Security and Privacy Challenges in Wireless Sensor Networks: A Systematic Literature Review of Threat Mitigation Strategies

Penulis

  • Moh. Rafael Kamil . A Penulis
  • Radhitya Dwi Akmal Purnomo Penulis

Kata Kunci:

Keamanan Jaringan Sensor Nirkabel, Mitigasi Ancaman, Kriptografi Ringan.

Abstrak

Perkembangan Wireless Sensor Networks (WSN) sebagai infrastruktur fundamental dalam ekosistem Internet of Things menghadapi tantangan keamanan dan privasi yang semakin kompleks akibat keterbatasan sumber daya komputasi, memori, dan energi pada perangkat sensor yang digunakan. Penelitian tinjauan literatur sistematis ini menganalisis 30 publikasi ilmiah periode 2020-2024 menggunakan kerangka kerja PRISMA untuk mengidentifikasi berbagai ancaman keamanan, mengkategorikan strategi mitigasi yang telah diterapkan, serta memetakan kesenjangan penelitian yang masih ada. Hasil analisis mengungkapkan bahwa ancaman WSN mencakup serangan blackhole, sinkhole, wormhole, Sybil, denial-of-service (DoS), dan man-in-the-middle yang dapat mengkompromikan integritas, kerahasiaan, dan ketersediaan data secara signifikan, bahkan pada skala jaringan besar dengan ribuan node. Strategi mitigasi yang efektif meliputi penggunaan kriptografi ringan berbasis AES-ECC, protokol autentikasi ECDH, teknologi blockchain, sistem deteksi intrusi berbasis machine learning, serta mekanisme trust management yang adaptif dan responsif terhadap perilaku node. Penelitian ini juga mengidentifikasi kesenjangan dalam implementasi algoritma post-quantum, pemanfaatan federated learning untuk WSN, serta standardisasi protokol keamanan yang interoperable dan scalable. Berdasarkan temuan tersebut, penelitian ini merekomendasikan arah riset masa depan untuk mengembangkan solusi keamanan yang lebih robust, adaptif, efisien, dan tahan terhadap serangan canggih, sehingga mampu menghadapi evolusi ancaman yang terus berkembang dalam ekosistem WSN-IoT kontemporer secara berkelanjutan, serta mendukung integrasi dengan teknologi IoT generasi berikutnya.

Unduhan

Data unduhan tidak tersedia.

Referensi

[1] Yisa, A. G., Dargahi, T., Belguith, S., & Hammoudeh, M. (2021). Security challenges of Internet of Underwater Things: A systematic literature review. Transactions on Emerging Telecommunications Technologies, 32(3). https://doi.org/10.1002/ett.4203.

[2] Ghadi, Y. Y., Mazhar, T., Shloul, T. Al, Shahzad, T., Salaria, U. A., Ahmed, A., & Hamam, H. (2024). Machine Learning Solutions for the Security of Wireless Sensor Networks: A Review. IEEE Access, 12(January), 12699–12719. https://doi.org/10.1109/ACCESS.2024.3355312.

[3] Soltani, K., Farzinvash, L., & Balafar, M. A. (2023). Trust-aware and energy-efficient data gathering in wireless sensor networks using PSO. Soft Computing, 27(16), 11731–11754. https://doi.org/10.1007/s00500-023-07856-z.

[4] Rani, S., Ahmed, S. H., & Rastogi, R. (2020). Dynamic clustering approach based on wireless sensor networks genetic algorithm for IoT applications. Wireless Networks, 26(4), 2307–2316. https://doi.org/10.1007/s11276-019-02083-7.

[5] Adu-Manu, K. S., Engmann, F., Sarfo-Kantanka, G., Baiden, G. E., & Dulemordzi, B. A. (2022). WSN Protocols and Security Challenges for Environmental Monitoring Applications: A Survey. Journal of Sensors, 2022. https://doi.org/10.1155/2022/1628537.

[6] Ahmed, A., Oluomachi, E., Abdullah, A., & Tochukwu, N. (2024). Enhancing Data Privacy in Wireless Sensor Networks: Investigating Techniques and Protocols to Protect Privacy of Data Transmitted Over Wireless Sensor Networks in Critical Applications of Healthcare and National Security. International Journal of Network Security & Its Applications, 16(2), 47–63. https://doi.org/10.5121/ijnsa.2024.16204.

[7] Luo, J., Chen, Y., Wu, M., & Yang, Y. (2021). A Survey of Routing Protocols for Underwater Wireless Sensor Networks. IEEE Communications Surveys and Tutorials, 23(1), 137–160. https://doi.org/10.1109/COMST.2020.3048190.

[8] Akinsola, Oluomachi, E., Abdullah, A., & Tochukwu, N. (2024). Enhancing Data Privacy in Wireless Sensor Networks: Investigating Techniques and Protocols to Protect Privacy of Data Transmitted Over Wireless Sensor Networks in Critical Applications of Healthcare and National Security. International Journal of Network Security & Its Applications, 16(2), 47–63. https://doi.org/10.5121/ijnsa.2024.16204.

[9] Kumar, P., Baliyan, A., Prasad, K. R., Sreekanth, N., Jawarkar, P., Roy, V., & Amoatey, E. T. (2022). Machine Learning Enabled Techniques for Protecting Wireless Sensor Networks by Estimating Attack Prevalence and Device Deployment Strategy for 5G Networks. Wireless Communications and Mobile Computing, 2022. https://doi.org/10.1155/2022/5713092.

[10] Abidin, S., Vadi, V. R., & Rana, A. (2021). On Confidentiality, Integrity, Authenticity, and Freshness (CIAF) in WSN. Advances in Intelligent Systems and Computing, 1158, 87–97. https://doi.org/10.1007/978-981-15-4409-5_8.

[11] Farooq, M. S., Riaz, S., & Alvi, A. (2023). Security and Privacy Issues in Software-Defined Networking (SDN): A Systematic Literature Review. Electronics (Switzerland), 12(14). https://doi.org/10.3390/electronics12143077.

[12] Amutha, J., Sharma, S., & Nagar, J. (2020). WSN Strategies Based on Sensors, Deployment, Sensing Models, Coverage and Energy Efficiency: Review, Approaches and Open Issues. Wireless Personal Communications, 111(2), 1089–1115. https://doi.org/10.1007/s11277-019-06903-z.

[13] Salmi, S., & Oughdir, L. (2023). Performance evaluation of deep learning techniques for DoS attacks detection in wireless sensor network. Journal of Big Data, 10(1). https://doi.org/10.1186/s40537-023-00692-w.

[14] Ahmad, R., Wazirali, R., & Abu-Ain, T. (2022). Machine Learning for Wireless Sensor Networks Security: An Overview of Challenges and Issues. Sensors, 22(13). https://doi.org/10.3390/s22134730.

[15] Ali, S., Humaria, A., Ramzan, M. S., Khan, I., Saqlain, S. M., Ghani, A., Zakia, J., & Alzahrani, B. A. (2020). An efficient cryptographic technique using modified Diffie–Hellman in wireless sensor networks. International Journal of Distributed Sensor Networks, 16(6). https://doi.org/10.1177/1550147720925772.

[16] Eka Putra, F. P., Amir Hamzah, Agel, W., & Firmansyah Kusuma, R. O. (2024). Impelementasi Sistem Keamanan Jaringan Mikrotik Menggunakan Firewall Filtering dan Port Knocking. Jurnal Sistim Informasi Dan Teknologi, 5(4), 82–87. https://doi.org/10.60083/jsisfotek.v5i4.329.

[17] Fang, W., Zhang, W., Chen, W., Pan, T., Ni, Y., & Yang, Y. (2020). Trust-Based Attack and Defense in Wireless Sensor Networks: A Survey. Wireless Communications and Mobile Computing, 2020. https://doi.org/10.1155/2020/2643546.

[18] Faris, M., Mahmud, M. N., Salleh, M. F. M., & Alnoor, A. (2023). Wireless sensor network security: A recent review based on state-of-the-art works. International Journal of Engineering Business Management, 15, 1–29. https://doi.org/10.1177/18479790231157220.

[19] Talukder, M. A., Khalid, M., & Sultana, N. (2025). A hybrid machine learning model for intrusion detection in wireless sensor networks leveraging data balancing and dimensionality reduction. Scientific Reports, 15, 4617. https://doi.org/10.1038/s41598-025-87028-1.

[20] Guerrero-Sanchez, A. E., Rivas-Araiza, E. A., Gonzalez-Cordoba, J. L., Toledano-Ayala, M., & Takacs, A. (2020). Blockchain mechanism and symmetric encryption in a wireless sensor network. Sensors (Switzerland), 20(10). https://doi.org/10.3390/s20102798.

[21] Huanan, Z., Suping, X., & Jiannan, W. (2021). Security and application of wireless sensor network. Procedia Computer Science, 183, 486–492. https://doi.org/10.1016/j.procs.2021.02.088.

[22] Ismail, S., Dawoud, D. W., & Reza, H. (2023). Securing Wireless Sensor Networks Using Machine Learning and Blockchain: A Review. Future Internet, 15(6), 1–45. https://doi.org/10.3390/fi15060200.

[23] Kandris, D., Nakas, C., Vomvas, D., & Koulouras, G. (2020). Applications of wireless sensor networks: An up-to-date survey. Applied System Innovation, 3(1), 1–24. https://doi.org/10.3390/asi3010014.

[24] Qazi, R., Qureshi, K. N., Bashir, F., Islam, N. U., Iqbal, S., & Arshad, A. (2021). Security protocol using elliptic curve cryptography algorithm for wireless sensor networks. Journal of Ambient Intelligence and Humanized Computing, 12(1), 547–566. https://doi.org/10.1007/s12652-020-02020-z.

[25] Ramadevi, P., Ayyasamy, S., Suryaprakash, Y., Anilkumar, C., Vijayakumar, S., & Sudha, R. (2023). Security for wireless sensor networks using cryptography. Measurement: Sensors, 29(August), 100874. https://doi.org/10.1016/j.measen.2023.100874.

[26] Oztoprak, A., Hassanpour, R., Ozkan, A., & Oztoprak, K. (2024). Security Challenges, Mitigation Strategies, and Future Trends in Wireless Sensor Networks: A Review. ACM Computing Surveys, 57(4). https://doi.org/10.1145/3706583.

[27] Nancy, P., Muthurajkumar, S., Ganapathy, S., Santhosh Kumar, S. V. N., Selvi, M., & Arputharaj, K. (2020). Intrusion detection using dynamic feature selection and fuzzy temporal decision tree classification for wireless sensor networks. IET Communications, 14(5), 888–895. https://doi.org/10.1049/iet-com.2019.0172 .

[28] Mengistu, T. M., Kim, T., & Lin, J. W. (2024). A Survey on Heterogeneity Taxonomy, Security and Privacy Preservation in the Integration of IoT, Wireless Sensor Networks and Federated Learning. Sensors, 24(3). https://doi.org/10.3390/s24030968.

[29] Heidari, A., & Mollah, M. (2024). Assessment of reliability and availability of wireless sensor networks in industrial applications by considering permanent faults. Concurrency and Computation: Practice and Experience, 36(3), e8252. https://doi.org/10.1002/cpe.8252.

[30] Keerthika, M., & Shanmugapriya, D. (2021). Wireless Sensor Networks: Active and Passive attacks - Vulnerabilities and Countermeasures. Global Transitions Proceedings, 2(2), 362–367. https://doi.org/10.1016/j.gltp.2021.08.045.

[31] Urooj, S., Lata, S., Ahmad, S., Mehfuz, S., & Kalathil, S. (2023). Cryptographic Data Security for Reliable Wireless Sensor Network. Alexandria Engineering Journal, 72, 37–50. https://doi.org/10.1016/j.aej.2023.03.061.

[32] Panahi, U., & Bayılmış, C. (2023). Enabling secure data transmission for wireless sensor networks based IoT applications. Ain Shams Engineering Journal, 14(2). https://doi.org/10.1016/j.asej.2022.101866.

[33] Ramadevi, P., Ayyasamy, S., Suryaprakash, Y., Anilkumar, C., Vijayakumar, S., & Sudha, R. (2023). Security for wireless sensor networks using cryptography. Measurement: Sensors, 29(August), 100874. https://doi.org/10.1016/j.measen.2023.100874.

[34] Rehman, A., Abdullah, S., Fatima, M., Iqbal, M. W., Almarhabi, K. A., Ashraf, M. U., & Ali, S. (2022). Ensuring Security and Energy Efficiency of Wireless Sensor Network by Using Blockchain. Applied Sciences (Switzerland), 12(21). https://doi.org/10.3390/app122110794.

[35] Hsiao, S. J., & Sung, W. T. (2021). Employing Blockchain Technology to Strengthen Security of Wireless Sensor Networks. IEEE Access, 9, 72326–72341. https://doi.org/10.1109/ACCESS.2021.3079708.

[36] Venčkauskas, A., Taparauskas, M., Grigaliūnas, Š., & Brūzgienė, R. (2024). Enhancing Communication Security an In-Vehicle Wireless Sensor Network. Electronics (Switzerland), 13(6). https://doi.org/10.3390/electronics13061003.

[37] Majid, M., Habib, S., Javed, A. R., Rizwan, M., Srivastava, G., Gadekallu, T. R., & Lin, J. C. W. (2022). Applications of Wireless Sensor Networks and Internet of Things Frameworks in the Industry Revolution 4.0: A Systematic Literature Review. Sensors, 22(6), 1–36. https://doi.org/10.3390/s22062087.

[38] Mahlake, N., Mathonsi, T. E., Du Plessis, D., & Muchenje, T. (2023). A Lightweight Encryption Algorithm to Enhance Wireless Sensor Network Security on the Internet of Things. Journal of Communications, 18(1), 47–57. https://doi.org/10.12720/jcm.18.1.47-57.

[39] Paharia, B., & Bhushan, K. (2019). A comprehensive review of distributed denial of service (DDoS) attacks in fog computing environment. In Handbook of Computer Networks and Cyber Security: Principles and Paradigms. https://doi.org/10.1007/978-3-030-22277-2_20.

[40] Tariq, M. I., Ahmed, S., Memon, N. A., Tayyaba, S., Ashraf, M. W., Nazir, M., Hussain, A., Balas, V. E., & Balas, M. M. (2020). Prioritization of information security controls through fuzzy AHP for cloud computing networks and wireless sensor networks. Sensors (Switzerland), 20(5), 1–36. https://doi.org/10.3390/s20051310.

[41] Moghadam, M. F., Nikooghadam, M., Jabban, M. A. B. Al, Alishahi, M., Mortazavi, L., & Mohajerzadeh, A. (2020). An Efficient Authentication and Key Agreement Scheme Based on ECDH for Wireless Sensor Network. IEEE Access, 8, 73182–73192. https://doi.org/10.1109/ACCESS.2020.2987764.

[42] Nourildean, S. W., Hassib, M. D., & Mohammed, Y. A. (2022). Internet of things based wireless sensor network: a review. Indonesian Journal of Electrical Engineering and Computer Science, 27(1), 246–261. https://doi.org/10.11591/ijeecs.v27.i1.pp246-261.

[43] Chandnani, N., & Khairnar, C. N. (2022). An analysis of architecture, framework, security and challenging aspects for data aggregation and routing techniques in IoT WSNs. Theoretical Computer Science, 929(June 2022), 95–113. https://doi.org/10.1016/j.tcs.2022.06.032.

[44] Putra, F. P. E., R.A, M. K., G, M. W. R., & Huda, V. (2025). Analisis Kinerja dan Keamanan Protokol PPTP dan L2TP/IPSec VPN pada Jaringan MikroTik. 8(2), 334–344. https://doi.org/10.29408/jit.v8i2.30230

[45] Putra, F. P. E., Tamam, A. B., Efendi, R. W., & Muim, Z. (2024). Optimasi Keamanan DNS_ Eksplorasi Optimal dengan Implementasi DNS Security Extensions (DNSSEC). Riset Dan E-Jurnal Manajemen Informatika Komputer, 8(1), 349–358. DOI:10.33395/remik.v8i1.13398.

[46] Putra, F. P. E., Mufidah, K., Ilhamsyah, R. M., Efendy, S. A., & Barokah, S. N. R. (2024). Tinjauan Performa RouterOS Mikrotik dalam Jaringan Internet: Analisis Kinerja dan Kelayakan. Digital Transformation Technology, 3(2), 903–910. https://doi.org/10.47709/digitech.v3i2.3446.

[47] Putra, F. P. E., Ubaidi, U., Hamzah, A., Pramadi, W. A., & Nuraini, A. (2024). Systematic Literature Review: Security Gap Detection On Websites Using Owasp Zap. Brilliance: Research of Artificial Intelligence, 4(1), 348–355. https://doi.org/10.47709/brilliance.v4i1.4227.

[48] Putra, F. P. E., Ubaidi, U., Zulfikri, A., Arifin, G., & Ilhamsyah, R. M. (2024). Analysis of Phishing Attack Trends, Impacts and Prevention Methods: Literature Study. Brilliance: Research of Artificial Intelligence, 4(1), 413–421. https://doi.org/10.47709/brilliance.v4i1.4357.

[49] Prasetyo, F., Putra, E., Mahmud, M. A., & Maqom, I. S. (2024). Pengembangan Sistem Pemantauan Lingkungan Berbasis Internet of Things ( IoT ) di Kampus Digital Transformation Technology ( Digitech ) | e-ISSN : 2807-9000 Pengembangan Sistem Pemantauan Lingkungan Berbasis Internet of Things ( IoT ) di Kampus. March. https://doi.org/10.47709/digitech.v3i2.3457.

[50] Prasetyo, F., Putra, E., Riski, M., Yahya, M. S., & Ramadhan, M. H. (2023). Mengenal Teknologi Jaringan Nirkabel Terbaru Teknologi 5G. Jurnal Sistim Informasi Dan Teknologi, 5(2), 167–174. https://doi.org/10.37034/jsisfotek.v5i1.233.

[51] Putra, F. P. E., Syirofi, S., Wahid, D., & Syam, A. M. (2025). Security Analysis And Data Recovery On Large-Scale Computer Networks. Brilliance: Research of Artificial Intelligence, 5(1), 384–390. https://doi.org/10.47709/brilliance.v5i1.6276.

Unduhan

Diterbitkan

2025-10-24

Cara Mengutip

Security and Privacy Challenges in Wireless Sensor Networks: A Systematic Literature Review of Threat Mitigation Strategies. (2025). Karapan Network Journal : Journal Computer Technology and Mobile Ad Hoc Network, 1(01). https://ejournal.omahtabing.com/knj/article/view/34

Artikel paling banyak dibaca berdasarkan penulis yang sama