Analysis of the Role and Challenges of Network Security in Wireless Sensor Networks (WSN)
Keywords:
Wireless Sensor Networks, network security, security protocol, security threat, energy efficiencyAbstract
A Wireless Sensor Network (WSN) is a wireless communication network consisting of a number of small sensors used to collect, transmit, and detect information from the surrounding environment. WSNs are very important in various fields, including industry, security, healthcare, and environmental monitoring. WSNs are very vulnerable to various security risks, including data tampering, eavesdropping, and denial-of-service (DoS) attacks, due to their open nature and limited energy, memory, and processing capabilities. Therefore, network security is a critical component in WSN implementation. The purpose of this study is to examine how network security contributes to the confidentiality, availability, and integrity of data in WSNs.and to identify the main obstacles in implementing effective and reliable security measures. Through a review of various scientific sources, such as journals, conferences, and network security standards, a descriptive qualitative research methodology is used. The effectiveness and limitations of several security protocols developed for WSNs, including TinySec, SPINS, and LEAP, in addressing security issues, are examined. According to the analysis, current security protocols can offer basic defense against frequent attacks, but still have serious problems related to scalability, energy savings, and adaptation to changing network conditions. In addition, there is a discrepancy between the resource limitations of sensor nodes and the need for high-level security. Adaptive security strategies are needed that can balance data protection and efficient resource use in WSNs. The development of lightweight encryption algorithms, efficient key management, and artificial intelligence-based attack detection systems can be further research directions in improving WSN network security in the future.
Downloads
References
[1] S. Safiuddin and F. P. E. Putra, “Strategi Efisiensi Wireless Sensor Network (WSN),” INFORMATICS FOR EDUCATORS AND PROFESSIONAL : Journal of Informatics, vol. 8, no. 1, p. 52, Jul. 2023, doi: 10.51211/itbi.v8i1.2441.
[2] B. Herdiana, E. B. Setiawan, and U. Sartoyo, “Tinjauan Komprehensif Evolusi, Aplikasi, dan Tren Masa Depan Programmable Logic Controllers (A Comprehensive Review of the Evolution, Applications, and Future Trends of Programmable Logic Controllers),” Telekontran : Jurnal Ilmiah Telekomunikasi, Kendali dan Elektronika Terapan, vol. 11, no. 2, pp. 173–193, Jul. 2024, doi: 10.34010/telekontran.v11i2.12896.
[3] M. R, Y. Fahdillah, M. Kadar, I. Hassandi, and M. R, “Implementasi Transformasi Digital dan Kecerdasan Buatan Sebagai Inovasi Untuk UMKM pada Era Revolusi Industri 4.0,” Jurnal Ilmiah Manajemen dan Kewirausahaan (JUMANAGE), vol. 3, no. 1, Jan. 2024, doi: 10.33998/jumanage.2024.3.1.1552.
[4] N. I. Putri, “Deep Learning Dan Teknologi Big Data Untuk Keamanan IOT,” COMPUTING| Jurnal Informatika, vol. 7, no. 1, pp. 48–73, 2020, doi: https://doi.org/10.55222/computing.v7i1.555.
[5] M. A. Santiko, D. Eridani, and A. F. Rochim, “Komunikasi Long Range dan Gateway dalam Penerimaan Data Multi-Node Sensor pada Sistem Monitoring. Jurnal Teknik Komputer, 2(1), 16-20.,” Jurnal Teknik Komputer, vol. 2, no. 1, pp. 16–20, 2023, doi: https://doi.org/10.14710/jtk.v2i1.38003.
[6] A. Pratama, A. N. Amrita, and D. C. Khrisne, “Rancang Bangun Sistem Monitoring Listrik Tiga Fasa Berbasis Wireless Sensor Network Menggunakan LoRa Ra-02 SX1278,” Majalah Ilmiah Teknologi Elektro, vol. 20, no. 2, pp. 351–360, 2021, doi: doi.org/10.24843/MITE.2021.v20i02.P20.
[7] F. P. E. Putra, M. Riski, M. S. Yahya, and M. H. Ramadhan, “Mengenal Teknologi Jaringan Nirkabel Terbaru Teknologi 5G,” Jurnal Sistim Informasi dan Teknologi, pp. 167–174, 2023, doi: https://doi.org/10.37034/jsisfotek.v5i2.233.
[8] N. F. R. Hutabarat, R. Sirait, and D. H. S. Napitu, “Analisa Unjuk Kerja nRF24l01 Pada Komunikasi Multi Hop Dengan Database Lokal,” Teknologi Rekayasa Jaringan Telekomunikasi, vol. 1, no. 2, pp. 97–106, 2021, doi: https://doi.org/10.51510/trekritel.v1i1.___.
[9] B. H. Maay and I. R. Widiasari, “ANALISIS PERFORMA WIRELESS SENSOR NETWORK DENGAN PROTOKOL MULTI HOP DAN SINGLE HOP,” JIPI (Jurnal Ilmiah Penelitian dan Pembelajaran Informatika), vol. 9, no. 3, pp. 1112–1122, Aug. 2024, doi: 10.29100/jipi.v9i3.4917.
[10] F. Rahmansyah and P. Murdiyat, “Rancang Bangun Sistem Monitoring Pertanian Cerdas Berbasis LoRa Untuk Pemantauan Kondisi Persawahan Secara Real-Time,” PoliGrid, vol. 6, no. 1, 2025, doi: https://doi.org/10.46964/poligrid.v6i1.62.
[11] Z. Setiawan, A. Hiswara, and H. N. Muthmainah, “Mengoptimalkan jaringan sensor nirkabel dalam aplikasi monitor lingkungan dengan teknologi iot di indonesia,” Jurnal Multidisiplin West Science, vol. 2, no. 10, pp. 858–867, 2023, doi: https://doi.org/10.58812/jmws.v4i09.
[12] M. S. Gitakarma, K. U. Ariawan, and I. G. M. S. B. Pracasitaram, “Peran Mikrokontroler Dalam Pengembangan Aplikasi IoT: Tinjauan Konseptual dan Implementasi,” KOMTEKS, vol. 3, no. 2, pp. 18–24, Jan. 2025, doi: 10.37637/komteks.v3i2.2231.
[13] Putra.F.P.E, S. M. Dewi, maugfiroh, and A. Hamzah, “Privasi dan Keamanan Penerapan IoT Dalam Kehidupan Sehari-Hari : Tantangan dan Implikasi,” Jurnal Sistim Informasi dan Teknologi, pp. 26–32, 2023, doi: https://doi.org/10.37034/jsisfotek.v5i2.232.
[14] M. Ilham, F. Adiansyah, and Isa Faqihanuddin Hanif, “ARSITEKTUR SISTEM TERDISTRIBUSI UNTUK ENTERPRISE: MODEL DESAIN DAN IMPLEMENTASI,” Jurnal Rekayasa Sistem Informasi dan Teknologi, vol. 2, no. 4, pp. 1344–1451, May 2025, doi: 10.70248/jrsit.v2i4.2361.
[15] F. P. Eka Putra, . S., A. Ramadhani, and . M., “Integrasi Teknologi Kuantum dan fiber Optik untuk Meningkatkan Keamanan dan Efisiensi Jaringan Masa Depan,” Jurnal Ilmiah ILKOMINFO - Ilmu Komputer & Informatika, vol. 8, no. 2, pp. 151–163, Jul. 2025, doi: 10.47324/ilkominfo.v8i2.342.
[16] B. Wahyudi, Muhammad Danu, Fahrurrozi Mawasandi, Zakaria Nur Aziz, and M. Fahrul Ghifari Rosyadi, “Transformasi Manajemen Rantai Pasokan Berbasis Internet of Things (IoT): Tinjauan Literatur,” Jurnal Teknologi dan Manajemen Industri Terapan, vol. 4, no. I, pp. 32–44, Mar. 2025, doi: 10.55826/jtmit.v4iI.535.
[17] D. G. Putra, “Peningkatan kinerja bisnis melalui integrasi Internet of Things (IoT) pada supply chain management (SCM),” Jurnal Marketing, vol. 5, no. 2, pp. 379–387, 2024, Accessed: Oct. 22, 2025. [Online]. Available: http://ojs.stiepi.ac.id/index.php/Marketing/article/view/171/108
[18] Muhammad Zidhan Augestri, Achmad Fauzi, Aqila Naima Khairunnisa, Dyah Ayu Siti Sundari, Revi Arnan, and Yeremia Todo Sihombing, “Penerapan Teknologi IoT dalam Optimalisasi Rantai Pasok Industri Logistik,” Jurnal Manajemen dan Pemasaran Digital, vol. 3, no. 2, pp. 158–173, Jun. 2025, doi: 10.38035/jmpd.v3i2.388.
[19] F. P. E. Putra, A. Baidawi, and A. A. Mubarok, “Merancang Jaringan Sensor Nirkabel dan IoT untuk Kota Pintar Pamekasan,” Jurnal Informasi dan Teknologi, vol. 5, no. 2, pp. 138–145, 2023, doi: doi:10.37034/jidt.v5i1.331.
[20] F. P. E. Putra, M. A. Mahmud, and I. S. Maqom, “Pengembangan Sistem Pemantauan Lingkungan Berbasis Internet of Things (IoT) di Kampus,” Digit. Transform, vol. 3, no. 2, pp. 996–1001, 2023, doi: https://doi.org/10.47709/digitech.v3i2.3457.
[21] A. Leto, “Serverless Computing: Kajian Literatur untuk Memahami Arsitektur dan Implikasinya di Era Cloud Computing,” Integrative Perspectives of Social and Science Journal, vol. 2, no. 2, pp. 2236–2247, Apr. 2025, Accessed: Oct. 22, 2025. [Online]. Available: https://ipssj.com/index.php/ojs/article/view/312/295
[22] A. Herwanto, “Peluang Bisnis Baru Di Industri 5.0 Dengan IoT, AI, Dan Cloud Computing,” Jurnal Informasi dan Teknologi, vol. 2, no. 1, pp. 24–31, 2025, Accessed: Oct. 22, 2025. [Online]. Available: https://pustakailmiah.web.id/index.php/jitu/article/view/115
[23] B. Rusandi, “Penerapan Digitalisasi Camera Analytic Guna Meningkatkan Tingkat Kepatuhan Driver Dan Menurunkan Tingkat Kecelakaan Dump Truck (DT) Di Jalan Hauling Batubara PT. XYZ,” JURNAL BISNIS DAN PEMBANGUNAN, vol. 14, no. 1, pp. 1–9, 2025, doi: https://doi.org/10.20527/jbp.1414i1.63.
[24] F. P. E. Putra, F. Muslim, N. Hasanah, R. Paradina, and R. Alim, “Analisis Komparasi Protokol Websocket dan MQTT Dalam Proses Push Notificatio,” Jurnal Sistim Informasi dan Teknologi, pp. 63–72, 2023, doi: https://doi.org/10.60083/jsisfotek.v5i4.325.
[25] R. Astarina, L. A. S. I. Akbar, and D. F. Budiman, “IMPLEMENTASI ROUTING STATIC MULTI HOP PADA PERANGKAT LORA,” Jurnal Informatika dan Teknik Elektro Terapan, vol. 12, no. 3, 2024, doi: https://doi.org/10.23960/jitet.v12i3.5228.
[26] F. P. Eka Putra, Ach. M. Ubaidillah Solichin, Moh. N. Wildanul Hakim, and M. T. Ramadhan, “Pemanfaatan Teknologi Wireless dan Mobile Network Berbasis 5G Untuk Pemerataan Akses Jaringan di Indonesia,” Infotek: Jurnal Informatika dan Teknologi, vol. 8, no. 2, pp. 415–425, Jul. 2025, doi: 10.29408/jit.v8i2.30559.
[27] F. P. E. Putra, D. A. Siswoyo, M. I. A. Yaqin, and R. Oktavia, “Tinjauan Regulasi Siber dan Kebijakan Keamanan Jaringan 5G,” Perspektif Nasional dan Internasional, 2025, doi: DOI:10.55606/jitek.v5i1.6141.
[28] F. P. E. Putra and N. Saadah, “Interaktif dan Personalisasi Peningkatan Pembelajaran IoT di Sekolah,” Jurnal Sistim Informasi dan Teknologi, pp. 175–181, 2023, doi: https://doi.org/10.37034/jsisfotek.v5i2.236.
[29] Z. Setiawan, A. Hiswara, and H. N. Muthmainah, “Mengoptimalkan jaringan sensor nirkabel dalam aplikasi monitor lingkungan dengan teknologi iot di indonesia,” Jurnal Multidisiplin West Science, vol. 2, no. 10, pp. 858–867, 2023, doi: https://doi.org/10.58812/jmws.v4i09.
[30] R. D. Prasetia and I. R. Widiasari, “Perancangan IoT Monitoring Lingkungan Berbasis Wireless Sensor Network (WSN) Dengan Menerapkan Multi Sensor Network (MSN),” JIPI (Jurnal Ilmiah Penelitian dan Pembelajaran Informatika), vol. 10, no. 1, pp. 652–666, 2025.
[31] R. SUSANA, F. HADIATNA, and A. GUSMANTINI, “Sistem Multihop Jaringan Sensor Nirkabel pada Media Transmisi Wi-Fi,” ELKOMIKA: Jurnal Teknik Energi Elektrik, Teknik Telekomunikasi, & Teknik Elektronika, vol. 9, no. 1, p. 232, Jan. 2021, doi: 10.26760/elkomika.v9i1.232.
[32] F. H. E. Ratuloli, A. S. Budi, and A. Bhawiyuga, “Implementasi Skema Anti-Collision Menggunakan Metode TDMA dan TPSN pada Sistem WSN Berbasis LoRa,” Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer, vol. 5, no. 1, pp. 283–290, 2021.
[33] H. Subagiyo, R. Rhamadani, and R. T. Wahyuni, “Penghematan Daya Pada Sensor Node Sistem Monitoring Kualitas Udara,” IJEIS (Indonesian Journal of Electronics and Instrumentation Systems), vol. 13, no. 2, Oct. 2023, doi: 10.22146/ijeis.81886.
[34] J. A. Prabowo and H. Dhika, “SAFE ROUTING MODEL AND BALANCED LOAD MODEL FOR WIRELESS SENSOR NETWORK,” Cyberspace: Jurnal Pendidikan Teknologi Informasi, vol. 5, no. 1, p. 44, Mar. 2021, doi: 10.22373/cj.v5i1.8420.
[35] Ade Irawan, Wildan Hamzah Nur Fadholi, Zahwa Erikamaretha, and Fried Sinlae, “Tantangan dan Strategi Manajemen Keamanan Siber di Indonesia berbasis IoT,” JOURNAL ZETROEM, vol. 6, no. 1, pp. 114–119, Apr. 2024, doi: 10.36526/ztr.v6i1.3376.
[36] A. Irfan, A. Z. Nusri, Z. Rachmat, and S. Wulandari, “Analisis Keamanan Jaringan Nirkabel Menggunakan Wireless Intrusion Detection System (WIDS),” Jurnal Ilmiah Sistem Informasi dan Teknik Informatika (JISTI), vol. 7, no. 1, pp. 110–119, Apr. 2024, doi: 10.57093/jisti.v7i1.195.
[37] M. O. Hoshmand and S. Ratnawati, “ Analisis keamanan infrastruktur teknologi informasi dalam menghadapi ancaman cybersecurity,” Jurnal Sains Dan Teknologi, vol. 5, no. 2, pp. 679–686, 2023.
[38] Y. Yanti, T. Hidayat, and D. Wahyudi, “Sistem Keamanan Data Privacy Pada Jaringan Sensor Nirkabel Menggunakan Teknik Routing,” SMARTICS Journal, doi: 10.21067/smartics.v10i1.9186.
[39] R. P. Simanjuntak and R. R. M. Sijabat, “Meningkatkan Keamanan Siber dalam Lingkungan Internet of Things (IoT) dengan Menggunakan Sistem Deteksi Intrusi Berbasis Pembelajaran Mesin,” DIKE : Jurnal Ilmu Multidisiplin, vol. 2, no. 2, pp. 62–68, Aug. 2024, doi: 10.69688/dike.v2i2.106.
[40] T. Yuliswar, I. Elfitri, and O. W purbo, “Optimization of Intrusion Detection System with Machine Learning for Detecting Distributed Attacks on Server,” INOVTEK Polbeng - Seri Informatika, vol. 10, no. 1, pp. 367–376, Feb. 2025, doi: 10.35314/vem9da98.
[41] W. Soetrisno, W. Y. Azhar, A. B. Purba, A. Hilman, V. A. Lestari, and A. N. Mutawally, “Meningkatkan Keamanan dan Mitigasi pada Arsitektur Software Defined Network,” Jurnal Interkom: Jurnal Publikasi Ilmiah Bidang Teknologi Informasi dan Komunikasi, vol. 20, no. 1, pp. 18–28, 2025.
[42] T. G. Laksana and S. Mulyani, “PENGETAHUAN DASAR IDENTIFIKASI DINI DETEKSI SERANGAN KEJAHATAN SIBER UNTUK MENCEGAH PEMBOBOLAN DATA PERUSAHAAN,” Jurnal Ilmiah Multidisiplin, vol. 3, no. 01, pp. 109–122, Jan. 2024, doi: 10.56127/jukim.v3i01.1143.
[43] P. C. Lumbanraja and P. L. Lumbanraja, “ Tinjauan Sistematis: Transformasi Pelayanan Metrologi di Era Digital (Metrologi Digital4. 0). ,” Cendekia Niaga, vol. 8, no. 2, pp. 119–133, 2024, Accessed: Oct. 22, 2025. [Online]. Available: https://jurnal.kemendag.go.id/index.php/JCN/article/view/912/422
[44] “Implementasi Algoritme SPECK pada Wireless Sensor Network menggunakan Media Pengiriman Data nRF24L01,” Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer, vol. 6, no. 5, pp. 2079–2086, [Online]. Available: https://j-ptiik.ub.ac.id/index.php/j-ptiik/article/view/10978
[45] H. Hadiwiyatno, S. Wirayoga, I. I. A. Habibi, and M. Huda, “Implementasi Keamanan Jaringan Nirkabel Menggunakan Proteksi Paket Header untuk Meningkatkan Integritas Data di Greenhouse,” Jurnal Penelitian Inovatif, vol. 4, no. 4, pp. 2289–2296, Nov. 2024, doi: 10.54082/jupin.777.
[46] W. Najib, S. Sulistyo, and Widyawan, “Tinjauan Ancaman dan Solusi Keamanan pada Teknologi Internet of Things,” Jurnal Nasional Teknik Elektro dan Teknologi Informasi, vol. 9, no. 4, pp. 375–384, Dec. 2020, doi: 10.22146/jnteti.v9i4.539.
[47] G. P. Suri, A. L. Fernandes, and L. A. Nopa, “Peran IoT dalam transformasi jaringan multimedia: Tinjauan literatur,” Jurnal Responsive Teknik Informatika, vol. 8, no. 2, pp. 78–86, 2024, doi: https://doi.org/10.36352/jr.v8i02.999.
[48] I. Sitanggang, J. A. I. Damanik, F. Hutabarat, and A. Sagala, “Implementation of Wireless Sensor Network (WSN) for Earthquake Detection,” ELKHA, vol. 14, no. 2, p. 102, Oct. 2022, doi: 10.26418/elkha.v14i2.56146.
[49] M. Khaddafi, A. F. Nasution, N. A. Angkat, and S. Pitriyani, “ PERAN METODOLOGI PENELITIAN DALAM MENENTUKAN KUALITAS HASIL PENELITIAN ILMIAH,” Jurnal Intelek Insan Cendikia, vol. 2, no. 7, pp. 13250–13255, 2025, Accessed: Oct. 22, 2025. [Online]. Available: https://jicnusantara.com/index.php/jiic/article/view/4315/4361
[50] A. Djimli, S. Merniz, and S. Harous, “Energy-efficient MAC protocols for wireless sensor networks: a survey,” TELKOMNIKA (Telecommunication Computing Electronics and Control), vol. 17, no. 5, p. 2301, Oct. 2019, doi: 10.12928/telkomnika.v17i5.12163.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Habiburrahman, Ubaidillah Hamdi Putra Pratama (Penulis)

This work is licensed under a Creative Commons Attribution 4.0 International License.








