Implementation of VPN (Virtual Private Network) for Communication Security Between IoT Devices on Smart Home Networks
Keywords:
Internet of Things, Smart Home, Virtual Private Network, WireGuard, Network SecurityAbstract
The development of Internet of Things (IoT) technology has led to the creation of Smart Home systems that are capable of connecting various smart devices through the internet network. However, this increase in connectivity poses a high security risk due to the potential for interception and cyber attacks on communication data between devices. Therefore, an efficient security solution is needed to maintain data confidentiality and integrity. This study aims to analyze the effectiveness of implementing a Virtual Private Network (VPN) as a security mechanism for communication between IoT devices on a Smart Home network, as well as to assess its impact on network performance. The research uses a quantitative experimental approach by conducting tests on two conditions, namely a network without VPN and with VPN using the OpenVPN and WireGuard protocols. The parameters measured include latency, throughput, packet loss, and data security levels through sniffing analysis and intrusion detection. The results show that the implementation of VPN significantly improves communication security by encrypting all data, reducing the number of open ports, and preventing illegal access. Although there was an increase in latency of 27–45% and a decrease in throughput of around 7–12%, network performance remained stable.
The WireGuard protocol has been proven to be more efficient than OpenVPN in terms of resource usage and connection stability. VPNs are effectively implemented as the primary security layer in Smart Home systems, providing strong data protection without significantly compromising network performance. Further research is recommended to integrate VPNs with Edge Computing and Software Defined Networking to improve system efficiency and scalability.
Downloads
References
REFERENSI
[1] F. P. E. Putra, Y. Setiawan, S. Arifin, and W. Hidayatullah, “Peran VPN dalam Menjaga Privasi Pengguna Jaringan Pub-lik,” 2025, researchgate.net. [Online]. Available: https://www.researchgate.net/profile/Fauzan-Eka-Putra-2/publication/392420576_Peran_VPN_dalam_Menjaga_Privasi_Pengguna_Jaringan_Publik/links/6848fa048a76251f22ecfd24/Peran-VPN-dalam-Menjaga-Privasi-Pengguna-Jaringan-Publik.pdf
[2] F. P. E. Putra, S. R. Sutarsih, S. Sofiyulloh, and ..., “Optimalisasi Perancangan Aplikasi Manajemen Data Koloman, Di Desa Pulau Mandangin Sampang–Madura Berbasis Website,” 2024, jurnal.univrab.ac.id. [Online]. Available: https://jurnal.univrab.ac.id/index.php/rabit/article/download/4840/1965
[3] F. P. E. Putra and A. Ramadhani, “Integrasi Teknologi Kuantum dan fiber Optik untuk Meningkatkan Keamanan dan Efisiensi Jaringan Masa Depan,” J. Ilm. Ilk. …, 2025, [Online]. Available: http://j-ilkominfo.org/index.php/ejournalaikom/article/view/342
[4] F. P. E. Putra, N. D. Saputri, F. Rosi, and R. Loati, “Optimalisasi Infrastruktur Cloud Networking melalui Inte-grasi SDN, NFV, dan Multi-Cloud,” 2025, researchgate.net. [Online]. Available: https://www.researchgate.net/profile/Fauzan-Eka-Putra-2/publication/392411211_Optimalisasi_Infrastruktur_Cloud_Networking_melalui_Integrasi_SDN_NFV_dan_Multi-Cloud/links/6848f8b9df0e3f544f5e49f2/Optimalisasi-Infrastruktur-Cloud-Networking-melalui-Integras
[5] F. P. E. Putra, M. Ghummah, M. Amrullah, and R. Hidayatullah, “Studi Kinerja Mesh Network untuk Penerapan Internet of Things (IoT) di Lingkungan Perkotaan,” 2025, researchgate.net.
[6] F. P. E. Putra, M. Riski, M. S. Yahya, and ..., “Mengenal Teknologi Jaringan Nirkabel Terbaru Teknologi 5G,” J. Sistim Inf. …, 2023, [Online]. Available: http://www.jsisfotek.org/index.php/JSisfotek/article/view/233
[7] F. P. Eka Putra, Amir Hamzah, W. Agel, and R. O. Firmansyah Kusuma, “Impelementasi Sistem Keamanan Jaringan Mikrotik Menggunakan Firewall Filtering dan Port Knocking,” J. Sistim Inf. dan Teknol., pp. 82–87, 2024, doi: 10.60083/jsisfotek.v5i4.329.
[8] N. Haidar Hari, F. P. Eka Putra, U. Hasanah, S. R. Sutarsih, and Riyan, “Transformasi Jaringan Telekomunikasi dengan Teknologi 5G: Tantangan, Potensi, dan Implikasi,” J. Inf. dan Teknol., pp. 146–150, 2023, doi: 10.37034/jidt.v5i2.357.
[9] A. Zulfikri, F. P. E. Putra, M. A. Huda, H. Hasbullah, M. Mahendra, and M. Surur, “Analisis Keamanan Jaringan Dari Serangan Malware Menggunakan Filtering Firewall Dengan Port Blocking,” 2023. doi: 10.47709/digitech.v3i2.3379.
[10] S. Safiuddin and F. P. E. Putra, “Strategi Efisiensi Wireless Sensor Network (WSN),” INFORMATICS Educ. …, 2023, [Online]. Available: http://101.255.92.196/index.php/ITBI/article/view/2441
[11] F. P. E. Putra, D. E. Arissandi, A. Rofiqi, and M. F. Hidayat, “Pemanfaatan Mikrotik Dalam Manajemen Bandwidth Pada Jaringan Sekolah,” 2025, researchgate.net. [Online]. Available: https://www.researchgate.net/profile/Fauzan-Eka-Putra-2/publication/392420575_Pemanfaatan_Mikrotik_Dalam_Manajemen_Bandwidth_Pada_Jaringan_Sekolah/links/6848fab46b5a287c304a61ca/Pemanfaatan-Mikrotik-Dalam-Manajemen-Bandwidth-Pada-Jaringan-Sekolah.pdf
[12] L. Kaur and R. Kaur, “Fog-Based Energy Efficient Routing Protocol for Smart Building Evacuations,” Wirel. Pers. Commun., vol. 139, no. 1, pp. 543–571, 2024, doi: 10.1007/s11277-024-11637-8.
[13] U. Nath, S. Banerjee, C. Santini, R. Citroni, F. Mangini, and F. Frezza, “Simple and Cost-Effective Design of a THz-Metamaterial-Based Hybrid Sensor on a Single Substrate,” Sensors, vol. 25, no. 12, 2025, doi: 10.3390/s25123660.
[14] J. Maeng, I. Park, J. Jeon, H. Kim, H. Lee, and C. Kim, “A Tri-Mode Reconfigurable DC-DC Converter With Photovoltaic Energy Harvesting for Miniature IoT Batteries,” IEEE Trans. Circuits Syst. II Express Briefs, vol. 71, no. 12, pp. 4844–4848, 2024, doi: 10.1109/TCSII.2024.3437449.
[15] M. Guri, “AIR-FI: Leaking Data From Air-Gapped Computers Using Wi-Fi Frequencies,” IEEE Trans. Dependable Secur. Comput., vol. 20, no. 3, pp. 2547–2564, 2023, doi: 10.1109/TDSC.2022.3186627.
[16] S. A. Murad and N. Rahimi, “Secure and Efficient Hierarchical P2P Fog Architecture: A Novel Approach for IoT,” IEEE Internet Things J., vol. 11, no. 10, pp. 18796–18807, 2024, doi: 10.1109/JIOT.2024.3365071.
[17] A. Wasay Mudasser and S. A. Ahmed Abdul Gafoor, “Secure Internet of Things based hybrid optimization techniques for optimal centroid routing protocol in wireless sensor network,” Concurr. Comput. Pract. Exp., vol. 35, no. 6, p. 1, 2023, doi: 10.1002/cpe.7585.
[18] N. T. Mahmoud, R. Shaltaf, M. Alyami, M. Alshaaer, and R. Habib, “Ab initio stability to efficiency study of SrGeO3 perovskite,” MRS Energy Sustain. - A Rev. J., vol. 11, no. 2, pp. 647–658, 2024, doi: 10.1557/s43581-024-00105-2.
[19] C. Okoh, W. N. Theophilus, P. Dawkins, and S. Paheerathan, “Enhancing Data Security Through VLSM Subnetting and TCP/IP Model in an ENT,” Appl. Sci., vol. 14, no. 23, 2024, doi: 10.3390/app142310968.
[20] J. Pennekamp et al., “An Interdisciplinary Survey on Information Flows in Supply Chains,” ACM Comput. Surv., vol. 56, no. 2, 2024, doi: 10.1145/3606693.
[21] X. Qiu, S. Zhang, Z. Wang, and H. Luo, “Integrated Host- and Content-Centric Routing for Efficient and Scalable Networking of UAV Swarm,” IEEE Trans. Mob. Comput., vol. 23, no. 4, pp. 2927–2942, 2024, doi: 10.1109/TMC.2023.3267451.
[22] Z. Fang et al., “Towards System-Level Security Analysis of IoT Using Attack Graphs,” IEEE Trans. Mob. Comput., vol. 23, no. 2, pp. 1142–1155, 2024, doi: 10.1109/TMC.2022.3231567.
[23] W. Sheng and H. Xiang, “A piezoelectric tuned mass damper for simultaneous vibration control and energy harvesting,” Smart Mater. Struct., vol. 33, no. 1, 2024, doi: 10.1088/1361-665X/ad1317.
[24] Z. Zhou et al., “iMGC: Interactive Multiple Graph Clustering With Constrained Laplacian Rank,” IEEE Trans. Human-Machine Syst., vol. 53, no. 2, pp. 427–437, 2023, doi: 10.1109/THMS.2022.3227181.
[25] S. Liu et al., “Harvesting energy from arbitrary horizontal vibration through a quad-stable magnetic rolling pendulum,” Smart Mater. Struct., vol. 34, no. 7, 2025, doi: 10.1088/1361-665X/adea24.
[26] M. B. Mandev, A. Altunkaynak, and A. Çelik, “Enhancing wave energy harvesting: Performance analysis of a dual chamber oscillating water column,” Energy, vol. 290, 2024, doi: 10.1016/j.energy.2023.130191.
[27] N. Bermad, S. Zemmoudj, L. Bouallouche-Medjkoune, and L. Khoukhi, “Pseudonym revocation system for IoT-based medical applications,” Comput. Networks, vol. 257, 2025, doi: 10.1016/j.comnet.2024.110983.
[28] D. R. D. Santos et al., “Toward Indoor Simulations of OPV Cells for Visible Light Communication and Energy Harvesting,” IEEE Access, vol. 12, pp. 41027–41041, 2024, doi: 10.1109/ACCESS.2024.3378056.
[29] T. Tao, L. Yan, W. Zhao, S. Liu, and H. Wang, “Low-Vibration Fault-Tolerant Control for Five-Phase PMSM Using Modified SVPWM and Random Modulation Strategy,” IEEE Trans. Transp. Electrif., vol. 11, no. 2, pp. 6775–6787, 2025, doi: 10.1109/TTE.2024.3516125.
[30] I. S. Lacerda et al., “Comparative Analysis of Piezoelectric Transducers for Low-Power Systems: A Focus on Vibration Energy Harvesting,” Appl. Sci., vol. 14, no. 20, 2024, doi: 10.3390/app14209451.
[31] B. V Minh, T. N. Nguyen, and L.-T. Tu, “Physical layer security in wireless sensors networks: secrecy outage probability analysis,” J. Inf. Telecommun., vol. 9, no. 1, pp. 1–23, 2025, doi: 10.1080/24751839.2024.2352961.
[32] N. Panayanthatta et al., “Electro-Mechanical Characterization and Modeling of a Broadband Piezoelectric Microgenerator Based on Lithium Niobate,” Sensors, vol. 24, no. 9, 2024, doi: 10.3390/s24092815.
[33] S. Ali, M. Nadeem, S. Ahmed, M. A. Ullah, and M. Tahir, “3D Dynamic Topology With Energy-Aware Forwarding in Underwater Acoustic Networks (MAEARS),” IEEE Access, vol. 12, pp. 129319–129329, 2024, doi: 10.1109/ACCESS.2024.3434651.
[34] M. Qaraqe et al., “PublicVision: A Secure Smart Surveillance System for Crowd Behavior Recognition,” IEEE Access, vol. 12, pp. 26474–26491, 2024, doi: 10.1109/ACCESS.2024.3366693.
[35] G. Uganya and R. M. Bommi, “New key added signature scheme for enhancement of security in IOT blockchain network,” J. Supercomput., vol. 81, no. 15, 2025, doi: 10.1007/s11227-025-07914-3.
[36] W. Villegas-Ch, J. García-Ortiz, and S. Sanchez-Viteri, “Educational Advances in the Metaverse: Boosting Learning Through Virtual and Augmented Reality and Artificial Intelligence,” IEEE Access, vol. 12, pp. 59093–59112, 2024, doi: 10.1109/ACCESS.2024.3393776.
[37] M. A. Saparin, H. Salleh, C. K. Hen, and S. N. A. Amnuruddin, “Performance of A Triboelectric Nanogenerator Utilising Coconut Husk Layer,” J. Mech. Eng., vol. 21, no. 3, pp. 123–143, 2024, doi: 10.24191/jmeche.v21i3.27350.
[38] Y. Chi, C. Lin, J. Deng, K. Ning, X. Fan, and G. Wu, “Edge Computing Underwater Optical Wireless Sensor Networks,” IEEE Trans. Mob. Comput., vol. 24, no. 11, pp. 11879–11895, 2025, doi: 10.1109/TMC.2025.3581690.
[39] S. B. Mallikarjun, M. Asif Habibi, M. DIxit, X. Costa-Pérez, M. Debbah, and H. D. Schotten, “Exploring Y1 Communications and Services in O-RAN: Background, Privacy, and Security,” IEEE Open J. Commun. Soc., vol. 6, pp. 4638–4666, 2025, doi: 10.1109/OJCOMS.2025.3572709.
[40] S. SeyedShenava, P. Zare, and I. F. Davoudkhani, “Maximizing solar energy harvesting efficiency: Optimal hybrid deep neural learning - based MPPT for Photovoltaic systems under complex partial shading conditions,” Sustain. Comput. Informatics Syst., vol. 47, 2025, doi: 10.1016/j.suscom.2025.101159.
[41] Y. Wang et al., “Multifunctional bio-aerogels realized by solvophilic phase assisted phase separation for passive radiative cooling and energy harvesting,” Chem. Eng. J., vol. 512, 2025, doi: 10.1016/j.cej.2025.162059.
[42] N. Rodday et al., “The Resource Public Key Infrastructure (RPKI): A Survey on Measurements and Future Prospects,” IEEE Trans. Netw. Serv. Manag., vol. 21, no. 2, pp. 2353–2373, 2024, doi: 10.1109/TNSM.2023.3327455.
[43] K. Psaraftis, K. S. Ntalianis, and N. E. Mastorakis, “Quality of Experience Oriented Eco-Friendly Taxi-Ride Sharing Recommendation Framework,” IEEE Access, vol. 12, pp. 155915–155942, 2024, doi: 10.1109/ACCESS.2024.3485221.
[44] W. Liu, “Pyas: Pay for Your Aggregation Service—A Privacy Preserving Aggregation Protocol of Time-series Data,” Wirel. Pers. Commun., vol. 132, no. 1, pp. 757–773, 2023, doi: 10.1007/s11277-023-10637-4.
[45] L. Zhang, Y. Du, and Z. Sun, “Modeling and Analysis of Cascading Failures in LEO Satellite Networks,” IEEE Trans. Netw. Sci. Eng., vol. 11, no. 1, pp. 807–822, 2024, doi: 10.1109/TNSE.2023.3308610.
[46] H. Alimohammadi, K. Vassiljeva, S. H. HosseinNia, and E. Petlenkov, “Bandgap Dynamics in Locally Resonant Metastructures: A General Theory of Internal Resonator Coupling,” Appl. Sci., vol. 14, no. 6, 2024, doi: 10.3390/app14062447.
[47] M. Sharmila and R. V. S. Satyanarayana, “An intelligent resource allocation strategy for machine type communication environment,” Int. J. Commun. Syst., vol. 37, no. 1, 2024, doi: 10.1002/dac.5628.
[48] A. Renaldo Maximus and S. Balaji, “Energy-Efficient Fuzzy Logic With Barnacle Mating Optimization-Based Clustering and Hybrid Optimized Cross-Layer Routing in Wireless Sensor Network,” Int. J. Commun. Syst., vol. 38, no. 5, 2025, doi: 10.1002/dac.6132.
[49] C. Wang, S. Chen, H. Hu, and X. Fan, “A distributed cluster-based routing protocol using fuzzy logic and deep reinforcement learning for wireless sensor networks,” Cluster Comput., vol. 28, no. 8, 2025, doi: 10.1007/s10586-025-05206-2.
[50] P. V Bhosale and S. D. Agashe, “Investigation and hybrid deep belief neural network-based validation of piezoelectric bimorph cantilever composites assisted with tip mass,” Noise Vib. Worldw., vol. 55, no. 1–2, pp. 3–15, 2024, doi: 10.1177/09574565231212688.
[51] J. Goedhart, “Studentsourcing—Aggregating and reusing data from a practical cell biology course,” PLOS Comput. Biol., vol. 20, no. 2, 2024, doi: 10.1371/journal.pcbi.1011836.
[52] M. D. Hussain, B. Dudem, D. I. Kutsarov, and S. R. P. Silva, “Exploring charge regeneration effect in interdigitated array electrodes-based TENGs for a more than 100-fold enhanced power density,” Nano Energy, vol. 130, 2024, doi: 10.1016/j.nanoen.2024.110112.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Agus Salim, Abdul Halim (Penulis)

This work is licensed under a Creative Commons Attribution 4.0 International License.








