1 Department of Electronics and Information Technology, Faculty of Engineering, Universitas Negeri Makassar, Makassar, Indonesia.
2 Department of Chemistry, Faculty of Mathematical and sciences, Universitas Negeri Makassar, Makassar, Indonesia.
World Journal of Advanced Engineering Technology and Sciences, 2025, 17(02), 488–495
Article DOI: 10.30574/wjaets.2025.17.2.1527
Received 15 October 2025; revised on 25 November 2025; accepted on 28 November 2025
Campus Wi-Fi networks remain vulnerable to man-in-the-middle (MITM) attacks due to outdated protocols, weak configurations, and low user awareness. This study evaluated the Wi-Fi security posture at the Faculty of Engineering, Universitas Negeri Makassar (UNM) using penetration testing, controlled MITM simulations, and a cybersecurity awareness survey (N = 120). Results showed that 70% of access points (APs) used insecure or misconfigured settings, enabling high MITM success in ARP spoofing, DNS spoofing, and SSL stripping. Student awareness was low, with only 28% understanding MITM and 18% routinely using VPNs. A multilayer security architecture integrating WPA3, VPN tunneling, VLAN segmentation, and Snort-based IDS reduced MITM success by 78% and achieved 92% detection accuracy. These findings highlight the importance of integrated defenses and continuous user education.
Man-in-the-middle; Securing Campus wi-fi; Penetration testing; Multilayer defense
Get Your e Certificate of Publication using below link
Preview Article PDF
Faisal Syafar, Halimah Husain and Ganggang Canggi Arnanto. Securing Campus Wi-Fi Against MITM Attacks: Penetration testing, student awareness and a multilayer defense model. World Journal of Advanced Engineering Technology and Sciences, 2025, 17(02), 488-495. Article DOI: https://doi.org/10.30574/wjaets.2025.17.2.1527.