Ehancing security and privacy in local area network with TORVPN using : raspberry pi as access point / Mohamad AfiqHakimi Rosli

Rosli, Mohamad AfiqHakimi (2019) Ehancing security and privacy in local area network with TORVPN using : raspberry pi as access point / Mohamad AfiqHakimi Rosli. Degree thesis, Universiti Teknologi Mara Perlis.

[img] Text
TD_MOHAMAD AFIQHAKIMI ROSLI CS R 19_5.pdf

Download (167kB)

Abstract

The Onion Router (Tor) service is one of the ways to surf out over the internet without being worried too much about the internet data theft and privacy of the information inside data packet. This service uses an Onion Routing technique to serve the encryption and anonymity for data packet that need to be send to the destination by bounce the data packet to several servers in another country which located inside the Tor relay. Inside Tor network, it needs at least three nodes in order to randomly bounce the data packet. These nodes were entry node, middle node, and exit node. Besides, to protect user’s data packet inside local area network, one layer of encryption was needed. Virtual Private Network (VPN) was a suitable service which will ensure the encryption for data packets in local area network. Hence, the combination of Tor and VPN service was the best creation and method that needed for a normal user to enhance its security and privacy inside local area network while surfing over the Internet. The main objective of this project is to use Tor and VPN network over a public network by implementing the Tor and VPN service inside Raspberry Pi access point. Therefore, the clients connected to Raspberry Pi access point be able to use Tor and VPN service directly without any installation and configuration. There were two experiments involved in this project. The first is the confidentiality test which to verify its privacy in keeping the information securely. The second is the performance test of the internet connectivity in terms of ping, download and upload speed while Raspberry Pi access point used Tor and VPN service and shares its connection to the client to see how the internet connectivity performance would react when Tor service changed the access point’s IP address. The results after the experiments were implemented was expected as the confidentiality tested on the Torvpn access point network showed the positive outcome by securing client’s internet data packet travel through it. Going well also is the internet connectivity test while connected to VPN and Tor service, where the internet connectivity is not enough stable when the client’s IP address changed to another IP address. Lastly, the used of combination VPN and Tor service inside local area network can be concluded that it is secure and suitable to use to secure the information as well as the data packet travel over the internet but does not suggest for user who wants a good internet connectivity.

Item Type: Thesis (Degree)
Creators:
CreatorsID Num.
Rosli, Mohamad AfiqHakimiUNSPECIFIED
Subjects: T Technology > TK Electrical engineering. Electronics. Nuclear engineering > Telecommunication > Computer networks. General works. Traffic monitoring > Intrusion detection systems (Computer security). Computer network security. Hackers
T Technology > TK Electrical engineering. Electronics. Nuclear engineering > Telecommunication > Web servers. Internet > Internet access. Internet access control
Divisions: Universiti Teknologi MARA, Perlis > Arau Campus > Faculty of Computer and Mathematical Sciences (R)
Item ID: 26068
Uncontrolled Keywords: internet connectivity : information securely ; network
Last Modified: 09 Oct 2019 04:36
Depositing User: Perpustakaan Dato' Jaafar Hassan UiTM Cawangan Perlis
URI: http://ir.uitm.edu.my/id/eprint/26068

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year