Studi Eksperimen Keamanan Jaringan Wi-Fi Kampus: Analisis Kerentanan terhadap Serangan Evil Twin dan Deauthentication
DOI:
https://doi.org/10.29408/edumatic.v9i2.31822Keywords:
evil twin, network security, campus wi-fi, multihop, nodemcu esp8266Abstract
The increasing use of Wi-Fi in higher education also brings security risks, such as Evil Twin Attacks that trick users into connecting to fake access points. This study aims to assess the vulnerability of Universitas Mataram’s Wi-Fi network to such attacks using a multihop model and to propose technical improvements. An ethical penetration testing method was applied using a NodeMCU ESP8266 with Deauther firmware, tested across 13 campus locations. Observed variables included the number of connected devices, user interaction with phishing pages, deauthentication success, and captured credentials. The results reveal that five out of 13 locations (38.46%) were vulnerable, where users were redirected to fake SSIDs and entered credentials, even though most deauthentication attempts failed. These findings highlight that attack success depends not only on deauthentication but also on firmware variation and AP configuration. The study implies the need for network security audits, firmware standardization, stronger authentication with full encryption, and enhanced user awareness to reduce phishing risks.
References
Abedi, A., Lu, H., Chen, A., Liu, C., & Abari, O. (2022). Wi-Fi physical layer stays awake and responds when it should not. Proceedings of the ACM Workshop on Hot Topics in Wireless, 35–42.
Alhamed, A. (2023). Ethical penetration testing for wireless networks: Identifying and mitigating Evil Twin vulnerabilities. International Journal of Cybersecurity and Digital Forensics, 12(3), 145–154.
Aman, A. (2023). Pengujian keamanan jaringan nirkabel melalui simulasi serangan Man in The Middle dan Evil Twin di sekolah XYZ. Digital Transformation Technology (Digitech), 3(2), 824–831. https://doi.org/10.47709/digitech.v3i2.3378
Andarini, R., Prasetyo, M., & Wulandari, E. (2023). Peningkatan keamanan sistem informasi berbasis jaringan nirkabel di perguruan tinggi. Jurnal Teknologi Informasi dan Komputer, 8(1), 45–53.
Ariyadi, T., Irwansyah, & Huda, M. S. (2024). Analisis keamanan jaringan Wi-Fi mahasiswa UBD dari serangan packet sniffing. Jurnal Ilmiah Informatika, 12(1), 53–58. https://doi.org/10.33884/jif.v12i01.8739
Banakh, M., Korol, O., & Sokolov, A. (2024). Data mining approach for Evil Twin attack identification in Wi-Fi networks. Data, 9(10), 119. https://doi.org/10.3390/data9100119
da Silva, P., Costa, H., & Ribeiro, L. (2023). Experimental evaluation of Evil Twin attacks in higher education Wi-Fi environments. International Journal of Information Security Science, 12(2), 55–66.
Dereli, T., & Yildiz, M. (2024). Twin ghosts: Evil Twin attacks in wireless networks and defense mechanisms. Bilecik Şeyh Edebali University Journal of Science, 11(1), 85–96.
Fikri, L. M. Z., Zafrullah, A., & Zubaidi, A. (2023). Analisis keamanan jaringan Wi-Fi dengan metode deauthentication attack pada access point di lingkungan Universitas Mataram. Jurnal Teknologi dan Sistem Informasi, 11(2), 75–84.
Jufri, M., & Heryanto. (2021). Peningkatan keamanan jaringan wireless dengan menerapkan security policy pada firewall. JOISIE (Journal of Information Systems and Informatics Engineering), 5(2), 98–108. https://doi.org/10.35145/joisie.v5i2.175
Kara, İ. (2024). Twin Ghosts: Evil Twin Attacks in Wireless Networks and Defense Mechanisms. Bitlis Eren University Journal of Science and Technology, 14(2), 58-74. https://doi.org/10.17678/beuscitech.1450756
Kaur, G., & Dhiman, R. (2024). Detecting and preventing rogue access points in wireless networks: A survey. International Journal of Network Security, 26(4), 412–422.
Laksana, T. G., & Mulyani, S. (2024). Pengetahuan dasar identifikasi dini deteksi serangan kejahatan siber untuk mencegah pembobolan data perusahaan. Jurnal Ilmiah Multidisiplin, 3(1), 109–122. https://doi.org/10.56127/jukim.v3i01.1143
Lina, I. M., & Fernandes, G. R. (2022). Analisis pola social engineering menggunakan teknik Wi-Fi deauther dan Evil Twin. JRKT (Jurnal Rekayasa Komputasi Terapan), 2(4), 253–260. https://doi.org/10.30998/jrkt.v2i04.8185
Louca, A., Constantinou, D., & Georgiou, A. (2023). Exploiting 802.11v mechanisms for enhanced Evil Twin attacks. Proceedings of the IEEE International Conference on Communications (ICC), 1–6.
Louca, C., Peratikou, A., & Stavrou, S. (2023). A novel Evil Twin MiTM attack through 802.11 v protocol exploitation. Computers & Security, 130, 103261. https://doi.org/10.1016/j.cose.2023.103261
Palamà, I., Amici, A., Bellicini, G., Gringoli, F., Pedretti, F., & Bianchi, G. (2023). Attacks and vulnerabilities of Wi-Fi Enterprise networks: User security awareness assessment through credential stealing attack experiments. Computer Communications, 212, 129-140. https://doi.org/10.1016/j.comcom.2023.09.031
Riyanti, E., & Sutejo, A. (2024). Strategi pengamanan jaringan nirkabel terhadap ancaman serangan MITM dan Evil Twin. Jurnal Keamanan Siber, 4(1), 33–42.
Shaikh, F., Shaikh, H., & Shah, M. (2025). Review of Evil Twin attacks in the age of Wi-Fi 6 and WPA3: An evaluation of threats, techniques, and technological responses. IRE Journals, 8(11), 45–52.
Shi, L., Hernandez, J., & Zhang, W. (2025). A survey on secure Wi-Fi sensing technology: Attacks and defenses. Sensors, 25(6), 1913. https://doi.org/10.3390/s25061913
Sigit, M., Singasatia, D., & Kurniawan, I. (2024). Pengujian serangan Evil Twin ESP8266 pada wireless networking dengan metode penetration testing (Studi kasus: STT Wastukancana). Jurnal Ilmiah Sain dan Teknologi, 2(11), 193–214.
Tian, Y., Wang, S., & Zhang, L. (2021). Convolutional neural network based Evil Twin attack detection in Wi-Fi networks. MATEC Web of Conferences, 336, 08006. https://doi.org/10.1051/matecconf/202133608006
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Kia Putri Asiana, Raphael Bianco Huwae, Andy Hidayat Jatmika

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Semua tulisan pada jurnal ini adalah tanggung jawab penuh penulis. Edumatic: Jurnal Pendidikan Informatika bisa diakses secara free (gratis) tanpa ada pungutan biaya, sesuai dengan lisensi creative commons yang digunakan.

This work is licensed under a Lisensi a Creative Commons Attribution-ShareAlike 4.0 International License.