Implementation And Evaluation Of Zerotier-Based Virtual Network For Device Connectivity

Authors

  • Fauzan Prasetyo Eka Putra Universitas Madura, Indonesia
  • Revi Mario Ilhamsyah Universitas Madura, Indonesia
  • Satrio Ananta Efendy Universitas Madura, Indonesia
  • Abdulloh Rizki Universitas Madura, Indonesia

DOI:

https://doi.org/10.47709/brilliance.v5i1.5966

Keywords:

ZeroTier, Virtual Network, VPN, NDLC, QoS, Remote Access, Wireshark

Abstract

The demand for adaptable, secure, and easily deployable network connectivity is increasing rapidly, driven by continuous advancements in information and communication technology. This is particularly evident in the rising adoption of cloud computing, remote work models, and the growing need for scalable and flexible virtual network infrastructures. ZeroTier emerges as an innovative solution that combines the key concepts of Virtual Private Networks (VPN), Software Defined Networking (SDN), and peer-to-peer architectures into a unified platform. This study aims to explore the operational mechanism, implementation procedure, and real-world performance of ZeroTier in enabling seamless connections between devices located across different networks and physical locations. The research methodology includes a comprehensive literature review and practical testing by creating a virtual network using ZeroTier. The evaluation focuses on connection setup, security, ease of configuration, and performance under different network scenarios. The findings reveal that ZeroTier offers a reliable, secure, and efficient virtual networking environment, capable of delivering stable communication with minimal configuration effort. Additionally, it does not require complex infrastructure or technical expertise, making it suitable for academic research, remote work environments, and small to medium-sized businesses. The results suggest that ZeroTier can be considered a viable alternative to traditional VPN solutions and physical network setups, especially in contexts that demand agility, security, and simplicity.

References

Aan Marsela, Khairil Khairil, & Hari Aspriyono. (2023). Penerapan Zerotier Dalam Membangun File Server Pada Kantor Desa Dusun Baru II Kabupaten Bengkulu Tengah. Jurnal Penelitian Rumpun Ilmu Teknik, 3(1), 111–120. https://doi.org/10.55606/juprit.v3i1.3183

Adame, T., Carrascosa, M., Bellalta, B., Pretel, I., & Etxebarria, I. (2021). Channel Load Aware AP / Extender Selection in Home WiFi Networks Using IEEE 802.11k/v. IEEE Access, 9, 30095–30112. https://doi.org/10.1109/ACCESS.2021.3059473

Agustini, O.?:, & Machdi, R. (n.d.). Analisa Implementasi Power Line Communication Sebagai Backbone Wi- Fi Extender (Agustini Rodiah Machdi) ANALISA IMPLEMENTASI POWER LINE COMMUNICATION SEBAGAI BACKBONE WI-FI EXTENDER.

Albanna, I. (2024). Implementasi NRF24L01 sebagai Perantara Komunikasi Protokol ShockBurst dan TCP-IP dalam Transmisi Basis Data IoT. Prosiding Seminar Nasional Teknik Elektro, 1.

Bajili, I., Ahmadian, H., & Aulia Syarif Aziz, dan. (n.d.). IMPLEMENTASI DAN ANALISIS KINERJA ANTENA WAJAN BOLIC SEBAGAI PENERIMA SINYAL WI-FI.

Benny Alexsius Pardosi, V., Ikhsanudin, M., & Naufal, A. (n.d.). Addressing DNS Propagation Challenges with Repurposed STBs, ZeroTier Networking, and Indonesian ISP Integration. Journal of Intelligent Systems and Information Technology, 1(2), 2024. https://jurnalapik.id/index.php/jisit

Bray, N., Boeding, M., Hempel, M., Sharif, H., Heikkilä, T., Suomalainen, M., & Seppälä, T. (2024). A Latency Composition Analysis for Telerobotic Performance Insights Across Various Network Scenarios. Future Internet, 16(12). https://doi.org/10.3390/fi16120457

Chandrasekhar, V., & Andrews, J. G. (2008). Femtocell Networks: A Survey.

Chaudhry, S. R., Liu, P., Wang, X., Cahill, V., & Collier, M. (2022). A measurement study of offloading virtual network functions to the edge. Journal of Supercomputing, 78(2), 1565–1582. https://doi.org/10.1007/s11227-021-03907-0

Chidambara Natarajan, M., Muthiah, R., & Nachiappan, A. (2010). Performance Investigation of Virtual Private Networks with Different Bandwidth Allocations. IJCSI International Journal of Computer Science Issues, 7(1).

Diponegoro, M., Yuniarto, W., Bibi, S., Elektro, J., & Negeri Pontianak, P. (2022). ELIT JOURNAL Electrotechnics And Information Technology Optimasi Kinerja Jaringan Wireless Menggunakan Repeater Berbasis Open DD-WRT Dengan Metode Drive Test Studi Kasus Pada Jaringan Internet Jurusan Teknik Elektro Politeknik Negeri Pontianak.

Faizal, M., Pratama, A., & Marcus, R. D. (2025). IMPLEMENTASI LOCAL AREA NETWORK BERBASIS CLOUD DENGAN MENGGUNAKAN ZEROTIER DAN REMOTE DESKTOP PROTOCOL PADA WINDOWS SERVER 2019 (STUDI KASUS?: PT. ESTETIKA SUKSES INDONESIA). In Jurnal Mahasiswa Teknik Informatika) (Vol. 9, Issue 1).

Fu, C., Wang, B., Liu, H., & Wang, W. (2024). Software-Defined Virtual Private Network for SD-WAN. Electronics (Switzerland), 13(13). https://doi.org/10.3390/electronics13132674

Fu, C., Wang, B., Wang, W., Mu, R., Sun, Y., Xin, G., & Zhang, Y. (2024). A Generic High-Performance Architecture for VPN Gateways. Electronics (Switzerland), 13(11). https://doi.org/10.3390/electronics13112031

Gentile, A. F., Macrì, D., de Rango, F., Tropea, M., & Greco, E. (2022). A VPN Performances Analysis of Constrained Hardware Open Source Infrastructure Deploy in IoT Environment. Future Internet, 14(9). https://doi.org/10.3390/fi14090264

Gentile, A. F., Macrì, D., Greco, E., & Fazio, P. (2024). Overlay and Virtual Private Networks Security Performances Analysis with Open Source Infrastructure Deployment. Future Internet, 16(8). https://doi.org/10.3390/fi16080283

Goethals, T., Kerkhove, D., Volckaert, B., & Turck, F. de. (2019, October 1). Scalability evaluation of VPN technologies for secure container networking. 15th International Conference on Network and Service Management, CNSM 2019. https://doi.org/10.23919/CNSM46954.2019.9012673

Hadinata, F., Prasetyo, S. E., & Haeruddin, H. (2022). Analisa Penggunaan Jaringan ZeroTier di Masa Pandemi Covid-2019. Jurnal Ilmu Komputer Dan Bisnis, 13(1), 85–93. https://doi.org/10.47927/jikb.v13i1.276

Haeruddin, H., Prasetyo, S. E., & Kaharuddin, A. W. (2024). Optimalisasi Keamanan Jaringan Di Era Digital menggunakan metode Zero Trust. Journal of Information System and Technology, 5(3), 15–24. https://doi.org/10.37253/joint.v5i3.9986

Haeruddin, H., Wijaya, G., & Khatimah, H. (2023). Sistem Keamanan Work From Anywhere Menggunakan VPN Generasi Lanjut. JITU?: Journal Informatic Technology And Communication, 7(2), 102–113. https://doi.org/10.36596/jitu.v7i2.1086

Hritcan, D. F., Graur, A., & Balan, D. (2024). Securing IoT Environments Using ZeroTier and OPNsense. Proceedings - RoEduNet IEEE International Conference. https://doi.org/10.1109/RoEduNet64292.2024.10722755

Joha, M. I., Rahman, M. M., Nazim, M. S., & Jang, Y. M. (2024). A Secure IIoT Environment That Integrates AI-Driven Real-Time Short-Term Active and Reactive Load Forecasting with Anomaly Detection: A Real-World Application. Sensors, 24(23). https://doi.org/10.3390/s24237440

Kielland, S., Esmaeily, A., Kralevska, K., & Gligoroski, D. (2022). Secure Service Implementation with Slice Isolation and WireGuard. http://arxiv.org/abs/2207.12471

Kjorveziroski, V., Bernad, C., Gilly, K., & Filiposka, S. (2024). Full-mesh VPN performance evaluation for a secure edge-cloud continuum. Software - Practice and Experience, 54(8), 1543–1564. https://doi.org/10.1002/spe.3329

Li, D., Wang, X., Jin, Y., & Liu, H. (2020). Research on QoS routing method based on NSGAII in SDN. Journal of Physics: Conference Series, 1656(1). https://doi.org/10.1088/1742-6596/1656/1/012027

Nwogugu, M. I. C. (n.d.). A Game-Theoretic Modular-Framework For New Concensus-Mechanisms In Blockchains And AI. https://www.icmagroup.org/fintech-

Oughton, E. J., Lehr, W., Katsaros, K., Selinis, I., Bubley, D., & Kusuma, J. (n.d.). Revisiting Wireless Internet Connectivity: 5G vs Wi-Fi 6.

Peer-to-Peer Communication for a Distributed EEW. (n.d.).

Penerapan, J., Informasi, T., Komunikasi, D., Maulana, A., & Sulistyo, W. (2024). IT-EXPLORE ANALISIS KUALITAS SIGNAL WIRELESS MENGGUNAKAN RECEIVED SIGNAL STRENGTH INDICATOR (RSSI) DI SMP NEGERI 10 SALATIGA.

Prasetyo, F. E., Hari, N. H., Rachman, A. F., & Kurniawan, A. A. (2024). IMPLEMENTASI NAS SERVER MENGGUNAKAN STB OPENWRT DI BALAI DESA GEDUNGAN SUMENEP. JISCOM, 3.

Putra, A. A., & -, U. (2024). IMPLEMENTASI SISTEM KENDALI JARAK JAUH DAN MANAJEMEN USER BERBASIS OPENWRT PADA JARINGAN RT/RW NET DI DESA LADEN. Jurnal Informatika Dan Teknik Elektro Terapan, 12(3S1). https://doi.org/10.23960/jitet.v12i3S1.5200

Penggunaan, A., Pada, Z., ………muhammad Bariq, J., Mukasyah, A., Bariq, M., & Yulianton, H. (n.d.). Analisa Penggunaan ZeroTier pada Jaringan RT/RW Net dengan Metode Quality of Service.

Sigit Sugiharto, Supriyanto, S., & Rozaq Isnaini Nugraha. (2024). Implementasi Android Sebagai Web Server Online Dengan Virtual Private Network. Pixel?:Jurnal Ilmiah Komputer Grafis, 17(1), 186–192. https://doi.org/10.51903/pixel.v17i1.2012

Sisco, D., Sangaji, D., & Sutabri, T. (2024). Management dan Monitoring Real Time Access User Internet Sehat Kota Prabumulih. Bit-Tech, 7(2), 474–483. https://doi.org/10.32877/bt.v7i2.1854

Suhadi, E., & Arifin, T. (2024). RANCANGAN VIRTUAL PRIVATE NETWORK PADA KANTOR PROLOV MENGGUNAKAN ZEROTIER. JIKA (Jurnal Informatika), 8(1), 66. https://doi.org/10.31000/jika.v8i1.9979

Surname, F. (n.d.). APPENDIX IV. How to deploy a distributed containerized application (DockerCoins) in a Kubernetes cluster with multiple nodes connected through a VPN. https://kubernetes.io/docs/concepts/services-networking/service/

Streun, F.?;, Wanner, J.?;, Perrig, A., Streun, F., Zurich, E., & Wanner, J. (n.d.). Evaluating Susceptibility of VPN Implementations to DoS Attacks Using Adversarial Testing Conference Paper Evaluating Susceptibility of VPN Implementations to DoS Attacks Using Adversarial Testing. https://doi.org/10.3929/ethz-b-000590561

Sharipov, G. M., Heiß, A., Bresilla, T., Nieuwenhuizen, A. T., Hemming, J., van Evert, F. K., Baron, S., Benrais, A., Avgoustakis, I., Mylonas, N., Fountas, S., Vasilaros, P., Karagiannis, P., Vidal, J., & Paraforos, D. S. (2023). Smart implements by leveraging ISOBUS: Development and evaluation of field applications. Smart Agricultural Technology, 6. https://doi.org/10.1016/j.atech.2023.100341

Sisco, D., Sangaji, D., & Sutabri, T. (2024). Management dan Monitoring Real Time Access User Internet Sehat Kota Prabumulih. Bit-Tech, 7(2), 474–483. https://doi.org/10.32877/bt.v7i2.1854

S.Sanchez_Programa_Especial_Titulacion_Titulo_Profesional_2022. (n.d.).

Sultanul Kabir, A. F. M., Razib, M., Khan, H., Ahsan, A., Haque, M. M., Saiful, M., & Mamun, I. (n.d.). WiMAX or Wi-Fi: The Best Suited Candidate Technology for Building Wireless Access Infrastructure.

Surname, F. (n.d.). APPENDIX III. How to deploy a distributed containerized application (DockerCoins) through a VPN in a manually-managed distributed cluster with multiple nodes 1. https://github.com/tailscale/tailscale.git

Ubaidi, & Puspa Dewi, N. (2023). Analisis dan Implementasi VPN pada VPS untuk Peningkatan Aksesibilitas Jaringan di Lingkungan Perguruan Tinggi. Jurnal Informasi Dan Teknologi, 131–140. https://doi.org/10.60083/jidt.v5i3.409

Weijers, F., Jensen, M., & Raab-Düsterhöft, A. (2024). Forensic strategies and methods in advanced software defined networks. Lecture Notes in Informatics (LNI), Proceedings - Series of the Gesellschaft Fur Informatik (GI), 352, 331–341. https://doi.org/10.18420/inf2024_23

Wijaya, G., Tan, T., Eko Prasetyo, S., & Pho, S. (2024). Analisis Perbandingan VPN Tunnel antara ngrok Edge Cloud vs Public IP Address menggunakan Open VPN. 4(1). https://journal.uib.ac.id/index.php/combines

Zohaib, S. M., Sajjad, S. M., Iqbal, Z., Yousaf, M., Haseeb, M., & Muhammad, Z. (2024). Zero Trust VPN (ZT-VPN): A Systematic Literature Review and Cybersecurity Framework for Hybrid and Remote Work. Information (Switzerland), 15(11). https://doi.org/10.3390/info15110734

Downloads

Published

2025-06-25

How to Cite

Putra, F. P. E., Ilhamsyah, R. M., Efendy, S. A., & Rizki, A. (2025). Implementation And Evaluation Of Zerotier-Based Virtual Network For Device Connectivity. Brilliance: Research of Artificial Intelligence, 5(1), 281–290. https://doi.org/10.47709/brilliance.v5i1.5966

Most read articles by the same author(s)

1 2 > >> 

Similar Articles

<< < 1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.