Blockchain-Enabled Wireless Sensor Networks for IoT Data Security and Integrity

Authors

  • Nur Beilqis Anastasya Author
  • Alfiyatus Zahroh Author
  • Rizqiyah Amanda Author

Keywords:

Keywords: Wireless Sensor Networks, Blockchain, Internet of Things, Data Security, Data Integrity

Abstract

Wireless Sensor Networks (WSN) are an important component of the Internet of Things (IoT) that play a role in distributed environmental data collection. However, resource limitations and a generally centralized architecture make WSNs vulnerable to security attacks, particularly data manipulation and falsification, making it difficult to guarantee the integrity of IoT data. This study aims to design and evaluate the integration of blockchain technology in WSN to improve IoT data security and integrity without significantly compromising network efficiency. This research uses a quantitative experimental study approach by designing a Blockchain-Enabled Wireless Sensor Networks architecture consisting of sensor nodes, gateway nodes, and a blockchain network. The evaluation was conducted through simulations of various scenarios, including data manipulation, latency testing, energy consumption, communication overhead, throughput, and system scalability. The test results show that the blockchain-based WSN system is capable of detecting all simulated data manipulation scenarios through an immutable data hash recording mechanism. Blockchain integration increases latency and communication overhead compared to conventional WSNs, but sensor node energy consumption remains efficient because the blockchain process is run on gateway nodes. System throughput is relatively stable at medium network scales. 

This study shows that blockchain integration in WSN effectively improves the security and integrity of IoT data with an acceptable performance trade-off. The results obtained are in line with the research objectives, although scalability challenges still need to be optimized. Further research is recommended to explore lighter consensus mechanisms and the use of edge computing to support implementation in large-scale IoT networks.

 


 

Downloads

Download data is not yet available.

Author Biographies

  • Nur Beilqis Anastasya

    University students at Madura University

  • Alfiyatus Zahroh

    University students at Madura University

  • Rizqiyah Amanda

    University students at Madura University

References

REFERENSI

[1] Fauzan Prasetyo Eka Putra, Maktsuful Ghummah, Moh. Amrullah, and Rafli Hidayatullah, “Studi Kinerja Mesh Network untuk Penerapan Internet of Things (IoT) di Lingkungan Perkotaan,” 2025. doi: 10.55606/jitek.v5i1.5895.

[2] A. Rejeb et al., “Unleashing the power of internet of things and blockchain: A comprehensive analysis and future directions,” 2024, Elsevier. doi: 10.1016/j.iotcps.2023.06.003.

[3] S. Safiuddin and F. P. E. Putra, “Strategi Efisiensi Wireless Sensor Network (WSN),” INFORMATICS Educ. Prof. J. Informatics, vol. 8, no. 1, p. 52, 2023, doi: 10.51211/itbi.v8i1.2441.

[4] F. P. E. Putra, U. Ubaidi, A. B. Tamam, and R. W. Efendi, “Implementation And Simulation Of Dynamic Arp Inspection In Cisco Packet Tracer For Network Security,” Brill. Res. Artif. Intell., vol. 4, no. 1, pp. 340–347, 2024, doi: 10.47709/brilliance.v4i1.4199.

[5] G. Vardakis, G. Hatzivasilis, E. Koutsaki, and N. Papadakis, “Review of Smart-Home Security Using the Internet of Things,” 2024, mdpi.com. doi: 10.3390/electronics13163343.

[6] H. Han, R. K. Shiwakoti, R. Jarvis, C. Mordi, and D. Botchie, “Accounting and auditing with blockchain technology and artificial Intelligence: A literature review,” 2023, Elsevier. doi: 10.1016/j.accinf.2022.100598.

[7] M. E. Al-Sadoon, A. Jedidi, and H. Al-Raweshidy, “Dual-Tier Cluster-Based Routing in Mobile Wireless Sensor Network for IoT Application,” IEEE Access, vol. 11, pp. 4079–4094, 2023, doi: 10.1109/ACCESS.2023.3235200.

[8] M. Shafay, R. W. Ahmad, K. Salah, I. Yaqoob, R. Jayaraman, and M. Omar, “Blockchain for deep learning: review and open challenges,” Cluster Comput., vol. 26, no. 1, pp. 197–221, 2023, doi: 10.1007/s10586-022-03582-7.

[9] S. Zhou, K. Li, L. Xiao, J. Cai, W. Liang, and A. Castiglione, “A Systematic Review of Consensus Mechanisms in Blockchain,” 2023, mdpi.com. doi: 10.3390/math11102248.

[10] A. K. Tyagi, S. Dananjayan, D. Agarwal, and H. F. Thariq Ahmed, “Blockchain—Internet of Things Applications: Opportunities and Challenges for Industry 4.0 and Society 5.0,” 2023, mdpi.com. doi: 10.3390/s23020947.

[11] K. H. Almotairi, “Application of internet of things in healthcare domain,” J. Umm Al-Qura Univ. Eng. Archit., vol. 14, no. 1, pp. 1–12, 2023, doi: 10.1007/s43995-022-00008-8.

[12] S. Dong, K. Abbas, M. Li, and J. Kamruzzaman, “Blockchain technology and application: an overview,” PeerJ Comput. Sci., vol. 9, 2023, doi: 10.7717/peerj-cs.1705.

[13] F. P. E. Putra, N. Ramadhani, F. Fauzan, and M. Mursidi, “Service Quality Analysis of RFID-Based Smart Door Lock in Front One Azana Style Hotel Area,” Brill. Res. Artif. Intell., vol. 4, no. 1, pp. 372–381, 2024, doi: 10.47709/brilliance.v4i1.4292.

[14] S. D. Satav, D. S. Hasan, R. Pitchai, T. A. Mohanaprakash, S. J. Sultanuddin, and S. Boopathi, “Next generation of internet of things (NGIoT) in healthcare systems,” Sustain. Sci. Intell. Technol. Soc. Dev., pp. 307–330, 2023, doi: 10.4018/979-8-3693-1186-8.ch017.

[15] P. Gite, A. Shrivastava, K. Murali Krishna, G. H. Kusumadevi, R. Dilip, and R. Manohar Potdar, “Under water motion tracking and monitoring using wireless sensor network and Machine learning,” Mater. Today Proc., vol. 80, pp. 3511–3516, 2023, doi: 10.1016/j.matpr.2021.07.283.

[16] U. Panahi and C. Bayılmış, “Enabling secure data transmission for wireless sensor networks based IoT applications,” 2023, Elsevier. doi: 10.1016/j.asej.2022.101866.

[17] K. Pal and A. U. H. Yasar, “Internet of Things Impact on Supply Chain Management,” Procedia Comput. Sci., vol. 220, pp. 478–485, 2023, doi: 10.1016/j.procs.2023.03.061.

[18] F. P. Eka Putra, . S., A. Ramadhani, and . M., “Integrasi Teknologi Kuantum dan fiber Optik untuk Meningkatkan Keamanan dan Efisiensi Jaringan Masa Depan,” J. Ilm. Ilk. - Ilmu Komput. Inform., vol. 8, no. 2, pp. 151–163, 2025, doi: 10.47324/ilkominfo.v8i2.342.

[19] F. Soleymaani, M. A. Sandidzadeh, and A. Mirabadi, “Calibrating the train position and speed in signalling systems using balises and wireless sensor networks,” Int. J. Sens. Networks, vol. 46, no. 2, pp. 100–113, 2024, doi: 10.1504/IJSNET.2024.141785.

[20] A. Ghaffari, N. Jelodari, S. pouralish, N. derakhshanfard, and B. Arasteh, “Securing internet of things using machine and deep learning methods: a survey,” 2024, Springer. doi: 10.1007/s10586-024-04509-0.

[21] Y. Y. Ghadi et al., “Machine Learning Solutions for the Security of Wireless Sensor Networks: A Review,” IEEE Access, vol. 12, pp. 12699–12719, 2024, doi: 10.1109/ACCESS.2024.3355312.

[22] F. Prasetyo Eka Putra, S. R. Sutarsih, S. Sofiyulloh, P. Permana, and M. Umar Mansyur, “Optimalisasi Perancangan Aplikasi Manajemen Data Koloman, Di Desa Pulau Mandangin Sampang – Madura Berbasis Website,” Rabit J. Teknol. dan Sist. Inf. Univrab, vol. 9, no. 2, pp. 285–294, 2024, doi: 10.36341/rabit.v9i2.4840.

[23] M. Alrizq et al., “Optimization of sensor node location utilizing artificial intelligence for mobile wireless sensor network,” Wirel. Networks, vol. 30, no. 7, pp. 6619–6631, 2024, doi: 10.1007/s11276-023-03469-4.

[24] Dola Ramalinda, Jayadi, and Agung Rachmat Raharja, “Strategi Perlindungan Data Menggunakan Sistem Kriptografi Dalam Keamanan Informasi,” 2024, pdfs.semanticscholar.org. doi: 10.62504/jimr679.

[25] X. Xue, R. Shanmugam, S. K. Palanisamy, O. I. Khalaf, D. Selvaraj, and G. M. Abdulsahib, “A Hybrid Cross Layer with Harris-Hawk-Optimization-Based Efficient Routing for Wireless Sensor Networks,” 2023, mdpi.com. doi: 10.3390/sym15020438.

[26] F. P. E. Putra, S. Syirofi, D. Wahid, and A. M. Syam, “Security Analysis And Data Recovery On Large-Scale Computer Networks,” Brill. Res. Artif. Intell., vol. 5, no. 1, pp. 384–390, 2025, doi: 10.47709/brilliance.v5i1.6276.

[27] S. Ismail, D. W. Dawoud, and H. Reza, “Securing Wireless Sensor Networks Using Machine Learning and Blockchain: A Review,” 2023, mdpi.com. doi: 10.3390/fi15060200.

[28] Mardiah and M. N. H. Siregar, “Analisis Keamanan Data pada Sistem Informasi Menggunakan Metode ISO/IEC 27001,” J. Ilmu Komput. dan Tek. Inform., vol. 1, no. 2, pp. 58–64, 2025, doi: 10.64803/juikti.v1i2.52.

[29] L. Judijanto, P. D. Persadha, I. Susilowati, H. K. Reza, and M. Susanti, “Analisis Keamanan Data dan Perlindungan Privasi dalam Pengelolaan Big Data: Tinjauan Teknologi Enkripsi dan Anonimisasi,” J. Penelit. Inov., vol. 5, no. 2, pp. 1991–2000, 2025, doi: 10.54082/jupin.1151.

[30] Fauzan Prasetyo Eka Putra, Mustafida Mustafida, Royhan Alfadili, and Afifatun Nahriyah, “Perancangan Jaringan Nirkabel Berbasis Mesh untuk Menunjang Aplikasi Smart City,” 2025, researchgate.net. doi: 10.55606/jitek.v5i1.5934.

[31] K. O. Chee, M. Ge, G. Bai, and D. D. Kim, “IoTSecSim: A framework for modelling and simulation of security in Internet of things,” 2024, Elsevier. doi: 10.1016/j.cose.2023.103534.

[32] A. Kusyanti, I. P. Agrahita Wiguna, and F. Andri Bakhtiar, “Implementasi Algoritme Spongent sebagai Algoritme Hashing untuk Integritas pada Modul Komunikasi Lora,” J. Teknol. Inf. dan Ilmu Komput., vol. 10, no. 6, pp. 1311–1318, 2023, doi: 10.25126/jtiik.2023107119.

[33] F. Marwati, A. Akrom, and A. Astofa, “Sosialiasi Pengenalan Pentingnya Cyber Security Guna Menjaga Keamanan Data Di Era Digital Pada Siswa/I PKBM Wong Sing Gesit,” JIPM J. Inov. Pengabdi. Masy., vol. 3, no. 1, pp. 11–16, 2025, doi: 10.55903/jipm.v3i1.211.

[34] A. Salam, “Internet of Things in Agricultural Innovation and Security,” Internet Things Sustain. Community …, pp. 71–112, 2024, doi: 10.1007/978-3-031-62162-8_3.

[35] H. Zhang, M. Zaman, A. Jain, and S. Sampalli, “A Hybrid Machine Learning Intrusion Detection System for Wireless Sensor Networks,” 20th Int. Wirel. Commun. Mob. Comput. Conf. IWCMC 2024, pp. 830–835, 2024, doi: 10.1109/IWCMC61514.2024.10592535.

[36] Z. Munawar, N. Indah Putri, I. Iswanto, and D. Widhiantoro, “Analisis Keamanan Pada Teknologi Blockchain,” Infotronik J. Teknol. Inf. dan Elektron., vol. 8, no. 2, p. 67, 2023, doi: 10.32897/infotronik.2023.8.2.2062.

[37] M. Ismail, A. Azwar, B. Baharuddin, and H. Hamria, “Analisis Penggunaan Teknologi Blockchain dalam Meningkatkan Keamanan Data: Studi Kasus Industri Keuangan,” J. Janitra Inform. dan Sist. Inf., vol. 5, no. 1, pp. 69–77, 2025, doi: 10.59395/m9krbe73.

[38] K. Biswas, V. Muthukkumarasamy, M. J. M. Chowdhury, X. W. Wu, and K. Singh, “A multipath routing protocol for secure energy efficient communication in Wireless Sensor Networks,” Comput. Networks, vol. 232, 2023, doi: 10.1016/j.comnet.2023.109842.

[39] M. Ben Farah et al., “A survey on blockchain technology in the maritime industry: Challenges and future perspectives,” 2024, Elsevier. doi: 10.1016/j.future.2024.03.046.

[40] J. Li, R. Qin, S. Guan, J. Hou, and F. Y. Wang, “Blockchain Intelligence: Intelligent Blockchains for Web 3.0 and beyond,” IEEE Trans. Syst. Man, Cybern. Syst., vol. 54, no. 11, pp. 6633–6642, 2024, doi: 10.1109/TSMC.2023.3348449.

[41] S. Caleb and S. J. J. Thangaraj, “Secured Node Identification Approach Based on Artificial Neural Network Infrastructure for Wireless Sensor Networks,” Proc. 9th Int. Conf. Electr. Energy Syst. ICEES 2023, pp. 646–651, 2023, doi: 10.1109/ICEES57979.2023.10110046.

[42] F. P. Eka Putra, A. M. Ubaidillah Solichin, M. N. Wildanul Hakim, and M. T. Ramadhan, “Pemanfaatan Teknologi Wireless dan Mobile Network Berbasis 5G Untuk Pemerataan Akses Jaringan di Indonesia,” Infotek J. Inform. dan Teknol., vol. 8, no. 2, pp. 415–425, 2025, doi: 10.29408/jit.v8i2.30559.

[43] D. Darmawan, “Nextcloud: Keamanan Data Terbaik Dengan Manajemen File dan Pengguna yang Cerdas,” J. Sos. Teknol., vol. 4, no. 1, pp. 80–89, 2024, doi: 10.59188/jurnalsostech.v4i1.1130.

[44] P. Di Juni, M. Arief Hasan, Y. Sri Putri Sitompul, J. Alexander, I. Hidayat, and R. Marco Bilbo, “Audit Keamanan Basis Data Menggunakan Sql Server Audit Untuk Deteksi Aktivitas Tidak Sah,” 2025, ejournal.itn.ac.id. doi: 10.36040/jati.v9i2.13198.

[45] F. P. E. Putra, M. A. Mahmud, and I. S. Maqom, “Pengembangan Sistem Pemantauan Lingkungan Berbasis Internet of Things (IoT) di Kampus,” 2024, researchgate.net. doi: 10.47709/digitech.v3i2.3457.

[46] S. P. Kumar, S. Garg, E. Alabdulkreem, and A. Ben Miled, “Advanced generative adversarial network for optimizing layout of wireless sensor networks,” Sci. Rep., vol. 14, no. 1, 2024, doi: 10.1038/s41598-024-83957-5.

[47] G. H. Adday, S. K. Subramaniam, Z. A. Zukarnain, and N. Samian, “Investigating and Analyzing Simulation Tools of Wireless Sensor Networks: A Comprehensive Survey,” IEEE Access, vol. 12, pp. 22938–22977, 2024, doi: 10.1109/ACCESS.2024.3362889.

[48] Fauzan Prasetyo Eka Putra, Dian Tri Agustina, Triana Selvia Khusnul Khotimah, and Tarisha Ramadhanty, “Analisis Kinerja Jaringan 5G dalam Meningkatkan Konektivitas Internet of Things (IoT),” 2025, researchgate.net. doi: 10.55606/jitek.v5i1.5836.

[49] Z. Hussein, M. A. Salama, and S. A. El-Rahman, “Evolution of blockchain consensus algorithms: a review on the latest milestones of blockchain consensus algorithms,” 2023, Springer. doi: 10.1186/s42400-023-00163-y.

[50] H. L. Gururaj, R. Natarajan, N. A. Almujally, F. Flammini, S. Krishna, and S. K. Gupta, “Collaborative Energy-Efficient Routing Protocol for Sustainable Communication in 5G/6G Wireless Sensor Networks,” IEEE Open J. Commun. Soc., vol. 4, pp. 2050–2061, 2023, doi: 10.1109/OJCOMS.2023.3312155.

Published

25-12-2025

How to Cite

Blockchain-Enabled Wireless Sensor Networks for IoT Data Security and Integrity. (2025). Karapan Network Journal : Journal Computer Technology and Mobile Ad Hoc Network, 2(01). https://ejournal.omahtabing.com/knj/article/view/125

Most read articles by the same author(s)