Mohon tunggu...
Ramadhan Ryan
Ramadhan Ryan Mohon Tunggu... Pelajar Sekolah - Pelajar

Seorang pelajar di salah satu SMK di Kabupaten Klaten, Jawa Tengah

Selanjutnya

Tutup

Ilmu Alam & Tekno

The Example of Authentic Text

10 Mei 2023   10:40 Diperbarui: 10 Mei 2023   10:52 94
+
Laporkan Konten
Laporkan Akun
Kompasiana adalah platform blog. Konten ini menjadi tanggung jawab bloger dan tidak mewakili pandangan redaksi Kompas.
Lihat foto
Ilmu Alam dan Teknologi. Sumber ilustrasi: PEXELS/Anthony

Handling Security Problems on Wireless Network with WPA (Wi-Fi Protected Access) Encryption Technology at SMK Negeri 1 Klaten

By : Ramadhan Ryan, Muhammad Tri Naufal, Shafa Salsabila, Fatimah Kusuma

In today's digital era, wireless networks have become an essential requirement for most people. Wireless networks can provide wireless internet access, allowing users to connect to the internet without having to sit near a modem or router. Wireless networks have several characteristics, such as being able to handle mobile users, using media without cables, being easy to install and cheap in terms of cost when compared to wired networks, having security methods, being easy to use, supporting user mobility, and having the ability to change as needed. However, wireless networks also have several problems, one of these problems is security, which needs to be addressed.

It is important for users who need an easy and secure internet connection to know the solution that must be found. Therefore, researchers in this article want to provide information about how to overcome the security system on wireless using WPA encryption.

According to Priyambodo, wireless is a standard for wireless networks, or what is known as "wireless networking," with the function of allowing the components of the internet network to be connected or to connect to the internet easily and without hassle.

According to the article ISU TECHNOLOGY STT MANDALA VOL.7 NO.2 2014, there are several problems with wireless security systems, namely:

Eavesdropping on communication lines (man-in-the-middle attack) can be done more easily because there is no need to find a cable line to make a connection. Systems that do not use encryption and authentication security or use encryption that is easily broken (cryptanalysis) will be easily captured.

According to Professor William Stallings, a network security expert, using strong encryption protocols such as WPA2 or WPA3 to secure wireless networks To solve security problems on wireless networks, users can use WPA (Wi-Fi Protected Access) encryption technology. This technology will encrypt data transmitted over a wireless network so that it cannot be accessed by unauthorized parties. In addition, users can also set the router to only accept connections from authorized devices.

The writers have provided information on how to overcome security problems on wireless networks using WPA encryption technology, specifically WPA/WPA2 with Pre-Shared Key. They have also explained what WPA is, its purpose, and how it can protect data from unwanted attacks. Additionally, they have highlighted the problems with wireless security systems, such as eavesdropping, and the importance of addressing these issues for a safe and secure wireless network. In this article, the writer will give information deeply about Handling security problems on wireless with WPA (Wi-Fi Protected Access) encryption technology.

What is WPA?

WPA (Wi-Fi Protected Access) technology is a wireless network security standard designed to replace the previous security standard WEP (Wired Equivalent Privacy). WPA uses Temporal Key Integrity Protocol (TKIP) encryption to secure data sent over wireless networks. The main purpose of WPA is to improve the security of wireless networks and protect data from unwanted attacks. In use, WPA uses encryption keys that are stronger and more difficult for unauthorized people to break through. WPA also has an authentication feature, which ensures that only authorized devices can connect to the wireless network. WPA also has a more secure version called WPA2. In its development, WPA2 became the most widely used security standard on wireless networks today. By using WPA technology, wireless network users can feel more secure and protected from potentially damaging attacks.

WPA/WPA2 with Pre-Shared Key
This method is currently widely used. The security support of WPA/WPA2 encryption and easy setup are the main factors.

For the settings, select mode = dynamic keys and authentication types = WPA-PSK and WPA2-PSK. Then also specify the phrase that will be used as a password to be able to connect to the device.

Specify the encryption method to be used. If enabled on an AP (access point), the device will notify the client that encryption is supported. So that in order to connect, the client must support one of the authentication types applied to the AP.

Steps to use WPA/WPA2 with a pre-shared key :

1. Open Winbox.

2. Then enter the wireless menu.

3. Security Profile.

4. Click (+) to add.

5. Change the mode to dynamic keys.

6. In the Authentication Types Checklist, WPA PSK and WPA2 PSK.

7. Then enter the password in the WPA Pre-Shared-Key and WPA2 Pre-Shared-Key sections.

In conclusion, wireless networks are a very important technology in everyday life. However, like any other technology, wireless networks also have some problems that need to be addressed. By understanding the problems that may occur on a wireless network, users can take appropriate action to overcome these problems and ensure that the wireless network runs smoothly and safely, namely by adding a password to the wireless network security system using WPA (Wi-Fi Protected Access) encryption technology.

Baca konten-konten menarik Kompasiana langsung dari smartphone kamu. Follow channel WhatsApp Kompasiana sekarang di sini: https://whatsapp.com/channel/0029VaYjYaL4Spk7WflFYJ2H

HALAMAN :
  1. 1
  2. 2
Mohon tunggu...

Lihat Konten Ilmu Alam & Tekno Selengkapnya
Lihat Ilmu Alam & Tekno Selengkapnya
Beri Komentar
Berkomentarlah secara bijaksana dan bertanggung jawab. Komentar sepenuhnya menjadi tanggung jawab komentator seperti diatur dalam UU ITE

Belum ada komentar. Jadilah yang pertama untuk memberikan komentar!
LAPORKAN KONTEN
Alasan
Laporkan Konten
Laporkan Akun