Wireless Penetration Testing Method To Analyze WPA2-PSK System Security And Captive Portal

Erfan Wahyudi, Muhammad Masjun Efendi

Abstract

One of the major changes in the telecommunications sector is the use of wireless technology. But many problems that must be faced when implementing this wireless network, one of which is a security problem. Many people are still questioning about wireless security, and many others believe that wireless security systems using WPA2-PSK are more secure than other wireless security systems. However, based on the results of literature studies conducted, a wireless security system that really can provide more secure security is to use the system security Remote Authentication Dial-In User Servers (RADIUS) server. While at present, many parties still use WPA2-PSK as their wireless security system to avoid the possibility of unauthorized use of internet access by unauthorized people. This study aims to analyze the comparison of the two wireless network security systems above. The test was performed using wireless penetration testing method, and the result stated that 80% of Security Captive Portal system is more secure than WPA2-PSK.

Full Text:

PDF

References

William Stallings. Network Security Essentials: Application and Standard Fourt Edition. Prentice Hall. 2011.

Habibi Lashkari, Arash & Danesh, Mir & Samadi, Behrang. (2009). A survey on wireless security protocols (WEP, WPA and WPA2/802.11i). 10.1109/ICCSIT.2009.5234856.

Tariq, Muhammad. (2011). Wireless Security and Threats.

Choi, Jihyuk & Chang, Sang-Yoon & Ko, Diko & Hu, Yih-Chun. (2011). Secure MAC-Layer Protocol for Captive Portals in Wireless Hotspots. 1-5. 10.1109/icc.2011.5963508.

Xiao, Yang & Chen, Hui & Yang, Shuhui & Lin, Yi-Bing & Du, Ding-Zhu. (2009). Wireless Network Security. EURASIP J. Wireless Comm. and Networking. 2009. 10.1155/2009/532434.

Boukerche, Azzedine. (2002). Security and Fraud Detection in Mobile and Wireless Networks. 309 - 323. 10.1002/0471224561.ch14.

Kumar, Umesh & Gambhir, Sapna. (2014). A Literature Review of Security Threats to Wireless Networks. International Journal of Future Generation Communication and Networking. 7. 25-34. 10.14257/ijfgcn.2014.7.4.03.

Farooq Ahmed, Zain ul Abedin Butt, Ahmed Waqas, “Educational Roaming”. International Journal of Computer Science and Information Security (IJCSIS), Vol. 15, No.1, January 2017

Iii, Guillermo & Phuong, Le & Kilaru, Aditya. (2005). Wireless Security Tools.. 562-568.

Sen, Jaydip. (2009). A Survey on Wireless Sensor Network Security. International Journal of Communication Networks and Information Security. 1. 59 – 82.

Goeritno, Arief & Aprianto, Yuggo & Basri, Hasan & , Ritzkal. (2017). PENERAPAN INTEGRASI CAPTIVE PORTAL DENGAN SINGLE SIGN ON (SSO) PADA LAYANAN HOTSPOT DAN SISTEM INFORMASI AKADEMIK.

Refbacks

  • There are currently no refbacks.