We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Optimation Wireless Security IEEE 802.1X using the Extensible Authentication Protocol-Protected Extensible Authentication Protocol (EAP-PEAP)

by Taufik Nur Hidayat, Imam Riadi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 174 - Number 11
Year of Publication: 2021
Authors: Taufik Nur Hidayat, Imam Riadi
10.5120/ijca2021920988

Taufik Nur Hidayat, Imam Riadi . Optimation Wireless Security IEEE 802.1X using the Extensible Authentication Protocol-Protected Extensible Authentication Protocol (EAP-PEAP). International Journal of Computer Applications. 174, 11 ( Jan 2021), 25-30. DOI=10.5120/ijca2021920988

@article{ 10.5120/ijca2021920988,
author = { Taufik Nur Hidayat, Imam Riadi },
title = { Optimation Wireless Security IEEE 802.1X using the Extensible Authentication Protocol-Protected Extensible Authentication Protocol (EAP-PEAP) },
journal = { International Journal of Computer Applications },
issue_date = { Jan 2021 },
volume = { 174 },
number = { 11 },
month = { Jan },
year = { 2021 },
issn = { 0975-8887 },
pages = { 25-30 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume174/number11/31722-2021920988/ },
doi = { 10.5120/ijca2021920988 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:21:49.427044+05:30
%A Taufik Nur Hidayat
%A Imam Riadi
%T Optimation Wireless Security IEEE 802.1X using the Extensible Authentication Protocol-Protected Extensible Authentication Protocol (EAP-PEAP)
%J International Journal of Computer Applications
%@ 0975-8887
%V 174
%N 11
%P 25-30
%D 2021
%I Foundation of Computer Science (FCS), NY, USA
Abstract

One of the main changes in the field of telecommunications is the use of wireless technology. Wireless technology is also implemented in the Ahmad Dahlan University Campus 3 Research Laboratory environment, better known as wireless LAN (WLAN). Each user within the range of campus research laboratory area Ahmad Dahlan University radiates an access point (AP). Another negative impact is that communication that occurs will be easily intercepted between the security of campus network users. The stages performed in this study use the PEAP EAP method to provide security to safer wireless. This security method aims to protect client authentication. PEAP only requires a digital certificate on the authentication side of the server, while the digital certificate on the wireless side of the client will be replaced by using a combination of username and password. Thus, the conclusion of the security implementation using the Freradius Authentication tool by using the PEAP EAP protocol can improve security on the wirelles. Authentication aims to verify the identity of the client so that only registered/valid users can connect to the network and do not need a long time when authentication.

References
  1. Supriyanto, A. (2006). Technical Overview of Wireless Device Technology and Security Standards. XI (2), 75– 83.
  2. Supriyanto, A. (2006). Technical Overview of Wireless Device Technology and Security Standards. XI (2), 75– 83.
  3. Citra Najih Nurmawanti1, DS (2013). Wireless Network Security Using PEAP Ms CHAP V2. Journal of Information Technology, 1 (1), 214-219.
  4. Yosua John Muskitta1, Banu Wirawan Yohanes2, Hartanto Kusuma Wardana3. 2016. " Implementation of Protected Extensible Authentication Protocol (PEAP) use Remote Access Dial In User Service (RADIUS)." Techné Jurnal Ilmiah Elektroteknika 91-99.
  5. Ichsan Wiratama*1, Putu Sugiartawan2. 2019. " Improved Wireless Security on Computer Networks at Amikom University Using IEEE802.1X Protocol." Jurnal Sistem Informasi dan Komputer Terapan Indonesia (JSIKTI) 21-30.
  6. Dkk., Muttaqin. 2016. " Hotspot Authentication System Using LDAP and Radius on Wireless Internet Network Computer System Engineering Program."
  7. (Aristiara & Budihartanti, 2014) Analysis of Wireless LAN (WLAN) Network Security at PT. PLN (Persero) Region P2B Area Sorong Sonny Rumalutur. (nd). 19 (100), 48–60.
  8. Aristiara, D., & Budihartanti, C. (2014). Network User Authentication Using Radius Windows 2008 Server At Pt Pertamina. Journal of Techno Nusa Mandiri, XI (2), 118–128.
  9. Krisnawan, A. (2015). Room Security System Design Using the Raspberry Pi. Faculty of Electrical Engineering, Telkom University, 2 (2), 3743–3754.
  10. Muskitta, YJ, Yohanes, BW, & Wardana, HK (2016). Implement Protected Extensible Authentication Protocol (PEAP) using Remote Access Dial In User Service (RADIUS). Techné: Scientific Journal of Electrotechnics, 15(02), 91–99.
  11. Purwanto, TD, & Cholil, W. (2013). Performance Analysis of Wireless Radius Server on Access Point 802 Devices. 11g (Case Study at Bina Darma University). 2013 (November), 371–376. ISACA. 2012a. Trust And Partnership A Business Framework for the Governance and Management of Enterprise IT.
  12. Riadi, I., Studies, P., Information, S., & Dahlan, UA (2011). Network Security Optimization Using Mikrotik-Based Application Filtering Introduction Theory Basis. 1 (1), 71–80. ISACA. 2012c. Isaca COBIT 5 Implementation.
  13. Supriyono, A. (2013). Hotspot System Design Usin Captive Portal. Journal of Bachelor of Informatics Engineering,1(1),172–180.
  14. Primary, Rifky Wahyu. 2019. "Implementation Of User Authentication System Using Radius Server And Active Directory On Wireless Network In Pt. Kudo Teknologi Indonesia." Jakarta State Polytechnic..
  15. Purnama, Rachmat Adi. 2019. "Wireless Network Security Optimization Using MAC Address Firewall Filtering." Indonesian Journal on Networking and Security 43-47.
  16. Denda Aristiara¹, Cahyani Budihartanti2. 2014. "Network User Authentication Using Windows 2008 Radius Server At Pt Pertamina." Journal of Techno Nusa Mandiri 118-128.
  17. Baihaqi1, Yeni Yanti2, Zulfan3. 2018. "Implementation of WPA2-PSK Security System." Foyer Engineering 248-254.
  18. Internet Draft. Protected EAP Protocol (PEAP)Version 2 [Online]: -10 [25 Agustus 2010].
  19. Dirk van der Walt, “FreeRADIUS Beginner's Guide Manage your network resources with FreeRADIUS”, PACKT publishing, Birmingham –Mumbai, 2011.
  20. Teuku yuliar Arif, Syahrial, and Zulkiram, "Study Protocol Authentikasionon internet service service (ISP)". Journal of Electrical Engineering: Volume 6 No. 1 / Agustu 2011.
Index Terms

Computer Science
Information Sciences

Keywords

(EAP) (PEAP) Protocol Freradius IEEE 802.1X.