Peningkatan Keamanan Wireless Pada Jaringan Komputer di Universitas Amikom Menggunakan Protokol IEEE802.1X

Abstract views: 1553 , pdf downloads: 1002

Ichsan Wiratama
Putu Sugiartawan

Abstract

The access point configuration used for wireless connections in Amikom is manually configured one by one. Each access point is configured using several SSIDs based on the department that will connect to the access point. The use of multiple SSIDs in one access point turned out to have a bad effect on network performance, from the test results, for access points configured with more than four SSIDs, the connection was very slow. The security standard used for connection from the user to the access point is WPA Personal, where WPA Personal can be said to be very weak because for each SSID it will use the same user and password for all users, this is often the cause of access leaks.


To improve network security and make it easier for the author to do maintenance on the network, the author tries to use the IEEE 802.1X protocol that is connected with RADIUS and access point controllers so that the configuration and maintenance of wireless networks can be centralized, user administration and passwords can also be centralized server radius and also a better level of security using WPA Enterprise security in the IEEE 802.1X protocol.

Downloads

Download data is not yet available.
How to Cite
Wiratama, I., & Sugiartawan, P. (2019). Peningkatan Keamanan Wireless Pada Jaringan Komputer di Universitas Amikom Menggunakan Protokol IEEE802.1X. Jurnal Sistem Informasi Dan Komputer Terapan Indonesia (JSIKTI), 2(1), 21-30. https://doi.org/10.33173/jsikti.50

References

[1] W. Stallings and L. “Brown, Computer Security: Principles and Practice,” 3rded, London: Pearson, 2014.
[2] D. Gollmann, “Computer Security,” 3rded, New Jersey: Wiley, 2011.
[3] M. Goodrich and R. Tamassia, “Introduction to Computer Security,” 1sted, London: Pearson, 2010.
[4] W. Stallings, “Cryptography and Network Security: Principles and Practice,” 5thed, London: Pearson, 2010.
[5] R.J. Boyle and R.R. Panko, “Corporate Computer Security,” 3rded, New Jersey: Prentice Hall, 2012.
[6] R.R. Panko, “Corporate Computer and Network Security,” 2nded, New Jersey: Prentice Hall, 2009.
[7] P. Riska, P. Sugiartawan, and I. Wiratama, “Sistem Keamanan Jaringan Komputer dan Data Dengan Menggunakan Metode Port Knocking”, jsikti, vol. 1, no. 2, pp. 53-64, Dec. 2018.
[8] Saltzer and Kaashoek, Principles of Computer System Design (2009, Morgan Kaufmann). Free online chapters include (pdf) Ch.11: Information Security.
[9] H. Mukhtar, “Teknik Open Source,” Sleman: DEEPUBLISH, 2019.
[10] A. Genco and S.Sorce, “Pervasive Systems and Ubiquitous Computing,” Southampton: WIT Press, 2010.
[11] D. Gibson, “MCITP Guide to Microsoft Windows Server 2008 Enterprise Administration,” Boston: Cengage Learning, 2011. Zam, Efvy. 2015. “step by step Wireless hacking”. Jakarta : Elex Media Komputindo.