PENGAMANAN JARINGAN WIRELESS LAN DENGAN PROTOKOL EAP-TTLS DAN OTENTIKASI MSCHAPV2 PADA FAKULTAS ILMU KOMPUTER UPN VETERAN JAKARTA

The use of the WPA protocol has two processes, including authentication and encryption. At the network level with large infrastructure and high network traffic as well as universities, corporate offices or other public places that use wireless LANs, the authentication process is the first process do...

Full description

Saved in:
Bibliographic Details
Main Author: Kukuh Bagas Permadi, (Author)
Format: Book
Published: 2020-07-11.
Subjects:
Online Access:Link Metadata
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000 am a22000003u 4500
001 repoupnvj_7416
042 |a dc 
100 1 0 |a Kukuh Bagas Permadi, .  |e author 
245 0 0 |a PENGAMANAN JARINGAN WIRELESS LAN DENGAN PROTOKOL EAP-TTLS DAN OTENTIKASI MSCHAPV2 PADA FAKULTAS ILMU KOMPUTER UPN VETERAN JAKARTA 
260 |c 2020-07-11. 
500 |a http://repository.upnvj.ac.id/7416/1/ABSTRAK.pdf 
500 |a http://repository.upnvj.ac.id/7416/2/AWAL.pdf 
500 |a http://repository.upnvj.ac.id/7416/3/BAB%201.pdf 
500 |a http://repository.upnvj.ac.id/7416/4/BAB%202.pdf 
500 |a http://repository.upnvj.ac.id/7416/5/BAB%203.pdf 
500 |a http://repository.upnvj.ac.id/7416/6/BAB%204.pdf 
500 |a http://repository.upnvj.ac.id/7416/7/BAB%205.pdf 
500 |a http://repository.upnvj.ac.id/7416/8/DAFTAR%20PUSTAKA.pdf 
500 |a http://repository.upnvj.ac.id/7416/9/RIWAYAT%20HIDUP.pdf 
500 |a http://repository.upnvj.ac.id/7416/14/LAMPIRAN.pdf 
500 |a http://repository.upnvj.ac.id/7416/13/ARTIKEL%20KI.pdf 
520 |a The use of the WPA protocol has two processes, including authentication and encryption. At the network level with large infrastructure and high network traffic as well as universities, corporate offices or other public places that use wireless LANs, the authentication process is the first process done so that wireless LAN network users can access the internet network. Therefore, it is not only safe but the authentication process can operate quickly. The solution of this research is to implement the IEEE 802.1x EAP Protocol with Extensible Authentication Protocol - Tunneled Transport Layer Security (EAP-TTLS) to create a secure tunnel (security tunnel) in key exchange on a wireless network, as well as with the inner authentication of the Microsoft Challenge Handshake Authentication Protocol. Version 2 (MSCHAPv2). The output produced in this study is to build a security on a centralized wireless network at the Faculty of Computer Science UPN Veteran Jakarta. 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
690 |a T Technology (General) 
655 7 |a Thesis  |2 local 
655 7 |a NonPeerReviewed  |2 local 
787 0 |n http://repository.upnvj.ac.id/7416/ 
787 0 |n http://repository.upnvj.ac.id 
856 4 1 |u http://repository.upnvj.ac.id/7416/  |z Link Metadata