Analisis Kerentanan Serangan Sinkhole Pada Wireless Sensor Network Dan Strategi Mitigasinya

Authors

  • Ach. Ramadhani Author
  • Alvin Hidayat Putra Author

Keywords:

Keywords: Wireless Sensor Network, Sinkhole Attack, Network Security, Routing, Attack Mitigation.

Abstract

Wireless Sensor Networks (WSNs) are widely used in various critical applications such as environmental monitoring, healthcare systems, and industry due to their ability to collect and transmit data efficiently. However, resource limitations and the nature of wireless communication make WSNs vulnerable to various security attacks, one of which is the sinkhole attack. This attack allows malicious nodes to attract data traffic from other nodes by manipulating routing information, causing network performance degradation and data loss. This study aims to analyze the vulnerability of WSN to sinkhole attacks and evaluate the effectiveness of the mitigation strategies applied. The analysis was conducted by comparing network performance under three conditions: normal conditions, conditions where the network was experiencing a sinkhole attack, and conditions after the mitigation mechanism was implemented. The performance parameters used included Packet Delivery Ratio (PDR), End-to-End Delay, energy consumption, and route stability. The test results show that sinkhole attacks cause a significant decrease in PDR, an increase in data delivery delay, and an imbalance in energy consumption between nodes. After the mitigation strategy was implemented, network performance improved significantly and approached normal conditions. This shows that the proposed mitigation mechanism is capable of improving the security and reliability of Wireless Sensor Networks against sinkhole attacks.

Downloads

Download data is not yet available.

Author Biographies

  • Ach. Ramadhani

    University students at Madura University

  • Alvin Hidayat Putra

    University students at Madura University

References

REFERENSI

[1] F. Prasetyo, E. Putra, F. Muslim, N. Hasanah, R. Paradina, and R. Alim, “Jurnal Sistim Informasi dan Teknologi Analisis Komparasi Protokol Websocket dan MQTT Dalam Proses Push Notification,” vol. 5, pp. 63–72, 2024, doi: 10.60083/jsisfotek.v5i4.325.

[2] F. P. E. Putra, D. T. Agustina, T. S. K. Khotimah, and T. Ramadhanty, “Analisis Kinerja Jaringan 5G dalam Meningkatkan Konektivi-tas Internet of Things (IoT),” 2025, researchgate.net. doi: 10.55606/jitek.v5i1.5836.

[3] F. P. E. Putra, D. E. Arissandi, A. Rofiqi, and M. F. Hidayat, “Pemanfaatan Mikrotik Dalam Manajemen Bandwidth Pada Jaringan Sekolah,” 2025, researchgate.net. doi: 10.31294/evolusi.v7i2.5843.

[4] B. Minh Nguyen et al., “Dholes Hunting-A Multi-Local Search Algorithm Using Gradient Approximation and Its Application for Blockchain Consensus Problem,” IEEE Access, vol. 12, pp. 93333–93349, 2024, doi: 10.1109/ACCESS.2024.3419172.

[5] F. P. E. Putra, M. A. Mahmud, and I. S. Maqom, “Pengembangan Sistem Pemantauan Lingkungan Berbasis Internet of Things (IoT) di Kampus,” 2023, researchgate.net. doi: 10.47709/digitech.v3i2.3457.

[6] H. Lanya, M. Zayyadi, D. R. Anjarani, F. P. E. Putra, and ..., “PEMBERDAYAAN SEKOLAH INKLUSI MELALUI E-MODUL BERJENJANG SEBAGAI PENGEMBANGAN KOMPETENSI GURU DALAM PEMENUHAN ….” doi: 10.37303/peduli.v8i2.681.

[7] A. K. V. K. Vamsi Krishna Reddy and K. V. L. Komanapalli, “Investigation of a Multi-Strategy Ensemble Social Group Optimization Algorithm for the Optimization of Energy Management in Electric Vehicles,” IEEE Access, vol. 10, pp. 12084–12124, 2022, doi: 10.1109/ACCESS.2022.3144065.

[8] F. P. E. Putra, U. Ubaidi, M. A. Huda, and ..., “Computer network management optimization through big data analysis using time series analysis method,” Brill. Res. …, 2024, doi: 10.47709/brilliance.v4i1.4373.

[9] M. S. Ali, M. S. Islam, M. Asif, W. U. Khan, F. Lin, and O. Waqar, “On Efficient DCT Type-I Based Low Complexity Channel Estimation for Uplink NB-IoT Systems,” IEEE Access, vol. 9, pp. 129756–129770, 2021, doi: 10.1109/ACCESS.2021.3112279.

[10] S. Safiuddin and F. P. E. Putra, “Strategi Efisiensi Wireless Sensor Network (WSN),” … Educ. …, 2023, doi: 10.51211/itbi.v8i1.2441.

[11] F. Prasetyo, E. Putra, F. Iqbal, and N. Muhammad, “Twitter sentiment analysis about economic recession in indonesia,” vol. 7, no. 1, pp. 1–7, 2023, doi: 10.31763/businta.v7i1.592.

[12] J. Wu, Y. Sun, J. Qian, Y. Cui, Q. Wang, and L. Zhuo, “Distributed Resilient Clustering Algorithm for Virtual Power Plants Under Cyber Attacks,” IEEE Access, vol. 13, pp. 38714–38725, 2025, doi: 10.1109/ACCESS.2025.3546103.

[13] F. P. E. Putra, D. A. M. Putra, A. Firdaus, and ..., “Analisis kecepatan dan kinerja jaringan 5G (generasi ke 5) pada wilayah perkotaan,” … J. Informatics, 2023, doi: 10.51211/itbi.v8i1.2439.

[14] D. S. Kumar and R. Thenmozhi, “AI-Driven TrafNet-DCMCRP for Congestion-Aware Routing and Traffic Management in VANETs,” Int. J. Intell. Eng. Syst., vol. 18, no. 5, pp. 239–251, 2025, doi: 10.22266/ijies2025.0630.18.

[15] F. P. E. Putra, K. Mufidah, R. M. Ilhamsyah, and ..., “Tinjauan performa RouterOS Mikrotik dalam jaringan internet: Analisis kinerja dan kelayakan,” Digit. …, 2023, doi: 10.47709/digitech.v3i2.3446.

[16] S. Khera, N. Turk, and N. Kaur, “HC-WSN: a Hibernated Clustering based framework for improving energy efficiency of wireless sensor networks,” Multimed. Tools Appl., vol. 82, no. 3, pp. 3879–3894, 2023, doi: 10.1007/s11042-022-13446-2.

[17] R. Roy and S. K. Dwivedy, “Nonlinear dynamics of magnetically coupled double beam based piezoelectric energy harvester under galloping excitation,” Sensors Actuators A Phys., vol. 371, 2024, doi: 10.1016/j.sna.2024.115288.

[18] I. Jo, B. Kim, H. Won, S. Kim, K. Choi, and D. Choi, “Evaluation of MWCNT/PU sponge-based triboelectric nanogenerator for harvesting mechanical energy,” Funct. Compos. Struct., vol. 7, no. 3, 2025, doi: 10.1088/2631-6331/adf60b.

[19] Y. Zi, C. Zhou, J. Chen, Z. Han, Y. Huang, and X. Wu, “Hyperspectral Methane Plume Segmentation Through Foundation Computer Vision Models,” IEEE Access, vol. 13, pp. 143031–143041, 2025, doi: 10.1109/ACCESS.2025.3597991.

[20] M. G. Busto, M. J. José Prieto, J. A. Martín-Ramos, J. A. Martínez Esteban, and A. M. Pernía, “Current Source Strategy for Energy Injection from a CapMix Cell,” Electron., vol. 13, no. 1, 2024, doi: 10.3390/electronics13010042.

[21] G. Savithri and N. R. Sai, “A Reliable Hybrid Framework for Anomaly Detection in Secure and Robust Wireless Sensor Networks,” Eng. Technol. Appl. Sci. Res., vol. 15, no. 4, pp. 25789–25797, 2025, doi: 10.48084/etasr.11494.

[22] M. Soleymani, I. Santamaría, and P. J. Schreier, “Distributed Algorithms for Spectral and Energy-Efficiency Maximization of K-User Interference Channels,” IEEE Access, vol. 9, pp. 96948–96963, 2021, doi: 10.1109/ACCESS.2021.3094976.

[23] S. Oak, D. Lee, G. Sim, S. Kim, and G. Park, “Real-Time Personalized Car-Following Control With Online Parameter Adaptation for Intelligent Regenerative Braking Systems,” IEEE Access, vol. 13, pp. 168055–168066, 2025, doi: 10.1109/ACCESS.2025.3611825.

[24] M. Zheng, Y. Zhao, and W. Liang, “CHR: A Novel Channel-Hopping-Based Retransmission Scheme in WIA-FA Networks,” IEEE Internet Things J., vol. 11, no. 4, pp. 7107–7115, 2024, doi: 10.1109/JIOT.2023.3314438.

[25] D. Lee, S. Lee, S. Oh, and D. Park, “Energy-Efficient FPGA Accelerator with Fidelity-Controllable Sliding-Region Signal Processing Unit for Abnormal ECG Diagnosis on IoT Edge Devices,” IEEE Access, vol. 9, pp. 122789–122800, 2021, doi: 10.1109/ACCESS.2021.3109875.

[26] L. Chen, L. Sun, and C. Zhong, “Interpretability-Oriented Adjustment of K-Means: A Multiple-Objective Particle Swarm Optimization Framework,” IEEE Access, vol. 13, pp. 68084–68096, 2025, doi: 10.1109/ACCESS.2025.3558716.

[27] H. Alsmadi, E. Saleh, M. Alsmadi, and S. Ikki, “Hardware Impairments Effects on Over the Air System Assisted by Unmanned Aerial Vehicle,” IEEE Commun. Lett., vol. 28, no. 7, pp. 1609–1613, 2024, doi: 10.1109/LCOMM.2024.3395439.

[28] D. Pandey and V. Kushwaha, “An Exploratory Study of Optimization Techniques for Congestion Control in Wireless Sensor Networks,” Ad-Hoc Sens. Wirel. Networks, vol. 58, no. 1–2, pp. 79–125, 2024, doi: 10.32908/ahswn.v58.10241.

[29] L. Zhu, “Research on Multi-Objective Coordinated Planning of Distribution Networks Based on Improved Generative Adversarial Networks,” IEEE Access, vol. 13, pp. 134129–134142, 2025, doi: 10.1109/ACCESS.2025.3592675.

[30] S. Al-Sarawi, M. Anbar, B. A. Alabsi, M. A. Aladaileh, and S. D. A. Rihan, “Unweighted Voting Method to Detect Sinkhole Attack in RPL-Based Internet of Things Networks,” Comput. Mater. Contin., vol. 77, no. 1, pp. 491–515, 2023, doi: 10.32604/cmc.2023.041108.

[31] H. Tang, P. Wang, D. Li, Y. Zhang, and X. Chen, “An Adaptive Virtual Tunnel Routing Protocol With Eliminating Boundary Effects for Flying Ad-Hoc Networks,” IEEE Internet Things J., vol. 12, no. 16, pp. 34068–34085, 2025, doi: 10.1109/JIOT.2025.3577510.

[32] S. B. Weber, S. Stein, M. Pilgermann, and T. Schrader, “Attack Detection for Medical Cyber-Physical Systems-A Systematic Literature Review,” IEEE Access, vol. 11, pp. 41796–41815, 2023, doi: 10.1109/ACCESS.2023.3270225.

[33] M. Kinnas, J. Violos, N. I. Karapiperis, and I. Kompatsiaris, “Selecting Images With Entropy for Frugal Knowledge Distillation,” IEEE Access, vol. 13, pp. 28189–28203, 2025, doi: 10.1109/ACCESS.2025.3540384.

[34] T. Wang, J. Geng, J. Wang, and X. Yan, “Video Refereeing Model of Soccer Match Based on Fuzzy Clustering and Cuckoo Optimization Algorithm,” IEEE Access, vol. 12, pp. 82536–82548, 2024, doi: 10.1109/ACCESS.2024.3401705.

[35] F. Tosoni, P. Bille, V. Brunacci, A. d. De Angelis, P. Ferragina, and G. Manzini, “Toward Greener Matrix Operations by Lossless Compressed Formats,” IEEE Access, vol. 13, pp. 56756–56779, 2025, doi: 10.1109/ACCESS.2025.3555119.

[36] L. Prashad, H. C. Mohanta, and A. J. A. Abdullah Al-Gburi, “Dual Band Rectenna for Electromagnetic Energy Harvesting at 2.4 GHz and 5 GHz Frequencies,” Prog. Electromagn. Res. B, vol. 108, pp. 75–88, 2024, doi: 10.2528/PIERB24072102.

[37] D. Lin, Z. Chen, X. Liu, L. Kong, and Y. L. Guan, “ESWCM: A Novel Energy-sustainable Approach for SWIPT-enabled WSN with Constrained MEAP Configurations,” IEEE Trans. Mob. Comput., vol. 23, no. 9, pp. 9012–9028, 2024, doi: 10.1109/TMC.2024.3357771.

[38] M. Niranjan, S. Gupta, and B. Singh, “Sensor node localization with improved hop-size using PSODESA optimization,” Wirel. Networks, vol. 29, no. 4, pp. 1911–1934, 2023, doi: 10.1007/s11276-023-03242-7.

[39] G. Zhao, K. Lin, and T. Hao, “A feasibility study of LoRaWAN-based wireless underground sensor networks for underground monitoring,” Comput. Networks, vol. 232, 2023, doi: 10.1016/j.comnet.2023.109851.

[40] O. K. Om Kumar, S. Gajendran, and S. Marappan, “Enhancing Intrusion Detection Through Federated Learning With Enhanced Ghost_BiNet and Homomorphic Encryption,” IEEE Access, vol. 12, pp. 24879–24893, 2024, doi: 10.1109/ACCESS.2024.3362347.

[41] H. K. Khalid Alkahtani, H. Mahgoub, F. A. Alotaibi, K. M. Othman, R. Allafi, and A. S. Salama, “Design of Hybrid Snake Optimizer Based Route Selection Approach for Unmanned Aerial Vehicles Communication,” IEEE Access, vol. 12, pp. 54426–54434, 2024, doi: 10.1109/ACCESS.2024.3383031.

[42] H. Guo et al., “Assessment of energy harvesting and signal transmission in traffic markings with embedded piezoelectric film transducers,” J. Intell. Mater. Syst. Struct., vol. 36, no. 7, pp. 443–454, 2025, doi: 10.1177/1045389X251326335.

[43] M. H. Hashemi, U. Kiliç, and S. Dikmen, “Applications of Novel Heuristic Algorithms in Design Optimization of Energy-Efficient Distribution Transformer,” IEEE Access, vol. 11, pp. 15968–15980, 2023, doi: 10.1109/ACCESS.2023.3245327.

[44] R. Wielgat et al., “A Concept of Smart Agro-Photovoltaic Tunnels,” IEEE Access, vol. 12, pp. 40765–40794, 2024, doi: 10.1109/ACCESS.2024.3376411.

[45] A. Ometov, K. Zeman, P. Masek, L. Balazevic, and M. Komarov, “A Comprehensive and Reproducible Comparison of Cryptographic Primitives Execution on Android Devices,” IEEE Access, vol. 9, pp. 54625–54638, 2021, doi: 10.1109/ACCESS.2021.3069627.

[46] J. B. Barreiro, S. Z. Fernández, and V. D. Diaz-Casas, “Internet of Things in Energy-Sensitive Processes: Application in a Refrigerated Warehouse,” IEEE Access, vol. 12, pp. 76257–76276, 2024, doi: 10.1109/ACCESS.2024.3406992.

[47] C. Ma et al., “Banana Individual Segmentation and Phenotypic Parameter Measurements Using Deep Learning and Terrestrial LiDAR,” IEEE Access, vol. 12, pp. 50310–50320, 2024, doi: 10.1109/ACCESS.2024.3385280.

[48] Y. Gao, H. Zhu, X. Li, and M. J. V Amuri, “Trust-Based Distributed H∞ Diffusion Filtering for Target Tracking under Cyber Attacks,” IEEE Access, vol. 11, pp. 119388–119395, 2023, doi: 10.1109/ACCESS.2023.3326874.

[49] R. Santos, D. Castanheira, A. Silva, and A. Gameiro, “Pipelined Multi-User IR-HARQ Scheme for Improved Latency Performance in URLLC,” IEEE Access, vol. 12, pp. 33473–33485, 2024, doi: 10.1109/ACCESS.2024.3371994.

[50] S. Baek, G.-H. Yu, J. Kim, C. T. Ngo, J. K. Eshraghian, and J.-P. Hong, “A Reconfigurable SRAM Based CMOS PUF with Challenge to Response Pairs,” IEEE Access, vol. 9, pp. 79947–79960, 2021, doi: 10.1109/ACCESS.2021.3084621.

Published

25-12-2025

How to Cite

Analisis Kerentanan Serangan Sinkhole Pada Wireless Sensor Network Dan Strategi Mitigasinya. (2025). Karapan Network Journal : Journal Computer Technology and Mobile Ad Hoc Network, 2(01). https://ejournal.omahtabing.com/knj/article/view/130

Most read articles by the same author(s)