Uji penetrasi jaringan wireless dan IoT dengan tools open - source pada lingkungan virtual
DOI:
https://doi.org/10.62671/jikum.v2i2.226Keywords:
Penetration Testing, Wireless Security, IoT, Open-Source Tools, Virtual Environment.Abstract
Wireless network security and Internet of Things (IoT) device vulnerabilities have become critical issues in the digital era, especially with the growing reliance on smart devices in household, industrial, and urban environments. Many IoT devices and Wi-Fi networks currently in use remain susceptible to various attacks such as sniffing, spoofing, and brute-force, which can be exploited by malicious actors to steal sensitive information or gain unauthorized control of devices remotely. This study aims to conduct penetration testing on wireless systems and IoT devices within a safe and controlled virtual environment to identify potential security loopholes. The methodology involves setting up a virtual testbed using VirtualBox and the Kali Linux operating system, employing open-source tools such as Aircrack-ng, Nmap, Bettercap, and Wireshark. Attack simulations were carried out on wireless network configurations and virtual IoT devices under common scenarios such as credential theft, traffic surveillance, and denial-of-service (DoS) attempts. The test results indicate that several IoT devices remain highly vulnerable to basic attacks such as sniffing and brute-force login attempts, while wireless networks using WPA2 encryption are also exploitable under certain conditions. These findings highlight the urgent need to improve network security through stronger encryption standards, network segmentation, and device hardening. This study is expected to serve as a reference for developing open-source-based cybersecurity defense systems to protect IoT ecosystems from increasingly sophisticated threats.
References
Setiawan, R., & Santoso, J. (2020). Analisis keamanan jaringan wireless menggunakan metode wardriving dan Wireshark. Jurnal Teknologi dan Sistem Komputer, 8(2), 125–131.
Alrawais, A., Alhothaily, A., Hu, C., & Cheng, X. (2017). Fog computing for the Internet of Things: Security and privacy issues. IEEE Internet Computing, 21(2), 34–42.
Antunes, M., & Correia, M. (2011). Vulnerability detection of web applications in source code: A static analysis approach. Journal of Internet Services and Applications, 2(1), 5–16.
Khraisat, A., Gondal, I., Vamplew, P., & Kamruzzaman, J. (2019). Survey of intrusion detection systems: Techniques, datasets and challenges. Cybersecurity, 2(1), 20.
Liu, H., Ning, H., & Yang, Y. (2018). Aggregated-proofs based privacy-preserving authentication for V2G networks in the smart grid. IEEE Transactions on Vehicular Technology, 67(3), 2837–2849.
Rahman, M. M., Rokonuzzaman, M., & Ahmed, M. (2019). IoT security: An end-to-end view and case study. International Journal of Network Security & Its Applications, 11(3), 1–15.
Silva, M., & Alessi, M. (2021). Simulation of attacks on IoT networks using open-source tools. Journal of Cybersecurity Technology, 5(1), 24–37.
Singh, S., & Chatterjee, K. (2017). Cloud security issues and challenges: A survey. Journal of Network and Computer Applications, 79, 88–115.
Syafrudin, M., Fitriyani, N. L., Alfian, G., Rhee, J., & Hwang, J. (2019). Performance analysis of IoT-based sensor, big data processing, and machine learning model for real-time monitoring system in automotive manufacturing. Sensors, 19(18), 3867.
Hakim, L., & Yuliana, A. (2021). Uji penetrasi jaringan Wi-Fi menggunakan Aircrack-ng dan Kismet pada lingkungan virtual. Jurnal Keamanan Siber Indonesia, 4(1), 45–52.



