Studi Eksperimen Keamanan Jaringan Wi-Fi Kampus: Analisis Kerentanan terhadap Serangan Evil Twin dan Deauthentication

Authors

DOI:

https://doi.org/10.29408/edumatic.v9i2.31822

Keywords:

evil twin, network security, campus wi-fi, multihop, nodemcu esp8266

Abstract

The increasing use of Wi-Fi in higher education also brings security risks, such as Evil Twin Attacks that trick users into connecting to fake access points. This study aims to assess the vulnerability of Universitas Mataram’s Wi-Fi network to such attacks using a multihop model and to propose technical improvements. An ethical penetration testing method was applied using a NodeMCU ESP8266 with Deauther firmware, tested across 13 campus locations. Observed variables included the number of connected devices, user interaction with phishing pages, deauthentication success, and captured credentials. The results reveal that five out of 13 locations (38.46%) were vulnerable, where users were redirected to fake SSIDs and entered credentials, even though most deauthentication attempts failed. These findings highlight that attack success depends not only on deauthentication but also on firmware variation and AP configuration. The study implies the need for network security audits, firmware standardization, stronger authentication with full encryption, and enhanced user awareness to reduce phishing risks.

References

Abedi, A., Lu, H., Chen, A., Liu, C., & Abari, O. (2022). Wi-Fi physical layer stays awake and responds when it should not. Proceedings of the ACM Workshop on Hot Topics in Wireless, 35–42.

Alhamed, A. (2023). Ethical penetration testing for wireless networks: Identifying and mitigating Evil Twin vulnerabilities. International Journal of Cybersecurity and Digital Forensics, 12(3), 145–154.

Aman, A. (2023). Pengujian keamanan jaringan nirkabel melalui simulasi serangan Man in The Middle dan Evil Twin di sekolah XYZ. Digital Transformation Technology (Digitech), 3(2), 824–831. https://doi.org/10.47709/digitech.v3i2.3378

Andarini, R., Prasetyo, M., & Wulandari, E. (2023). Peningkatan keamanan sistem informasi berbasis jaringan nirkabel di perguruan tinggi. Jurnal Teknologi Informasi dan Komputer, 8(1), 45–53.

Ariyadi, T., Irwansyah, & Huda, M. S. (2024). Analisis keamanan jaringan Wi-Fi mahasiswa UBD dari serangan packet sniffing. Jurnal Ilmiah Informatika, 12(1), 53–58. https://doi.org/10.33884/jif.v12i01.8739

Banakh, M., Korol, O., & Sokolov, A. (2024). Data mining approach for Evil Twin attack identification in Wi-Fi networks. Data, 9(10), 119. https://doi.org/10.3390/data9100119

da Silva, P., Costa, H., & Ribeiro, L. (2023). Experimental evaluation of Evil Twin attacks in higher education Wi-Fi environments. International Journal of Information Security Science, 12(2), 55–66.

Dereli, T., & Yildiz, M. (2024). Twin ghosts: Evil Twin attacks in wireless networks and defense mechanisms. Bilecik Şeyh Edebali University Journal of Science, 11(1), 85–96.

Fikri, L. M. Z., Zafrullah, A., & Zubaidi, A. (2023). Analisis keamanan jaringan Wi-Fi dengan metode deauthentication attack pada access point di lingkungan Universitas Mataram. Jurnal Teknologi dan Sistem Informasi, 11(2), 75–84.

Jufri, M., & Heryanto. (2021). Peningkatan keamanan jaringan wireless dengan menerapkan security policy pada firewall. JOISIE (Journal of Information Systems and Informatics Engineering), 5(2), 98–108. https://doi.org/10.35145/joisie.v5i2.175

Kara, İ. (2024). Twin Ghosts: Evil Twin Attacks in Wireless Networks and Defense Mechanisms. Bitlis Eren University Journal of Science and Technology, 14(2), 58-74. https://doi.org/10.17678/beuscitech.1450756

Kaur, G., & Dhiman, R. (2024). Detecting and preventing rogue access points in wireless networks: A survey. International Journal of Network Security, 26(4), 412–422.

Laksana, T. G., & Mulyani, S. (2024). Pengetahuan dasar identifikasi dini deteksi serangan kejahatan siber untuk mencegah pembobolan data perusahaan. Jurnal Ilmiah Multidisiplin, 3(1), 109–122. https://doi.org/10.56127/jukim.v3i01.1143

Lina, I. M., & Fernandes, G. R. (2022). Analisis pola social engineering menggunakan teknik Wi-Fi deauther dan Evil Twin. JRKT (Jurnal Rekayasa Komputasi Terapan), 2(4), 253–260. https://doi.org/10.30998/jrkt.v2i04.8185

Louca, A., Constantinou, D., & Georgiou, A. (2023). Exploiting 802.11v mechanisms for enhanced Evil Twin attacks. Proceedings of the IEEE International Conference on Communications (ICC), 1–6.

Louca, C., Peratikou, A., & Stavrou, S. (2023). A novel Evil Twin MiTM attack through 802.11 v protocol exploitation. Computers & Security, 130, 103261. https://doi.org/10.1016/j.cose.2023.103261

Palamà, I., Amici, A., Bellicini, G., Gringoli, F., Pedretti, F., & Bianchi, G. (2023). Attacks and vulnerabilities of Wi-Fi Enterprise networks: User security awareness assessment through credential stealing attack experiments. Computer Communications, 212, 129-140. https://doi.org/10.1016/j.comcom.2023.09.031

Riyanti, E., & Sutejo, A. (2024). Strategi pengamanan jaringan nirkabel terhadap ancaman serangan MITM dan Evil Twin. Jurnal Keamanan Siber, 4(1), 33–42.

Shaikh, F., Shaikh, H., & Shah, M. (2025). Review of Evil Twin attacks in the age of Wi-Fi 6 and WPA3: An evaluation of threats, techniques, and technological responses. IRE Journals, 8(11), 45–52.

Shi, L., Hernandez, J., & Zhang, W. (2025). A survey on secure Wi-Fi sensing technology: Attacks and defenses. Sensors, 25(6), 1913. https://doi.org/10.3390/s25061913

Sigit, M., Singasatia, D., & Kurniawan, I. (2024). Pengujian serangan Evil Twin ESP8266 pada wireless networking dengan metode penetration testing (Studi kasus: STT Wastukancana). Jurnal Ilmiah Sain dan Teknologi, 2(11), 193–214.

Tian, Y., Wang, S., & Zhang, L. (2021). Convolutional neural network based Evil Twin attack detection in Wi-Fi networks. MATEC Web of Conferences, 336, 08006. https://doi.org/10.1051/matecconf/202133608006

Downloads

Published

2025-08-23

How to Cite

Asiana, K. P., Huwae, R. B., & Jatmika, A. H. (2025). Studi Eksperimen Keamanan Jaringan Wi-Fi Kampus: Analisis Kerentanan terhadap Serangan Evil Twin dan Deauthentication . Edumatic: Jurnal Pendidikan Informatika, 9(2), 629–638. https://doi.org/10.29408/edumatic.v9i2.31822