Design of Wireless Network Authentication System and File Server using RADIUS and WPA2-Enterprise
DOI:
https://doi.org/10.33998/processor.2025.20.2.2531Keywords:
Autentikasi, Jaringan Nirkabel, File Server, RADIUS, WPA2-EnterpriseAbstract
Network security and efficiency are important aspects in managing network infrastructure, especially in wireless networks that are prone to various forms of attacks. This research aims to design a more secure and efficient wireless network and file server authentication system using the WPA2-Enterprise protocol and a RADIUS server. In this design, the WPA2-Enterprise protocol is used to improve the security of wireless network access with a user identity-based authentication method, not just a generic password. To improve the efficiency of the authentication process, a RADIUS server is used. The RADIUS (Remote Authentication Dial-In User Service) server functions as a centralised authentication centre that verifies user credentials from a predefined database. The system in this research integrates file server service authentication and wireless network usage authentication. Test results show that this design successfully provides more secure authentication, prevents unauthorised access, and simplifies user and access rights management. The use of a RADIUS server and the WPA2-Enterprise protocol allows for flexibility and efficiency in implementing the system in a campus environment. The implementation of this system can be a practical solution in improving the security and efficiency of the wireless network authentication process and internal file server services.
Downloads
References
E. Dolan and R. Widayanti, “Implementation of Authentication Systems on Hotspot Network Users to Improve Computer Network Security,” International Journal of Cyber and IT Service Management, vol. 2, no. 1, pp. 88–94, Mar. 2022, doi: 10.34306/ijcitsm.v2i1.93.
T. H. Hadi, “Types of Attacks in Wireless Communication Networks,” Webology, vol. 19, no. 1, pp. 718–728, Jan. 2022, doi: 10.14704/web/v19i1/web19051.
Z. M. Luthfansa and U. D. Rosiani, “Pemanfaatan Wireshark untuk Sniffing Komunikasi Data Berprotokol HTTP pada Jaringan Internet,” Journal Information Engineering and Educational Technology, vol. 5, no. 1, pp. 34–39, Jun. 2021, doi: 10.26740/jieet.v5n1.
Michael, I. Ruslianto, and R. Hidayati, “Analisis Perbandingan Sistem Keamanan Jaringan WI-FI Protected Access 2-Pre Shared Key (WPA2-PSK) dan Captive Portal pada Jaringan Publik Wireless,” Coding : Jurnal Komputer dan Aplikasi, vol. 09, no. 1, pp. 108–118, 2021, doi: 10.26418/coding.v9i01.45902.
A. G. Gani and N. Permadi, “Sistem Administrasi Jaringan menggunakan Windows Server 2008,” Jurnal Sistem Informasi, vol. 7, no. 1, pp. 1–22, Feb. 2020, doi: 10.35968/jsi.v7i1.378.
C. A. Ochoa Villanueva and A. Roman-Gonzalez, “Implementation of a RADIUS server for access control through authentication in wireless networks,” International Journal of Advanced and Applied Sciences, vol. 10, no. 3, pp. 183–188, Mar. 2023, doi: 10.21833/ijaas.2023.03.022.
A. D. Yudhistira and R. Harwahyu, “Implementation Strategy Analysis of Network Security using dalo RADIUS and Pi-hole DNS Server to enhance Computer Network Security, Case Study: XYZ as a Fintech Company,” Jurnal Indonesia Sosial Teknologi, vol. 5, no. 10, pp. 4364–4379, Oct. 2024, doi: 10.59141/jist.v5i10.5321.
K. O. K. S. Kemas, A. R. Supriyatna, and S. D. Putra, “Autentikasi User Dengan Metode Single Sign-On Berbasis Windows Active Directory Pada PT. XYZ,” ROUTERS: Jurnal Sistem dan Teknologi Informasi, pp. 70–78, Jan. 2024, doi: 10.25181/rt.v2i2.3328.
D. Naman, M. Abdulwahab, and A. Ibrahim, “RADIUS Authentication on Unifi Enterprise System Controller using Zero-Handoff Roaming in Wireless Communication,” Journal of Applied Science and Technology Trends, vol. 1, no. 2, pp. 118–124, Aug. 2020, doi: 10.38094/jastt1427.
S. Syafii, M. Tahir, M. Dani, N. Maulidya, and N. Widad Haqiqi, “Jurnal Restikom : Riset Teknik Informatika dan Komputer Perancangan Sistem Keamanan Jaringan Nirkabel dengan WPA2 Enterprise,” vol. 7, no. 1, pp. 74–86, Apr. 2025, doi: 10.52005/restikom.v71.415.
S. B. Hegde, A. Ranjan, A. Raj, K. Paul, and S. Santra, “WPA2 Based Wireless Enterprise Configuration,” in 2021 IEEE International Conference on Mobile Networks and Wireless Communications, ICMNWC 2021, Institute of Electrical and Electronics Engineers Inc., 2021. doi: 10.1109/ICMNWC52512.2021.9688387.
I. Fatihul Busyro, H. Umam, and A. Eko Musantono, “Implementasi Fitur File Server Resource Manager Pada Sistem Operasi Windows Server,” 2023. Accessed: May 16, 2025. [Online]. Available: https://jurnal.akd.ac.id/index.php/assembly/article/view/31/9
“Network Policy Server overview.” Accessed: Oct. 24, 2025. [Online]. Available: https://learn.microsoft.com/en-us/windows-server/networking/technologies/nps/nps-top
N. Umah, F. A. Yudanto, and E. Rilvani, “Evaluasi Segmentasi VLAN dalam Optimalisasi Kinerja dan Keamanan pada Jaringan LAN di Universitas Pelita Bangsa,” Jurnal Ilmu Komputer dan Informatika, vol. 8, no. 1, pp. 38–47, Jan. 2025, doi: 10.47324/ilkominfo.v8i1.313.
F. Anam and F. Fachri, “Evaluasi Kerentanan Keamanan Jaringan Nirkabel Menggunakan Metode Penetration Testing dengan Aircrack-NG,” Rabit : Jurnal Teknologi dan Sistem Informasi Univrab, vol. 10, no. 1, pp. 1–8, Jan. 2025, doi: 10.36341/rabit.v10i1.5387.
						
							
			
		
			
			
				
				
					



