Main Article Content
Abstract
Penggunaan jaringan nirkabel berbasis 802.11 telah menjadi salah satu layanan jaringan yang paling banyak digunakan, tetapi hal ini juga meningkatkan kerentanan keamanan. Meningkatnya akses tidak sah ke jaringan nirkabel sering kali dikaitkan dengan ketersediaan perangkat lunak dan alat yang dapat diunduh secara daring untuk mendekripsi enkripsi keamanan nirkabel. Untuk mengurangi akses tidak sah, sistem keamanan berlapis dapat diterapkan dengan menggabungkan fitur-fitur seperti Hotspot Login dan MAC address filtering. Sistem berlapis ini dapat memblokir pengguna yang mencoba mengakses jaringan tanpa otorisasi dengan memverifikasi hak akses dua kali: dengan mencocokkan nama pengguna dan kata sandi yang dimasukkan selama Hotspot Login dengan alamat MAC perangkat klien. Temuan penelitian menunjukkan bahwa klien yang menggunakan perangkat yang berbeda, bahkan dengan nama pengguna dan kata sandi yang sama, tidak dapat mengakses jaringan. Oleh karena itu, setiap klien yang ingin terhubung ke internet harus menggunakan perangkat dengan alamat MAC terdaftar dan hak akses pengguna dan kata sandi yang sesuai seperti yang ditentukan dalam Hotspot Login.
Keywords
Article Details
References
- [1] E. Au, L. Wilhelmsson, T. Baykas, and J. Kim, “Guest Editorial: Recent and Future Evolution of Wi-Fi,” IEEE Commun. Stand. Mag., vol. 6, no. 2, pp. 8–11, 2022, doi: 10.1109/MCOMSTD.2022.9855241.
- [2] K. Pahlavan and P. Krishnamurthy, “Evolution and Impact of Wi-Fi Technology and Applications: A Historical Perspective,” Int. J. Wirel. Inf. Networks, vol. 28, no. 1, pp. 3–19, 2021, doi: 10.1007/s10776-020-00501-8.
- [3] I. Prlić et al., “Wi-Fi technology and human health impact: A brief review of current knowledge,” Arh. Hig. Rada Toksikol., vol. 73, no. 2, pp. 94–106, 2022, doi: 10.2478/aiht-2022-73-3402.
- [4] J. S. Runtao Ren, “A Security-Enhanced and Privacy-Preserving Certificateless Aggregate Signcryption Scheme-Based Artificial Neural Network in Wireless Medical Sensor Network”. in in IEEE Sensors Journal, vol. 23, no. 7, pp. 7440-7450, 1 April1, 2023, doi: 10.1109/JSEN.2023.3247581
- [5] I. P. Danilo Orlando, Stefania Bartoletti, “Innovative Attack Detection Solutions for Wireless Networks With Application to Location Security”. in IEEE Transactions on Wireless Communications, vol. 22, no. 1, pp. 205-219, Jan. 2023, doi: 10.1109/TWC.2022.3192225
- [6] Z. L. Haijun Tan, “Detection of Jamming Attacks for the Physical-Layer Authentication”. in IEEE Transactions on Wireless Communications, vol. 22, no. 12, pp. 9579-9594, Dec. 2023, doi: 10.1109/TWC.2023.3272337
- [7] S. W. Yang Cao, “Joint User Grouping and Power Optimization for Secure mmWave-NOMA Systems”. in IEEE Transactions on Wireless Communications, vol. 21, no. 5, pp. 3307-3320, May 2022, doi: 10.1109/TWC.2021.3120268
- [8] V. Shukla, A. Chaturvedi, and N. Srivastava, “Nanotechnology and cryptographic protocols: Issues and possible solutions,” Nanomater. Energy, vol. 8, no. 1, pp. 24–26, 2019, doi: 10.1680/jnaen.18.00006.
- [9] A. K. Yadav, M. Misra, P. K. Pandey, K. Kaur, S. Garg, and M. Liyanage, “LEMAP: A Lightweight EAP based Mutual Authentication Protocol for IEEE 802.11 WLAN,” IEEE Int. Conf. Commun., vol. 2022-May, pp. 692–697, 2022, doi: 10.1109/ICC45855.2022.9839094.
- [10] Y. Kihira, K. Yamamoto, A. Taya, T. Nishio, Y. Koda, and K. Yano, “Interference-free AP identification and shared information reduction for tabular Q-learning-based WLAN coordinated spatial reuse,” IEICE Commun. Express, vol. 11, no. 7, pp. 392–397, 2022, doi: 10.1587/comex.2022xbl0051.
- [11] J. K. Dileep Kumar, “Blockage-Aware Reliable mmWave Access via Coordinated Multi-Point Connectivity”.
- [12] B. X. Xiaoying Liu, “Throughput Maximization of Wireless-Powered Communication Network With Mobile Access Points”.
- [13] st Isaac Chin Eian, nd Lim Ka Yong, rd Majesty Yeap Xiao Li, and th Yeo Hui Qi, “Wireless Networks: Active and Passive Attack Vulnerabilities and Privacy Challenges,” Preprints, no. October, 2020, doi: 10.20944/preprints202010.0018.v1.
- [14] B. Rong, “BOOK REVIEWS Security in Wireless Communication,” IEEE Wirel. Commun., vol. 30, no. February, pp. 10–11, 2023.
- [15] T. Asamov, E. Yamangil, E. Boros, P. B. Kantor, and F. Roberts, “Optimal Layered Defense For Site Protection,” Springer Optim. Its Appl., vol. 202, pp. 1–21, 2023, doi: 10.1007/978-3-031-31654-8_1.
- [16] S. Suhadin, “Evaluation Of Network Access Restrictions Using Mac Address Filtering On Microtik To Improve Network Security,” J. World Sci., vol. 1, no. 3, pp. 112–120, 2022, doi: 10.58344/jws.v1i3.12.
- [17] I. Didmanidze, Z. Beridze, and V. Zaslavski, “Analysis of wireless network security systems problems and those solutions,” Model. Control Inf. Technol., no. 4, pp. 139–140, 2020, doi: 10.31713/mcit.2020.31.