few studies compare the performance of WireGuard
and L2TP/IPSec when integrated with DNS Sinkhole
on Raspberry Pi. This research addresses that gap by
developing a VPN prototype with a GUI, DNS
Sinkhole, and SIEM (Wazuh stack) integration,
aimed at delivering a secure, user-friendly
environment with parental control features.
Raspberry Pi was chosen for its compact size, low
power usage, and adequate performance, supported
by a large community and hardware availability
(Taib, 2020). The result is a practical, low-cost, and
flexible solution that supports future development
and broad accessibility.
Several comparative studies of commercial VPN
services have also highlighted this limitation. For
instance, Turki (2024) and Chapman (2023)
emphasize that while many VPN providers focus
primarily on tunneling protocols and speed
optimization, they rarely integrate advanced
protective features such as DNS filtering, malware
blocking, or parental controls. Similarly, Dekker and
Spaans (2020) demonstrated that the majority of
widely used VPN solutions—including OpenVPN
and IPSec- based services—prioritize connectivity
and performance rather than comprehensive security
mechanisms. This indicates that the current
commercial VPN ecosystem remains insufficient in
addressing evolving cyber threats, thereby justifying
the need for research on VPN prototypes that
incorporate additional protective layers such as DNS
sinkholes and SIEM integration.
2 METHODOLOGY
The object of this research is to implement VPN
WireGuard, L2TP/IPSec, and DNS Sinkhole on a
Raspberry Pi. The analysis will be carried out based
on Quality of Service (QoS) parameters, which
include bandwidth, delay, jitter, packet loss, and
throughput. In addition, an analysis will be conducted
on the resource usage in the prototype, resulting in the
minimum requirements for this prototype. This
research utilizes the System Development Life Cycle
(SDLC) waterfall, which aligns with the requirements
for developing this prototype. This method consists
of the Planning, Analysis, Design, and
Implementation stages. In this model, each stage must
be completed before proceeding to the next stage. The
advantages gained through this model involve
gradual and systematic system development,
resulting in a sound system with a minimal number of
errors. In addition, the resulting documentation will
be well-organised. The following is an explanation of
each stage in the waterfall approach.
In this study, a modified version of the classical
SDLC waterfall model was applied to accommodate
the iterative nature of system prototyping. While the
traditional waterfall method progresses strictly in
sequential phases—planning, analysis, design,
implementation, and testing—the modified approach
used here incorporates feedback loops at each stage.
For example, after the implementation stage, results
from unit and integration testing were used to refine
the design and adjust system requirements, thereby
reducing the risk of critical errors being identified
only at later stages.
This adjustment is particularly relevant for
research involving network security systems, where
rapid changes in configuration and performance
validation are necessary. Similar adaptations of the
waterfall method have been employed in networking
and security projects to balance the benefits of
structured documentation with the flexibility of
iterative refinement (Marta et al., 2019). Compared
with agile methods, the modified waterfall model
ensures comprehensive documentation and
systematic progression while still allowing backward
transitions to improve the prototype. Thus, the chosen
methodology provides both rigor and adaptability,
aligning well with the objectives of developing a
secure and stable VPN prototype on Raspberry Pi.
2.1 Planning Stage
The System Development Life Cycle (SDLC) begins
with the planning stage, which aims to define the
purpose of system development and how it will be
carried out. This stage consists of two main steps. The
first is project initiation, which determines the
direction of the research by identifying the system's
benefits and needs. At this stage, a literature review is
conducted on key technologies relevant to the study,
such as the WireGuard VPN protocol, L2TP/IPSec,
DNS Sinkhole, and the Raspberry Pi device. The
gathered information is then compared with the
technical specifications of the Raspberry Pi to assess
its feasibility for implementation. The second step is
research planning, which involves preparing research
elements, including ideas, background, problem
formulation, system overview, and the sequential
steps to be taken during the development process.
2.2 Analysis Stage
The analysis stage focuses on identifying system
users, core functionalities, and operational contexts