Integration of ESP32-Based Wireless Sensor Network with 5G Connectivity for Real-Time Environmental Monitoring

Authors

  • Kukuh Dwi Nur Cahyo Author
  • M.Febri Dwidanasaputra Author
  • Kevin Ananda Puryanto Pratama Author

Keywords:

Keywords: Wireless Sensor Network, ESP32, 5G Network, Environmental Monitoring, Internet of Things.

Abstract

The development of the Internet of Things (IoT) has driven the use of Wireless Sensor Networks (WSN) for environmental monitoring. However, conventional WSNs still face limitations in terms of latency, reliability, and network scalability, especially for real-time applications. 5G technology offers low latency, high throughput, and massive connectivity, which has the potential to improve the performance of WSN-based environmental monitoring systems. This study aims to design and evaluate the integration of ESP32-based WSN with 5G connectivity in supporting real-time environmental monitoring systems, particularly in terms of network performance, energy efficiency, and monitoring system performance. This study uses an experimental method with a quantitative study approach. The system is designed in the form of a prototype consisting of an ESP32 sensor node, a 5G gateway, and a web-based monitoring server. Testing was conducted by measuring end-to-end latency, throughput, packet loss, sensor node energy consumption, and monitoring system response parameters. The test results showed that the system was able to transmit sensor data stably with low latency and consistent throughput through the 5G network. The packet loss rate obtained was relatively low, while the sensor node energy consumption remained efficient thanks to the application of a deep sleep mechanism.   The web-based monitoring system successfully displays environmental data in real time and provides early warning notifications. The integration of ESP32-based WSN with 5G connectivity has proven effective in improving the performance and reliability of real-time environmental monitoring systems. This system fulfills the research objectives and warrants further development, especially in subsequent studies that examine network scalability, energy consumption optimization, and the integration of artificial intelligence-based smart analytics.

Downloads

Download data is not yet available.

Author Biographies

  • Kukuh Dwi Nur Cahyo

    University students at Madura University

  • M.Febri Dwidanasaputra

    University students at Madura University

  • Kevin Ananda Puryanto Pratama

    University students at Madura University

References

REFERENSI

[1] F. P. E. Putra, S. R. Sutarsih, S. Sofiyulloh, and ..., “Optimalisasi Perancangan Aplikasi Manajemen Data Koloman, Di Desa Pulau Mandangin Sampang–Madura Berbasis Website,” 2024, jurnal.univrab.ac.id. [Online]. Available: https://jurnal.univrab.ac.id/index.php/rabit/article/download/4840/1965

[2] F. Prasetyo, E. Putra, M. Riski, M. S. Yahya, and M. H. Ramadhan, “Mengenal Teknologi Jaringan Nirkabel Terbaru Teknologi 5G,” J. Sistim Inf. dan Teknol., vol. 5, no. 2, pp. 167–174, 2023, [Online]. Available: https://jsisfotek.org/index.php

[3] F. P. E. Putra, M. Riski, M. S. Yahya, and ..., “Mengenal Teknologi Jaringan Nirkabel Terbaru Teknologi 5G,” J. Sistim Inf. …, 2023, [Online]. Available: http://www.jsisfotek.org/index.php/JSisfotek/article/view/233

[4] F. P. E. Putra, F. Fauzan, S. Syirofi, M. Mursidi, D. Wahid, and A. Nuraini, “Sistem Pengendali Lingkungan Pertanian Dengan Wireless Sensor Network Untuk Mengoptimalkan Budidaya Hidroponik,” 2024. doi: 10.47709/digitech.v3i2.3461.

[5] F. P. E. Putra and N. Saadah, “Interaktif dan Personalisasi Peningkatan Pembelajaran IoT di Sekolah,” J. Sistim Inf. dan Teknol., vol. 5, no. 2, pp. 175–181, 2023, [Online]. Available: http://www.jsisfotek.org/index.php/JSisfotek/article/view/236

[6] F. P. Eka Putra, F. Muslim, N. Hasanah, Holipah, R. Paradina, and R. Alim, “Analisis Komparasi Protokol Websocket dan MQTT Dalam Proses Push Notification,” J. Sistim Inf. dan Teknol., pp. 63–72, 2024, doi: 10.60083/jsisfotek.v5i4.325.

[7] F. P. E. Putra, D. E. Arissandi, A. Rofiqi, and M. F. Hidayat, “Pemanfaatan Mikrotik Dalam Manajemen Bandwidth Pada Jaringan Sekolah,” 2025, researchgate.net. [Online]. Available: https://www.researchgate.net/profile/Fauzan-Eka-Putra-2/publication/392420575_Pemanfaatan_Mikrotik_Dalam_Manajemen_Bandwidth_Pada_Jaringan_Sekolah/links/6848fab46b5a287c304a61ca/Pemanfaatan-Mikrotik-Dalam-Manajemen-Bandwidth-Pada-Jaringan-Sekolah.pdf

[8] F. P. E. Putra, D. A. M. Putra, A. Firdaus, and A. Hamzah, “Analisis Kecepatan Dan Kinerja Jaringan 5G (generasi ke 5) Pada Wilayah Perkotaan,” INFORMATICS Educ. Prof. J. Informatics, vol. 8, no. 1, p. 47, 2023, doi: 10.51211/itbi.v8i1.2439.

[9] F. P. E. Putra and A. Ramadhani, “Integrasi Teknologi Kuantum dan fiber Optik untuk Meningkatkan Keamanan dan Efisiensi Jaringan Masa Depan,” J. Ilm. Ilk. …, 2025, [Online]. Available: http://j-ilkominfo.org/index.php/ejournalaikom/article/view/342

[10] N. Haidar Hari, F. P. Eka Putra, U. Hasanah, S. R. Sutarsih, and Riyan, “Transformasi Jaringan Telekomunikasi dengan Teknologi 5G: Tantangan, Potensi, dan Implikasi,” J. Inf. dan Teknol., pp. 146–150, 2023, doi: 10.37034/jidt.v5i2.357.

[11] O. G. Manzanilla-Salazar, H. Mellah, and B. Sansó, “Recognizing Emergencies and Multi-User Behavior Patterns Using Imperfect Data From Distributed Access Points. A Non-Intrusive Proof of Concept,” IEEE Access, vol. 11, pp. 91234–91246, 2023, doi: 10.1109/ACCESS.2023.3306328.

[12] S. Akram et al., “Advanced triboelectric nanogenerator: Leveraging density of states matching and leakage current mitigation,” Chem. Eng. J., vol. 519, 2025, doi: 10.1016/j.cej.2025.164813.

[13] T. Shahroodi et al., “Demeter: A Fast and Energy-Efficient Food Profiler Using Hyperdimensional Computing in Memory,” IEEE Access, vol. 10, pp. 82493–82510, 2022, doi: 10.1109/ACCESS.2022.3195878.

[14] R. A. Anirudh Reddy and N. Nidumolu, “Enhanced network lifetime in WBAN using hybrid meta-heuristic-enabled mobile and multiple sink nodes-connected routing,” Int. J. Mob. Netw. Des. Innov., vol. 10, no. 4, pp. 182–201, 2023, doi: 10.1504/IJMNDI.2023.133239.

[15] R. M. Nabawy, M. Ibrahim, and M. Kaseb, “Survey of Mobile Cloud Computing Security and Privacy Issues in Healthcare,” Comput. y Sist., vol. 28, no. 3, pp. 1017–1029, 2024, doi: 10.13053/CyS-28-3-4596.

[16] A. Singh et al., “Wavefront Engineering: Realizing Efficient Terahertz Band Communications in 6G and beyond,” IEEE Wirel. Commun., vol. 31, no. 3, pp. 133–139, 2024, doi: 10.1109/MWC.019.2200583.

[17] J. Zang, “Smart Sports Outward Bound Training Assistant System Based on WSNs,” Int. J. Distrib. Syst. Technol., vol. 14, no. 2, 2023, doi: 10.4018/IJDST.317939.

[18] C. M. Coman, B. C. Toma, M. A. Constantin, and A. Florescu, “Ground Level LiDAR as a Contributing Indicator in an Environmental Protection Application,” IEEE Access, vol. 11, pp. 106277–106288, 2023, doi: 10.1109/ACCESS.2023.3319453.

[19] A. Sghaier and A. Meddeb, “Real Time QoS in WSN-based Network Coding and Reinforcement Learning,” Inform., vol. 47, no. 4, pp. 477–486, 2023, doi: 10.31449/inf.v47i4.3102.

[20] J.-R. Zhuang, W.-T. Chang, and Y.-M. Lin, “Shoe-Like Unpowered Exoskeleton with Energy Harvesting for Enhanced Walking Economy,” IEEE Trans. Neural Syst. Rehabil. Eng., vol. 33, pp. 2345–2357, 2025, doi: 10.1109/TNSRE.2025.3579359.

[21] P. Guo, S. Xu, and W. Liang, “A cloud-assisted anonymous and privacy-preserving authentication scheme for internet of medical things,” Comput. Secur., vol. 157, 2025, doi: 10.1016/j.cose.2025.104614.

[22] F. Bourebaa and M. Benmohammed, “Evaluating Lightweight Transformers With Local Explainability for Android Malware Detection,” IEEE Access, vol. 13, pp. 101005–101026, 2025, doi: 10.1109/ACCESS.2025.3577775.

[23] F. F. Ashrif, E. A. Sundararajan, M. K. Hasan, R. Ahmad, A.-H. A. Hassan Abdalla Hashim, and A. Abu Talib, “Provably secured and lightweight authenticated encryption protocol in machine-to-machine communication in industry 4.0,” Comput. Commun., vol. 218, pp. 263–275, 2024, doi: 10.1016/j.comcom.2024.02.008.

[24] A. Singh, J. Amutha, J. Nagar, and S. Sharma, “A deep learning approach to predict the number of k-barriers for intrusion detection over a circular region using wireless sensor networks,” Expert Syst. Appl., vol. 211, 2023, doi: 10.1016/j.eswa.2022.118588.

[25] A. M. Telgote and S. S. Mande, “A power-awareness routing protocol for sustainable low-power wireless networks: FPGA vs. microcontroller implementation,” Int. J. Ad Hoc Ubiquitous Comput., vol. 48, no. 2, pp. 75–93, 2025, doi: 10.1504/IJAHUC.2025.143974.

[26] N. Singh and S. Suresh, “A Red-Zone-Based Randomized Angular Routing Protocol for Multisource Location Privacy in IoT Applications,” Int. J. Commun. Syst., vol. 38, no. 5, 2025, doi: 10.1002/dac.6014.

[27] M. M. Hasan, M. S. Haq, M. M. Hossain, J. K. Tiash, and S. Kwon, “An Energy-Efficient Small-Cell Operation Algorithm for Ultra-Dense Cellular Networks,” IEEE Access, vol. 12, pp. 191650–191660, 2024, doi: 10.1109/ACCESS.2024.3518355.

[28] F. F. Jurado-Lasso, M. Barzegaran, J. F. Jurado, and X. Fafoutis, “ELISE: A Reinforcement Learning Framework to Optimize the Slotframe Size of the TSCH Protocol in IoT Networks,” IEEE Syst. J., vol. 18, no. 2, pp. 1068–1079, 2024, doi: 10.1109/JSYST.2024.3371429.

[29] Y. Wang, C. Tong, and J. Xie, “RHM-δ-GLMB Tracking Algorithm on the Focal Plane for UAV Cluster Targets,” IEEE Access, vol. 11, pp. 37253–37268, 2023, doi: 10.1109/ACCESS.2023.3264018.

[30] P. Ning, H. Wang, T. Tang, L. Zhu, and X. Wang, “A Service-Oriented Energy Efficient Resource Allocation Approach for Wireless Communications of the Tunnel Construction,” IEEE Trans. Veh. Technol., vol. 72, no. 4, pp. 4948–4958, 2023, doi: 10.1109/TVT.2022.3227898.

[31] M. Y. B. Murthy and A. Koteswararao, “Applications, merits and demerits of WSN with IoT: a detailed review,” Int. J. Auton. Adapt. Commun. Syst., vol. 17, no. 1, pp. 68–88, 2024, doi: 10.1504/IJAACS.2024.135941.

[32] D. Zhan, S. Wang, S. Cai, H. Zheng, and W. Xu, “Acoustic localization with multi-layer isogradient sound speed profile using TDOA and FDOA,” Front. Inf. Technol. Electron. Eng., vol. 24, no. 1, pp. 164–175, 2023, doi: 10.1631/FITEE.2100398.

[33] M. A. Khlifi and M. B. Ben Slimene, “Efficiency of a Six-Phase Induction Generator Employing a Static Excitation Controller to Generate AC Power for Wind Energy,” IEEE Access, vol. 11, pp. 28791–28799, 2023, doi: 10.1109/ACCESS.2023.3260775.

[34] Y. Wang, T. Yang, C. Wang, F. Li, P. Hu, and Y. Shen, “BudsAuth: Toward Gesture-Wise Continuous User Authentication Through Earbuds Vibration Sensing,” IEEE Internet Things J., vol. 11, no. 12, pp. 22007–22020, 2024, doi: 10.1109/JIOT.2024.3380811.

[35] Y. Long et al., “Room-temperature, self-powered hydrogel-based flexible chemosensors for nitrogen dioxide detection enabled by zinc-air batteries,” Biosens. Bioelectron., vol. 290, 2025, doi: 10.1016/j.bios.2025.117941.

[36] X. Tang, X. Liu, G. Xie, Y. Cui, and D. Li, “Prototype Implementation and Experimental Evaluation for LoRa-Backscatter Communication Systems With RF Energy Harvesting and Low Power Management,” IEEE Trans. Commun., vol. 73, no. 7, pp. 4811–4825, 2025, doi: 10.1109/TCOMM.2024.3522052.

[37] I. A. Alablani and M. A. Arafah, “An SDN/ML-Based Adaptive Cell Selection Approach for HetNets: A Real-World Case Study in London, UK,” IEEE Access, vol. 9, pp. 166932–166950, 2021, doi: 10.1109/ACCESS.2021.3136129.

[38] S. Kumar, A. Vasudeva, and M. Manu Sood, “Bio-inspired Routing Algorithms for UAV-based Networks: A Survey,” J. Telecommun. Inf. Technol., vol. 101, no. 3, pp. 23–50, 2025, doi: 10.26636/jtit.2025.3.2101.

[39] T. Micallef, X. Gu, and K. Wu, “Electric Field Energy Harvesting From High-Voltage Power Lines for Consumer Batteryless Wireless Sensor Networks,” IEEE Trans. Consum. Electron., vol. 71, no. 1, pp. 2322–2331, 2025, doi: 10.1109/TCE.2024.3503492.

[40] J. Han and K.-S. Yun, “Real-Time Soil Moisture Monitoring Using a Graphene Oxide Sensor Powered by a Solar Cell-Based Energy Harvester,” J. Electr. Eng. Technol., vol. 19, no. 5, pp. 3331–3337, 2024, doi: 10.1007/s42835-024-01790-2.

[41] P. Liu, H. Xiang, and B. Zhao, “A graded E-shaped piezoelectric energy harvester for ultra-broadband and high-capability energy harvesting,” Eng. Struct., vol. 343, 2025, doi: 10.1016/j.engstruct.2025.121038.

[42] D. Chatzoulis, C. Chaikalis, A. Xenakis, D. Kosmanos, and K. E. Anagnostou, “Channel Coding QoS Analysis in 5G V2X Dynamic Propagation Models,” IEEE Access, vol. 13, pp. 80149–80173, 2025, doi: 10.1109/ACCESS.2025.3566607.

[43] S. A. Alzakari, A. Sarkar, M. Z. Khan, and A. A. Alhussan, “Converging Technologies for Health Prediction and Intrusion Detection in Internet of Healthcare Things With Matrix-Valued Neural Coordinated Federated Intelligence,” IEEE Access, vol. 12, pp. 99469–99498, 2024, doi: 10.1109/ACCESS.2024.3420078.

[44] E. Sutcliffe and A. Beghelli, “Fidelity-Aware Multipath Routing for Multipartite State Distribution in Quantum Networks,” IEEE Trans. Quantum Eng., vol. 6, 2025, doi: 10.1109/TQE.2025.3588783.

[45] A. Abedi, H. Lu, A. Chen, C. Liu, and O. Abari, “WiFi Physical Layer Stays Awake and Responds When it Should Not,” IEEE Internet Things J., vol. 11, no. 3, pp. 4483–4496, 2024, doi: 10.1109/JIOT.2023.3300788.

[46] M. Xie, F. Li, and S. Qiao, “Graph-topology-learning-based IoT positioning under incomplete measurement data,” Digit. Signal Process. A Rev. J., vol. 148, 2024, doi: 10.1016/j.dsp.2024.104465.

[47] S. A. Rajshekhar and A. Biradar, “An Efficient Framework for Localization Based Optimized Opportunistic Routing Protocol in Underwater Acoustic Sensor Networks,” SN Comput. Sci., vol. 5, no. 5, 2024, doi: 10.1007/s42979-024-02814-4.

[48] A. Gazis and E. Katsiri, “Streamline Intelligent Crowd Monitoring with IoT Cloud Computing Middleware,” Sensors, vol. 24, no. 11, 2024, doi: 10.3390/s24113643.

[49] D. Man et al., “A Hybrid Tri-Stable Piezoelectric Energy Harvester with Asymmetric Potential Wells for Rotational Motion Energy Harvesting Enhancement,” Energies, vol. 17, no. 9, 2024, doi: 10.3390/en17092134.

[50] Z. Lai, Z. Yan, G. Geng, and H. Nakazato, “Issuance Policies of Route Origin Authorization with a Single Prefix and Multiple Prefixes: A Comparative Analysis,” Int. J. Adv. Comput. Sci. Appl., vol. 15, no. 3, pp. 1168–1176, 2024, doi: 10.14569/IJACSA.2024.01503116.

[51] A. S. Morales, C. D’Aquino, R. B. P. Klaus, G. S. Vargas, M. A. M. Giassi, and F. de Oliveira Ourique, “Internet of Things experimental platform for real-time water monitoring: a case study of the Araranguá River estuary,” Acta Sci. - Technol., vol. 45, 2023, doi: 10.4025/actascitechnol.v45i1.63130.

[52] A. Ashraf and M. Sagheer, “Efficient Detection of Reactive Jamming Attacks in IoT Networks: A Collaborative Approach,” Int. J. Commun. Syst., vol. 38, no. 8, 2025, doi: 10.1002/dac.70098.

Published

25-12-2025

How to Cite

Integration of ESP32-Based Wireless Sensor Network with 5G Connectivity for Real-Time Environmental Monitoring. (2025). Karapan Network Journal : Journal Computer Technology and Mobile Ad Hoc Network, 2(01). https://ejournal.omahtabing.com/knj/article/view/117