEE802.11g.


2021 ◽  
Vol 12 (06) ◽  
pp. 4750-4762
Author(s):  
Yakubu Ajiji Makeri ◽  
Giuseppe T. Cirella ◽  
Francisco Javier Galas ◽  
Hamid Mohsin Jadah ◽  
Adetayo Olaniyi Adeniran

Author(s):  
Muel Fred L. Ruiz ◽  
Rica I. Esclada ◽  
Jannica H. Balderama ◽  
Anzel Anne I. Aguirre ◽  
Ma. Nancy I. Cutin ◽  
...  

This study presents the development of a wireless, interactive, educational (WISE) game that incorporates the use of smartphones for reviewing lessons that might suit the standards of the Philippine government’s education department. It is easier today to engage students using digital platforms for education using interactive digital games. In this study, the users can play the game by connecting the smartphones to the prototype through wireless local area network. It consists of two types of cards: power cards which contribute excitement to the game, and question cards which contain questions to be answered by the players. The prototype is an integration of the following components: Raspberry Pi 3B, RFID reader and cards, and speakers. A graphical user interface where the players interact with the game was created using scripting languages, such as PHP, and JavaScript. The project was evaluated by different grade school students of Metro Manila, Philippines. The results of users’ evaluation show that the prototype is accessible and effective for use based on functionality and that the project can also serve as a tool for lesson reviews. Future development of WISE game includes its integration and compatibility to different operating systems with larger databases and accessibility.


2021 ◽  
Vol 8 (2) ◽  
pp. 75-84
Author(s):  
Gusni Amini Siagian ◽  
Lindawati Lindawati ◽  
Sopian Soim

Wireless Local area Network  (WLAN) suatu jaringan area lokal tanpa kabel yang menggunakan frekuensi radio sebagai media transmisinya. Dalam penelitian ini merancang sebuah jaringan wifi di Perumahan Dosen Politeknik Negeri Sriwijaya, yang pancaran wifinya dari kampus Politeknik Negeri Sriwijaya, sehingga Perumahan Dosen dapat mengakses wifi tanpa perlu datang ke kampus. Sebagai receiver komunikasi wifi diperlukan peranan antena dalam sistem komunikasi tanpa kabel (wireless) dengan jarak jauh, antena yang digunakan adalah antena yagi yang bekerja pada frekuensi 2400 MHz. Antena yagi dipilih karena sifatnya yang directional atau pola pancarannya yang terarah. Dalam perancangan antena yagi untuk ukuran reflector, driven, director dan balun dibantu dengan software yagi calculator serta disimulasikan dan diuji  menggunakan MMANA-GAL untuk menghasilkan parameter antena yang lebih akurat. Antena yagi ini kemudian akan dihubungkan dengan access point yang disetup sebagai client untuk menerima sinyal dari transmitter dan router sebagai proses routing agar user di Perumahan Dosen dapat mengakses wifi tersebut. Berdasarkan hasil pengujian MMANA-GAL antena yagi dengan frekuensi 2400 MHz, diperoleh Standing Wave Ratio (SWR) sebesar 1.16 dan Penguatan (Gain) sebesar 14,59 dB.  


Sign in / Sign up

Export Citation Format

Share Document