Wireless Local Area Network Security through Protocol Wireless Protected Access
Sondy Kumajas,Julius Sasukul,Alexander Siwi,Hellena Saruan
DOI: https://doi.org/10.62711/ijite.v1i2.41
2022-03-24
Abstract:This study discusses the security analysis of Wireless Local Area Network (Wireless LAN) in the Community against external attacks on the Wireless Protected Access (WPA), Web Proxy, and Virtual Private Network (VPN) protocols, used to attack LAN. Three types of software are used as attackers, namely, Network Stumbler, Aircrack and Wireshark attackers. The software is used on the laptop at a distance of 5m to 25m from the Wireless LAN access point. From the experimental results, it can be seen that the fastest response time by the WPA Protocol was given by the Network Stumbler attacker, followed by Aircrack and Wireshark.