Indra Gunawan, Andrey Ferriyan


Jaringan nirkabel pada Yayasan Pendidikan Ibnu Sina Batam merupakan fasilitas yang digunakan untuk siswa, dosen dan karyawan. Aktivitas sehari-hari mengenai internet menggunakan fasilitas ini. Terdapat sembilan hotspot nirkabel yang tersebar di seluruh area kampus. Staff menggunakan wifi untuk mengirimkan informasi kemahasiswaan dan setiap kegiatan tentang perkuliahan untuk Kementerian Riset Republik Indonesia dan Sistem Informasi Akademik yang berada diluar kampus. Setiap data yang kirim ke tempat ini harus bersifat rahasia. Penelitian ini menguji keamanan dan analisis dalam sembilan hotspot nirkabel menggunakan pendekatan whitebox dan blackbox untuk menemukan lubang keamanan. Penelitian kami menunjukkan bahwa beberapa titik hotspot nirkabel rentan. Kami berharap penelitian ini akan membantu di masa depan untuk menciptakan Standard Operating Procedure (SOP) untuk mencegah pelanggaran data.

Full Text:



] D. P. Agrawal and Q.-A. Zeng, Introduction to Wireless and Mobile Systems - Dharma P. Agrawal, Qing-An Zeng - Google Books, 4th ed. Boston: Cengage Learning, 2014.

U. Kumar and S. Gambhir, “A Literature Review of Security Threats to Wireless Networks,” Int. J. Futur. Gener. Commun. Netw., vol. 7, no. 4, pp. 25–34, Aug. 2014.

“KM strategy taxonomy.pdf.” .

B. Shen, W. Yi-jun, and X. Zhi, “Research on Security of WPA/WPA2 Protocol-- 《Information Security and Communications Privacy》2012年01期,” Inf. Secur. Commun. Priv., vol. 1, no. 1, p. 139, 2012.

L. Yong-leia, J. Zhi-gangb, C. Zheb, and L. Jing-weia, “Design and Implementation of High-speed Brute Forcer for wpa/wpa2-psk--《Computer Engineering》2011年10期,” Comput. Eng., no. 10, 2011.

V. Kumkar, A. Tiwari, P. Tiwari, A. Gupta, and S. Shrawne, “Vulnerabilities of Wireless Security protocols (WEP and WPA2),” Int. J. Adv. Res. Comput. Eng. Technol., vol. 1, no. 2, pp. 2278–1323, 2012.

A. Tsitroulis, D. Lampoudis, and E. Tsekleves, “Exposing WPA2 security protocol vulnerabilities,” Int. J. Inf. Comput. Secur., vol. 6, no. 1, p. 93, 2014.

Y. Liu, Z. Jin, and Y. Wang, “Survey on Security Scheme and Attacking Methods of WPA/WPA2,” in 2010 International Conference on Computational Intelligence and Software Engineering, 2010, pp. 1–4.

A. Tang, P. Avgeriou, A. Jansen, R. Capilla, and M. Ali Babar, “A comparative study of architecture knowledge management tools,” J. Syst. Softw., vol. 83, no. 3, pp. 352–370, Mar. 2010.

W. Zhang, H. Lu, B. Xu, and H. Yang, “Web Phishing Detection Based on Page Spatial Layout Similarity,” Informatica, vol. 37, pp. 231–244, 2013.

Z. Wu, M. Cai, S. Liang, and J. Zhang, “An Approach for Prevention of MitM Attack Based on Rogue AP in Wireless Network,” Sensors & Transducers, vol. 183, no. 12, pp. 162–171, 2014.

A. Sanatinia, S. Narain, and G. Noubir, “Wireless Spreading of WiFi APs Infections using WPS Flaws: an Epidemiological and Experimental Study,” in IEEE Conference on Communications and Network Security, 2013, pp. 430–437.

H. A. Noman, S. M. Abdullah, and H. I. Mohammed, “An Automated Approach to Detect Deauthentication and Disassociation Dos Attacks on Wireless 802 . 11 Networks,” Researchgate, 2015. .

Q. A. Chen, Z. Qian, Y. J. Jia, Y. Shao, and Z. M. Mao, “Static Detection of Packet Injection Vulnerabilities,” in Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security - CCS ’15, 2015, pp. 388–400.

S. Fahmy, A. Nasir, and N. Shamsuddin, “Wireless network attack: Raising the awareness of Kampung WiFi residents,” 2012 Int. Conf. Comput. Inf. Sci. ICCIS 2012 - A Conf. World Eng. Sci. Technol. Congr. ESTCON 2012 - Conf. Proc., vol. 2, pp. 736–740, 2012.

A. Chopra, “Man In the Middle (MITM) DNS Spoofing Explained,” 2014.

G. Kaur and J. Malhotra, “An Integrated Approach to ARP Poisoning and its Mitigation using Empirical Paradigm,” Internatio nal J. Futur. Gener. Commun. Netw., vol. 8, no. 5, pp. 51– 60, 2015.

H.-J. Jo and J. Won Yoon, “Poster: Statistical coding scheme for the protection of cryptographic systems against brute-force attack,” in Proceedings of the 35th IEEE Symposium on Security and Privacy, 2015.

S. Aked, C. Bolan, M. Brand, S. Aked, C. Bolan, and M. Brand, “A Proposed Method for Examining Wireless Device Vulnerability,” pp. 691–694, 2012.

D.-Y. Chung, S.-J. Lee, and S.-H. Kim, “An Implementation and Experiment of Wireless Attack Emulator on Windows Environment,” in 2013 International Conference on IT Convergence and Security (ICITCS), 2013, pp. 1–4.

Y. L. Zhang and G. S. Xia, “The SSL MIMT Attack with DNS Spoofing,” Appl. Mech. Mater., vol. 385–386, pp. 1647–1650, Aug. 2013.

A. R. Dennis and J. S. Valacich, “Communications of the Association for Information Systems Conducting Experimental Research in Information Systems,” Commun. Assoc. Inf. Syst., vol. 7, 2001.

D. Goehring, D. Martelly, V.-T. Nguyen, and E. Taratoris, “Hacking Wireless,” 2014.

S. Kwon and D. Park, “Hacking and Security of Encrypted Access Points in Wireless Network,” J. Inf. Commun. Converg. Eng., vol. 10, no. 2, pp. 156–161, 2012.

M. Waliullah, A. B. M. Moniruzzaman, and M. S. Rahman, “An Experimental Study Analysis of Security Attacks at IEEE 802.11 Wireless Local Area Network,” Int. J. Futur. Gener. Commun. Netw., vol. 8, no. 1, pp. 9–18, 2015.

A. Cassola, W. Robertson, E. Kirda, and G. Noubir, “A Practical, Targeted, and Stealthy Attack Against WPA Enterprise Authentication,” in NDSS, 2013.

S. Hong, M. Oh, and S. Lee, “Design and implementation of an efficient defense mechanism against ARP spoofing attacks using AES and RSA,” Math. Comput. Model., vol. 8, no. 1, pp. 254–260, 2013.


  • There are currently no refbacks.