ANALISIS KEAMANAN JARINGAN WIRELESS LAN (WLAN) PADA PT. PLN (PERSERO) WILAYAH P2B AREA SORONG

2015 ◽  
Vol 1 (1) ◽  
pp. 62-74
Author(s):  
Sonny Rumalutur

Penelitian ini membahas tentang analisis keamanan Wireless Local Area Network (Wireless LAN) di PT. PLN (Persero) Wilayah P2B Area Sorong terhadap serangan luar pada protokol Wireless Protected Access (WPA), Web Proxy, dan Virtual Private Network (VPN), digunakan untuk menyerang LAN.Tiga jenis perangkat lunak yang digunakan sebagai penyerang yaitu, penyerang Network Stumbler, Aircrack dan Wireshark. Perangkat lunak tersebut digunakan di laptop pada jarak 5m sampai 25m dari titik akses LAN Nirkabel.Dari hasil experimen terlihat waktu tercepat direspon oleh Protokol WPA diberikan oleh penyerang Network Stumbler, diikuti oleh Aircrack dan Wireshark.

2019 ◽  
Vol 5 (1) ◽  
Author(s):  
Fitra Nugraha

AbstrakPenelitian ini membahas tentang analisis keamanan Wireless LAN (Wireless Local Area Network) terhadap serangan luar pada protokol Wireless Protected Access (WPA), Web Proxy, dan Virtual Private Network (VPN), yang digunakan untuk menyerang LAN.Penelitian akan dilakukan di Jaringan UNIKUNET (Jaringan Wireless Universitas Kuningan Kampus 1) yang menggunakan captive portal sebagai media autentikasi jaringan public hotspotnya. Tiga jenis perangkat lunak yang digunakan sebagai penyerang yaitu, penyerang Visual Network Stumbler, Aircrack dan Wireshark. Perangkat lunak tersebut digunakan di laptop pada jarak 5m sampai 25m dari titik akses LAN Nirkabel. Dari hasil experimen terlihat waktu tercepat direspon oleh Protokol WPA diberikan oleh penyerang Visual Network Stumbler, diikuti oleh Aircrack dan Wireshark, dan kemungkinan celah keamanan yang didapat.Kata kunci: Wireless Protected Access, Captive Portal, WLAN, Web Proxy dan Virtual Private Network�AbstractThis study discusses the analysis of Wireless LAN (Wireless Local Area Network) security against external attacks on the Wireless Protected Access (WPA), Web Proxy, and Virtual Private Network (VPN) protocols, which are used to attack LANs.The research will be conducted at the UNIKUNET Network (Kuningan University Campus Wireless Network 1) that uses captive portal as a media authentication for its public hotspot network. Three types of software are used as attackers, namely, attackers Visual Network Stumbler, Aircrack and Wireshark. The software is used on laptops at a distance of 5m to 25m from the Wireless LAN access point. From the experimental results, it was seen that the fastest time was responded to by the WPA Protocol provided by Visual Network Stumbler attackers, followed by Aircrack and Wireshark, and possible security gaps were obtained.Keywords: Wireless Protected Access, Captive Portal, WLAN, Web Proxy and Virtual Private Network�


Jurnal Teknik ◽  
2018 ◽  
Vol 7 (1) ◽  
Author(s):  
Heru Abrianto

Microstrip antenna which designed with dual feeding at 2.4 GHz and 5.8 GHz can meet WLAN (Wireless Local Area Network) application.Antenna fabrication use PCB FR4 double layer with thickness 1.6 mm and dielectric constant value 4.4. The length of patch antenna according to calculation 28.63 mm, but to get needed parameter length of patch should be optimized to 53 mm. After examination, this antenna has VSWR 1.212 at 2.42 GHz and 1.502 at 5.8 GHz, RL -13.94 dB at 2.42 GHz and -20.357 dB at 5.8 GHz, gain of antenna 6.16 dB at 2.42 GHz and 6.91 dB at 5.8 GHz, the radiation pattern is bidirectional. Keywords : microstrip antenna, wireless LAN, dual polarization, single feeding technique


2013 ◽  
Vol 278-280 ◽  
pp. 582-585
Author(s):  
Rong Gao ◽  
Qi Sheng Wu ◽  
Lan Bai

A tms320dm642 and wireless fidelity based fire monitoring robot is designed. Flame features, both static and dynamic detecting algorithm, combine with long wave infrared (LWIR) is equipped to achieve the goal of monitoring fire. When the suspected fire event happens, Fire warning message will be sent to remote terminal through the wireless LAN automatically. Infrared image of the fire can be transmitted through the wireless network under the control of remote terminal. As LWIR camera can even look through the dense smoke of fire, fire source will be located accurately, rescuing and fire fighting work will carry on better and with less injury.


2015 ◽  
Vol 2015 ◽  
pp. 1-11
Author(s):  
Chang-Seop Park ◽  
Hyun-Sun Kang ◽  
Jaijin Jung

A new key management and security scheme is proposed to integrate Layer Two (L2) and Layer Three (L3) keys for secure and fast Mobile IPv6 handover over IEEE 802.11 Wireless Local Area Network (WLAN). Unlike the original IEEE 802.11-based Mobile IPv6 Fast Handover (FMIPv6) that requires time-consuming IEEE 802.1x-based Extensible Authentication Protocol (EAP) authentication on each L3 handover, the newly proposed key management and security scheme requires only one 802.1x-EAP regardless of how many L3 handovers occur. Therefore, the proposed scheme reduces the handover latency that results from a lengthy 802.1x-based EAP. The proposed key management and security scheme is extensively analyzed in terms of security and performance, and the proposed security scheme is shown to be more secure than those that were previously proposed.


2014 ◽  
Vol 721 ◽  
pp. 728-731
Author(s):  
Da Wei Dong ◽  
Xiao Guo Liu ◽  
Tian Jing

To reduce the number of inter-disturb access points and the interference among access points in same channel, with research on interference issus and channel assignment algorithms of wireless local area network, a scheme suitable for centralized wireless local area network was proposed aiming to minimize the total interference among access points, which comprehensively considerate the number of neighbor and the received power. And then the algorithm with cases was simulated and analyzed, the result of NS2 simulation indicated that the algorithm was simple, effective and feasible, which could realize dynamic adjustment to the wireless LAN RF channel and had a better load balance effect among non-overlapping channels.


2012 ◽  
Vol 16 (6) ◽  
pp. 39-45
Author(s):  
A.V. Lazebnyi ◽  
Volodymyr Semenovych Lazebnyi

The concept of a virtual contention window for assessment of temporal and probabilistic characteristics of the processes occurring in the wireless LAN 802.11 is considered. The relations for determining the transmission time delay of the data package, the uneven of transmission time, throughput of wireless channel, the probability of packet loss for networks with saturated load are proposed in this paper.


T-Comm ◽  
2021 ◽  
Vol 15 (7) ◽  
pp. 28-33
Author(s):  
Albina Y. Sharifullina ◽  
◽  
Roman R. Galyamov ◽  
Rimma S. Zaripova ◽  
◽  
...  

This article discusses the stages of development, characteristics of a wireless local area network Wi-Fi, options for its topology and equipment used. Currently, there are such different types of wireless networks as Wireless Wide Area Network, Wireless Metropolitan Area Networks (Wireless Neighborhood Area Network), Wireless Local Area Network, Wireless Personal Area Network. Each of the listed wireless networks has its own specific range and application. Wireless LAN Wi-Fi refers to the Wireless Local Area Network. The first wireless LAN standard, Wi-Fi, was approved in 1997. From the moment of their appearance to the present day, the following standards of this network have appeared: 802.11a, 802.11b, 802.11g, 802.11n, 802.11ac, 802.11ad, 802.11ax. For each standard, the speeds and frequency ranges at which the data transmission was carried out are indicated, and the technologies on which they are built are described. Wireless LAN Wi-Fi has three topologies: 1) Ad-Hoc (point-to-point) or Independent Basic Service Set; 2) Basic Service Set (“client / server”) and 3) Extended Service Set (“extended service areas”). To build a Wi-Fi network, network adapters, access points, routers, ADSL modems, Wi-Fi phones, Wi-Fi antennas, Wi-Fi repeaters are used. Wi-Fi adapters are used by devices that do not have a built-in Wi-Fi module. Wi-Fi access points are designed for organizing wireless access within a local network. Wi-Fi routers are designed to route traffic on a computer network. ADSL modems are used to access the Internet over a telephone line. Wi-Fi repeaters are used to expand the coverage of a wireless network using already installed equipment. Wi-Fi phones are wireless IP phones. Wi-Fi antennas are used to extend the range of a wireless network.


2011 ◽  
Vol 8 (1) ◽  
pp. 1-26 ◽  
Author(s):  
Marius Roşu ◽  
George Drăgoi

In order to be competitive enterprises continuously implement ICT strategies & architectures to improve manufacture, research, products quality, sales, services and costs control. All large enterprises have a local area network, a virtual private network, an Intranet and Internet, servers and workstations for operations, administration and management working together for the same objective: profits. The virtual enterprise and the virtual team?s concepts are discussed in this article. This work analyzes the network architecture for geographically dispersed enterprises (seen as virtual enterprises) as support for virtual project development by virtual teams work. In addition, the paper presents an enterprise networks monitoring solution using open source software (OSS).


2015 ◽  
Vol 12 (1) ◽  
Author(s):  
Irawan Afrianto ◽  
Eko Budi Setiawan

Jaringan komputer dapat dikatakan sebagai sebuah sistem yang terdiri dari berbagai komputer beserta resource-nya yang didesain agar dapat menggunakan sumber daya yang ada, sehingga dapat mengakses informasi yang diperlukan. Informasi tersebut dapat diakses melalui komputer yang lain dengan konsep computer networking, baik itu Local Area Network, Metropolitan Area Network, Wide Area Network ataupun juga internet. Untuk mengamankan suatu koneksi pada jaringan dapat menggunakan jaringan yang bersifat virtual yang dikenal dengan istilah Virtual Private Network (VPN).Virtual Private Network (VPN) adalah sebuah teknologi komunikasi yang memungkinkan untuk dapat terkoneksi ke jaringan publik dan menggunakannya untuk bergabung dengan jaringan lokal. Dengan cara tersebut maka akan didapatkan hak dan pengaturan yang sama seperti halnya berada didalam kantor atau network itu sendiri, walaupun sebenarnya menggunakan jaringan milik publik.UNIKOM sebagai salah satu perguruan tinggi yang dalam melakukan kegiatan operasionalnya terdiri dari beberapa stakeholder yang saling terhubung dalam jaringan komputer, perlu menerapkan konsep VPN untuk mengamankan informasi yang dimiliki pada suatu jaringan, ataupun untuk memudahkan dalam mengakses jaringan lokal yang ada di UNIKOM walaupun dalam mengaksesnya menggunakan jaringan yang bersifat public (internet).Hasil dari penelitian ini adalah berupa suatu rekomendasi dasar yang dapat digunakan oleh UNIKOM untuk menerapkan konsep Virtual Private Network (VPN) dalam pengembangan jaringan komputer yang dimiliki sehingga dalam pengaksesan informasi dapat berlangsung lebih aman dan efektif.


Sign in / Sign up

Export Citation Format

Share Document