Uji penetrasi jaringan wireless dan IoT dengan tools open - source pada lingkungan virtual

Authors

  • Hafiz Fadhillah Universitas Malikussaleh, Indonesia Author
  • Faris An Nura Universitas Malikussaleh, Indonesia Author
  • Langlang Soeltanul Aulia Aurelsosa Universitas Malikussaleh, Indonesia Author
  • Teuku Farhan Damiri Universitas Malikussaleh, Indonesia Author
  • Muhammad Subhan Universitas Malikussaleh, Indonesia Author
  • Muhammad Zada Zayyan Universitas Malikussaleh, Indonesia Author

DOI:

https://doi.org/10.62671/jikum.v2i2.226

Keywords:

Penetration Testing, Wireless Security, IoT, Open-Source Tools, Virtual Environment.

Abstract

Wireless network security and Internet of Things (IoT) device vulnerabilities have become critical issues in the digital era, especially with the growing reliance on smart devices in household, industrial, and urban environments. Many IoT devices and Wi-Fi networks currently in use remain susceptible to various attacks such as sniffing, spoofing, and brute-force, which can be exploited by malicious actors to steal sensitive information or gain unauthorized control of devices remotely. This study aims to conduct penetration testing on wireless systems and IoT devices within a safe and controlled virtual environment to identify potential security loopholes. The methodology involves setting up a virtual testbed using VirtualBox and the Kali Linux operating system, employing open-source tools such as Aircrack-ng, Nmap, Bettercap, and Wireshark. Attack simulations were carried out on wireless network configurations and virtual IoT devices under common scenarios such as credential theft, traffic surveillance, and denial-of-service (DoS) attempts. The test results indicate that several IoT devices remain highly vulnerable to basic attacks such as sniffing and brute-force login attempts, while wireless networks using WPA2 encryption are also exploitable under certain conditions. These findings highlight the urgent need to improve network security through stronger encryption standards, network segmentation, and device hardening. This study is expected to serve as a reference for developing open-source-based cybersecurity defense systems to protect IoT ecosystems from increasingly sophisticated threats.

References

Setiawan, R., & Santoso, J. (2020). Analisis keamanan jaringan wireless menggunakan metode wardriving dan Wireshark. Jurnal Teknologi dan Sistem Komputer, 8(2), 125–131.

Alrawais, A., Alhothaily, A., Hu, C., & Cheng, X. (2017). Fog computing for the Internet of Things: Security and privacy issues. IEEE Internet Computing, 21(2), 34–42.

Antunes, M., & Correia, M. (2011). Vulnerability detection of web applications in source code: A static analysis approach. Journal of Internet Services and Applications, 2(1), 5–16.

Khraisat, A., Gondal, I., Vamplew, P., & Kamruzzaman, J. (2019). Survey of intrusion detection systems: Techniques, datasets and challenges. Cybersecurity, 2(1), 20.

Liu, H., Ning, H., & Yang, Y. (2018). Aggregated-proofs based privacy-preserving authentication for V2G networks in the smart grid. IEEE Transactions on Vehicular Technology, 67(3), 2837–2849.

Rahman, M. M., Rokonuzzaman, M., & Ahmed, M. (2019). IoT security: An end-to-end view and case study. International Journal of Network Security & Its Applications, 11(3), 1–15.

Silva, M., & Alessi, M. (2021). Simulation of attacks on IoT networks using open-source tools. Journal of Cybersecurity Technology, 5(1), 24–37.

Singh, S., & Chatterjee, K. (2017). Cloud security issues and challenges: A survey. Journal of Network and Computer Applications, 79, 88–115.

Syafrudin, M., Fitriyani, N. L., Alfian, G., Rhee, J., & Hwang, J. (2019). Performance analysis of IoT-based sensor, big data processing, and machine learning model for real-time monitoring system in automotive manufacturing. Sensors, 19(18), 3867.

Hakim, L., & Yuliana, A. (2021). Uji penetrasi jaringan Wi-Fi menggunakan Aircrack-ng dan Kismet pada lingkungan virtual. Jurnal Keamanan Siber Indonesia, 4(1), 45–52.

Downloads

Published

2026-06-04

How to Cite

Fadhillah, H., Nura, F. A. ., Aurelsosa, L. S. A. ., Damiri, T. F. ., Subhan, M. ., & Zayyan, M. Z. . (2026). Uji penetrasi jaringan wireless dan IoT dengan tools open - source pada lingkungan virtual. JIKUM: Jurnal Ilmu Komputer, 2(2), 301-304. https://doi.org/10.62671/jikum.v2i2.226

How to Cite

Fadhillah, H., Nura, F. A. ., Aurelsosa, L. S. A. ., Damiri, T. F. ., Subhan, M. ., & Zayyan, M. Z. . (2026). Uji penetrasi jaringan wireless dan IoT dengan tools open - source pada lingkungan virtual. JIKUM: Jurnal Ilmu Komputer, 2(2), 301-304. https://doi.org/10.62671/jikum.v2i2.226