Enhancing Security and Privacy in Local Area Network (LAN) with TORVPN Using Raspberry Pi as Access Point: A Design and Implementation
Network security is designed to protect the integrity, confidentiality and accessibility of computer networks and data using both software and hardware technologies. Every person, including organization requires a degree of network security solutions in place to protect it from the ever-growing lan...
Guardado en:
Formato: | article |
---|---|
Lenguaje: | EN |
Publicado: |
Faculty of Computer and Mathematical Sciences, Universiti Teknologi MARA Perlis
2021
|
Materias: | |
Acceso en línea: | https://doaj.org/article/4f11bb314bd24b809606868ba78796fc |
Etiquetas: |
Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
|
id |
oai:doaj.org-article:4f11bb314bd24b809606868ba78796fc |
---|---|
record_format |
dspace |
spelling |
oai:doaj.org-article:4f11bb314bd24b809606868ba78796fc2021-11-06T02:21:07ZEnhancing Security and Privacy in Local Area Network (LAN) with TORVPN Using Raspberry Pi as Access Point: A Design and Implementation2600-8793https://doaj.org/article/4f11bb314bd24b809606868ba78796fc2021-09-01T00:00:00Zhttp://repeater.my/index.php/jcrinn/article/view/190https://doaj.org/toc/2600-8793 Network security is designed to protect the integrity, confidentiality and accessibility of computer networks and data using both software and hardware technologies. Every person, including organization requires a degree of network security solutions in place to protect it from the ever-growing landscape of cyber threats in the wild today. This paper aims to design and implement TorVPN as an access point using Raspberry Pi in enhancing security and privacy in Local Area Network (LAN). This access point was implemented by using the combination of The Onion Router (Tor) and Virtual Private Network (VPN) services. Then, the graphical user interface application was developed to assist and facilitate the user to access the network securely without having the difficulties to configure and install any software. To determine the effectiveness of the proposed work, there were two experiments involved in this study. Firstly, the confidentiality test which to verify its privacy in keeping the information securely. Secondly, the performance test of the Internet connectivity in terms of ping, download and upload speed. The encourage results was expected as the confidentiality tested on the TorVPN access point network has shown the positive outcome by securing client’s Internet data packet. While, the Internet connectivity is not stable enough, when the client’s IP address changed in the network. Hence, the combination VPN and Tor service using Raspberry Pi as an access point inside the LAN is suitable and secure the information in the network, but do not suggest for user who wants a good Internet connectivity. Faculty of Computer and Mathematical Sciences, Universiti Teknologi MARA PerlisarticleProbabilities. Mathematical statisticsQA273-280TechnologyTTechnology (General)T1-995ENJournal of Computing Research and Innovation, Vol 6, Iss 2 (2021) |
institution |
DOAJ |
collection |
DOAJ |
language |
EN |
topic |
Probabilities. Mathematical statistics QA273-280 Technology T Technology (General) T1-995 |
spellingShingle |
Probabilities. Mathematical statistics QA273-280 Technology T Technology (General) T1-995 Enhancing Security and Privacy in Local Area Network (LAN) with TORVPN Using Raspberry Pi as Access Point: A Design and Implementation |
description |
Network security is designed to protect the integrity, confidentiality and accessibility of computer networks and data using both software and hardware technologies. Every person, including organization requires a degree of network security solutions in place to protect it from the ever-growing landscape of cyber threats in the wild today. This paper aims to design and implement TorVPN as an access point using Raspberry Pi in enhancing security and privacy in Local Area Network (LAN). This access point was implemented by using the combination of The Onion Router (Tor) and Virtual Private Network (VPN) services. Then, the graphical user interface application was developed to assist and facilitate the user to access the network securely without having the difficulties to configure and install any software. To determine the effectiveness of the proposed work, there were two experiments involved in this study. Firstly, the confidentiality test which to verify its privacy in keeping the information securely. Secondly, the performance test of the Internet connectivity in terms of ping, download and upload speed. The encourage results was expected as the confidentiality tested on the TorVPN access point network has shown the positive outcome by securing client’s Internet data packet. While, the Internet connectivity is not stable enough, when the client’s IP address changed in the network. Hence, the combination VPN and Tor service using Raspberry Pi as an access point inside the LAN is suitable and secure the information in the network, but do not suggest for user who wants a good Internet connectivity.
|
format |
article |
title |
Enhancing Security and Privacy in Local Area Network (LAN) with TORVPN Using Raspberry Pi as Access Point: A Design and Implementation |
title_short |
Enhancing Security and Privacy in Local Area Network (LAN) with TORVPN Using Raspberry Pi as Access Point: A Design and Implementation |
title_full |
Enhancing Security and Privacy in Local Area Network (LAN) with TORVPN Using Raspberry Pi as Access Point: A Design and Implementation |
title_fullStr |
Enhancing Security and Privacy in Local Area Network (LAN) with TORVPN Using Raspberry Pi as Access Point: A Design and Implementation |
title_full_unstemmed |
Enhancing Security and Privacy in Local Area Network (LAN) with TORVPN Using Raspberry Pi as Access Point: A Design and Implementation |
title_sort |
enhancing security and privacy in local area network (lan) with torvpn using raspberry pi as access point: a design and implementation |
publisher |
Faculty of Computer and Mathematical Sciences, Universiti Teknologi MARA Perlis |
publishDate |
2021 |
url |
https://doaj.org/article/4f11bb314bd24b809606868ba78796fc |
_version_ |
1718443977762406400 |