Tesis Sigit Wibawa

research
  • 06 Apr
  • 2023

Tesis Sigit Wibawa

ABSTRAK
Selama 20 tahun terakhir teknologi nirkabel telah berkembang dengan
sangat “massif” dan terutama dalam dekade terakhir teknologi nirkabel ini telah
membuat lompatan besar karena hampir semua perangkat di jaringan lokal
dihubungkan secara nirkabel, teknologi yang distandarkan oleh IEEE menjadi
kedalam kelompok 802.11 yang merupakan standar untuk jaringan lokal atau
WLAN yang mengatur fungsional dan kinerja.
Dalam makalah ini menjelaskan konsep dan mengusulkan pendekatan
analitis berdasarkan formula yang dievaluasi sebagai keandalan sistem
menggunakan Reliability Block Diagram (RBD), keandalan sistem berkaitan erat
dengan ketersediaan distribusi atau layanan.
Dalam penelitian sebelumnya “lubang” keamanan dalam teknologi
nirkabel ditemukan dalam proses management frame, yaitu ketika perangkat
pertama kali saling terhubung, kemudian pengujian dilakukan untuk mencoba
keandalannya dengan beberapa simulasi serangan menggunakan modul ESP8266
yang diprogram sebagai penyerang yang digunakan pada sembilan perangkat
accesspoint pada suatu lokasi tertentu.
Penelitian ini mengevaluasi dan menunjukkan bahwa solusi yang
diusulkan berhasil mengidentifikasi dan sistem selamat dari serangan dengan
komunikasi tanpa gangguan pada jaringan nirkabel, dengan perhitungan yang
menghasilkan lebih dari 90% reliabilitas, kemudian divalidasi dengan
menggunakan aplikasi reliability analytics tools.
Kata kunci: ESP8266, k-out-of-n system, reliability block diagram, reliabilitas
sistem komputer, Standar IEEE802.11

REFERENSI

John Bellardo and Stefan Savage, “802.11 Denial-of-Service Attacks: Real
Vulnerabilities and Practical Solutions” Department of Computer Science and
Engineering University of California at San Diego Proceedings of the 12th
USENIX Security Symposium Washington, D.C.USA August 4–8, 2003.
[2] Wenzhe Zhou, Alan Marshall and Qiang Gu, “A Novel Classification Scheme
for 802.11 WLAN Active Attacking Traffic Patterns” School of Electrical &
Electronic Engineering, Queen’s University, Belfast, UK,2006.
[3] Rajeev Singh and Pantnagar Udham Singh Nagar, “ Detecting and Reducing the
Denial of Service attacks in WLANs. Department of Computer Engineering GB
Pant University, (Uttarakhand), Teek Parval Sharma Department of Computer
Engineering National Institute of Technology Hamirpur (H.P.), India 2011.
[4] Mauro Conti, Giulio Lovisotto, Ivan Martinovic, Gene Tsudik “FADEWICH:
Fast Deauthentication over the Wireless Channel” University of Padua,
University of Oxford, University of California, Irvine, IEEE 37th International
Conference on Distributed Computing Systems 2017.
[5] Martin L. Shooman “Reliability of Computer Systems and Networks,” Wiley,
2002.
[6] Jonny Milliken, Valerio Selis, Kian Meng Yap and Alan Marshall, “Impact of
Metric Selection on Wireless DeAuthentication DoS Attack Performance”,
IEEE Wireless Communication Letter Vol.2,No.5 October 2013.
[7] Utkarsh Wadhwa B.,”Wireless Network Security: Tough Times”, Tech (3/'d
Year) Department of Information Technology Galgotias College of Engineering
and Technology Greater Noida, India 2015 International Conference on Green
Computing and Internet of Things (ICGCloT).
[8] Mayank Agarwal, Santosh Biswas, Sukumar Nandi, “Detection of Deauthentication DoS attacks in Wi-Fi Networks: A Machine Learning Approach”,
Department of Computer Science & Engineering Indian Institute of Technology,
Guwahati - 781039, India 2015 IEEE International Conference on Systems,
Man, and Cybernetics.
46
[9] Jaspreet Kaur, “Mac Layer Management Frame Denial of Service Attacks”
Department of Information Technology Indira Gandhi Delhi Technical
University for Women, Delhi, India 2016 International Conference on MicroElectronics and Telecommunication Engineering.
[10] May Aye Chan Aung, Khin.Phyo Thant, “Detection and Mitigation of Wireless
Link Layer Attacks” Myanmar University of Computer Studies, Mandalay,
Myanmar IEEE SERA 2017, June 7-9, 2017, London, UK.
[11] M.A.C.Aung, K.P.Thant, “ Detection and mitigation of wireless link layer
attacks” IEEE 15th International Conference on Software Engineering Research,
Management and Applications (SERA), 2017, London, UK.
[12] R. Cwalinski, H. Koenig, “Identifying malicious traffic in software-defined
wireless local area networks”, International Conference on Computing,
Networking and Communications (ICNC), IEEE, 2018.
[13] Tejas Thaker “ESP8266 based Implementation of Wireless Sensor Network with
Linux Based Web-Server” M.W-VLSI And ESD GTU PG School Gandhinagar,
India Symposium on Colossal Data Analysis and Networking (CDAN) IEEE
2016.
[14] Suvankar Barai, Debajyoti Biswas and Buddhadeb Sau ”Distance Measurement
using NodeMCU ESP8266 based on RSSI Technique” Department of
Mathematics, Jadavpur University Proceedings of 2017 IEEE CAMA, Tsukuba,
Japan.
[15] H. Guo, X. Yang, “A simple reliability block diagram method for safety
integrity verification,” Reliability Engineering and System Safety, vol. 92, 2007,
pp.1267-1273.
[16] Ahmed Abd-Allah, “Extending Reliability Block Diagram to Software
Architectures”, Center for software Engineering computer science Department
University of Southern California Los Angeles, CA 90089 USA, Technical
Report: USC-CSE-97-501.
[17] Cheng-Min Lin, Hui-Kang Teng, Cheng-Chih Yang, Hwei-Li Weng, MingCheng Chung, Chiu-Chiao Chung, “A Mesh Network Reliability Analysis Using
Reliability Block Diagram” Department of Computer and Communication
47
Engineering, Nan Kai University of Technology Graduate Institute of Electrical
Engineering, 2010 IEEE.
[18] Zheng-Zhu Chang, Guang-Yan Zhao, Yu-Feng Sun, “A Calculation Method for
The Reliability of A Complex k-out-of-n System” School of Reliability and
System Engineering Beihang University Beijing, China 2013 International
Conference on Quality, Reliability, Risk, Maintenance, and Safety Engineering
(QR2MSE).
[19] Cisco Aironet1300 Series Outdoor Access Point Datasheet All contents are
Copyright © 1992–2004 Cisco Systems.
[20] Andrew Miceli ,”Wireless Technician’s Handbook Second Edition”, 2003
Artech House Inc.
[21] Harvey Lehpamer, “Transmission Systems Design Handbookfor Wireless
Networks”, 2002 Artech House, Inc