Wireless Local Area Network Security through Protocol Wireless Protected Access

Authors

  • Sondy Kumajas Department of Information Technology and Communication, Universitas Negeri Manado, Indonesia
  • Julius Sasukul Department of Information Technology and Communication, Universitas Negeri Manado, Indonesia
  • Alexander Siwi Department of Information Technology and Communication, Universitas Negeri Manado, Indonesia
  • Hellena Saruan Department of Information Technology and Communication, Universitas Negeri Manado, Indonesia

DOI:

https://doi.org/10.62711/ijite.v1i2.41

Keywords:

security, Wireless Protected Access, Web Proxy, Virtual Private Network. LAN

Abstract

This study discusses the security analysis of Wireless Local Area Network (Wireless LAN) in the Community against external attacks on the Wireless Protected Access (WPA), Web Proxy, and Virtual Private Network (VPN) protocols, used to attack LAN. Three types of software are used as attackers, namely, Network Stumbler, Aircrack and Wireshark attackers. The software is used on the laptop at a distance of 5m to 25m from the Wireless LAN access point. From the experimental results, it can be seen that the fastest response time by the WPA Protocol was given by the Network Stumbler attacker, followed by Aircrack and Wireshark.

Downloads

Published

2022-03-24

How to Cite

Kumajas, S. ., Sasukul, J. ., Siwi, A. ., & Saruan, H. . (2022). Wireless Local Area Network Security through Protocol Wireless Protected Access . International Journal of Information Technology and Education, 1(2), 60–71. https://doi.org/10.62711/ijite.v1i2.41

Issue

Section

Articles