Penerapan Algoritma Enkripsi Efisien untuk Melindungi Data pada Jaringan Sensor Nirkabel yang Terintegrasi dengan IoT

Penulis

Kata Kunci:

Wireless Sensor Network, Tiny Encryption Algorithm, enkripsi ringan, efisiensi energi, keamanan data

Abstrak

Wireless Sensor Network (WSN) memiliki banyak aplikasi dalam dunia Internet of Things (IoT), mulai dari pemantauan lingkungan hingga pertanian cerdas dan sistem kesehatan. Meskipun demikian, WSN memiliki tantangan utama dalam hal keamanan data karena keterbatasan sumber daya yang dimiliki oleh node sensor, seperti daya, kapasitas pemrosesan, dan memori. Untuk itu, diperlukan algoritma enkripsi yang efisien yang dapat menjaga kerahasiaan data tanpa membebani sumber daya secara berlebihan. Salah satu solusi yang banyak dipertimbangkan adalah penggunaan Tiny Encryption Algorithm (TEA). Penelitian ini bertujuan untuk menganalisis implementasi algoritma enkripsi TEA pada WSN berbasis IoT dan membandingkannya dengan AES-128 dari segi efisiensi energi dan waktu komputasi. Hasil penelitian menunjukkan bahwa TEA memiliki keunggulan dalam hal efisiensi energi dan waktu komputasi yang lebih baik dibandingkan dengan AES-128, menjadikannya solusi ideal untuk aplikasi WSN yang memiliki sumber daya terbatas.

Unduhan

Data unduhan tidak tersedia.

Referensi

[1] F. P. E. Putra, U. Ubaidi, R. N. Saputra, F. M. Haris, and S. N. R. Barokah, “Application of Internet of Things Technology in Monitoring Water Quality in Fishponds,” Brilliance: Research of Artificial Intelligence, vol. 4, no. 1, pp. 356–361, Jul. 2024, doi: 10.47709/brilliance.v4i1.4231.

[2] A. M. K. Abdulzahra, A. K. M. Al-Qurabat, and S. A. Abdulzahra, “Optimizing energy consumption in WSN-based IoT using unequal clustering and sleep scheduling methods,” Internet of Things, vol. 22, p. 100765, Jul. 2023, doi: 10.1016/j.iot.2023.100765.

[3] P. Jagannathan, S. Gurumoorthy, A. Stateczny, P. Divakarachar, and J. Sengupta, “Collision-Aware Routing Using Multi-Objective Seagull Optimization Algorithm for WSN-Based IoT,” Sensors, vol. 21, no. 24, p. 8496, Dec. 2021, doi: 10.3390/s21248496.

[4] O. Gurewitz, M. Shifrin, and E. Dvir, “Data Gathering Techniques in WSN: A Cross-Layer View,” Sensors, vol. 22, no. 7, p. 2650, Mar. 2022, doi: 10.3390/s22072650.

[5] S. Tumula et al., “An opportunistic energy‐efficient dynamic self‐configuration clustering algorithm in WSN‐based IoT networks,” International Journal of Communication Systems, vol. 37, no. 1, Jan. 2024, doi: 10.1002/dac.5633.

[6] R. Ramya and T. Brindha, “Fuzzy‐Driven Cluster Head Selection and Deep Learning Prediction on the Basis of Hybrid Optimization Algorithm for Multiobjective Routing in WSN‐IoT,” International Journal of Communication Systems, vol. 38, no. 12, Aug. 2025, doi: 10.1002/dac.70162.

[7] A. Salim, W. Osamy, A. Aziz, and A. M. Khedr, “SEEDGT: Secure and energy efficient data gathering technique for IoT applications based WSNs,” Journal of Network and Computer Applications, vol. 202, p. 103353, Jun. 2022, doi: 10.1016/j.jnca.2022.103353.

[8] M. Krishnan and Y. Lim, “Reinforcement learning-based dynamic routing using mobile sink for data collection in WSNs and IoT applications,” Journal of Network and Computer Applications, vol. 194, p. 103223, Nov. 2021, doi: 10.1016/j.jnca.2021.103223.

[9] M. Krishnan and Y. Lim, “Reinforcement learning-based dynamic routing using mobile sink for data collection in WSNs and IoT applications,” Journal of Network and Computer Applications, vol. 194, p. 103223, Nov. 2021, doi: 10.1016/j.jnca.2021.103223.

[10] D. Gopika and R. Panjanathan, “WITHDRAWN: Energy efficient routing protocols for WSN based IoT applications: A review,” Mater Today Proc, Nov. 2020, doi: 10.1016/j.matpr.2020.10.137.

[11] M. Shahid et al., “Link-Quality-Based Energy-Efficient Routing Protocol for WSN in IoT,” IEEE Transactions on Consumer Electronics, vol. 70, no. 1, pp. 4645–4653, Feb. 2024, doi: 10.1109/TCE.2024.3356195.

[12] N. R. Patel, S. Kumar, and S. K. Singh, “Energy and Collision Aware WSN Routing Protocol for Sustainable and Intelligent IoT Applications,” IEEE Sens J, vol. 21, no. 22, pp. 25282–25292, Nov. 2021, doi: 10.1109/JSEN.2021.3076192.

[13] M. Shafiq et al., “Robust Cluster-Based Routing Protocol for IoT-Assisted Smart Devices in WSN,” Computers, Materials & Continua, vol. 67, no. 3, pp. 3505–3521, 2021, doi: 10.32604/cmc.2021.015533.

[14] R. B. Pedditi and K. Debasis, “Energy Efficient Routing Protocol for an IoT-Based WSN System to Detect Forest Fires,” Applied Sciences, vol. 13, no. 5, p. 3026, Feb. 2023, doi: 10.3390/app13053026.

[15] G. Arya, A. Bagwari, and D. S. Chauhan, “Performance Analysis of Deep Learning-Based Routing Protocol for an Efficient Data Transmission in 5G WSN Communication,” IEEE Access, vol. 10, pp. 9340–9356, 2022, doi: 10.1109/ACCESS.2022.3142082.

[16] H. Benyezza, M. Bouhedda, R. Kara, and S. Rebouh, “Smart platform based on IoT and WSN for monitoring and control of a greenhouse in the context of precision agriculture,” Internet of Things, vol. 23, p. 100830, Oct. 2023, doi: 10.1016/j.iot.2023.100830.

[17] H. Benyezza, M. Bouhedda, R. Kara, and S. Rebouh, “Smart platform based on IoT and WSN for monitoring and control of a greenhouse in the context of precision agriculture,” Internet of Things, vol. 23, p. 100830, Oct. 2023, doi: 10.1016/j.iot.2023.100830.

[18] U. Panahi and C. Bayılmış, “Enabling secure data transmission for wireless sensor networks based IoT applications,” Ain Shams Engineering Journal, vol. 14, no. 2, p. 101866, Mar. 2023, doi: 10.1016/j.asej.2022.101866.

[19] K. Ramana, A. Revathi, A. Gayathri, R. H. Jhaveri, C. V. L. Narayana, and B. N. Kumar, “WOGRU-IDS — An intelligent intrusion detection system for IoT assisted Wireless Sensor Networks,” Comput Commun, vol. 196, pp. 195–206, Dec. 2022, doi: 10.1016/j.comcom.2022.10.001.

[20] S. S. Sahoo, S. Mohanty, K. S. Sahoo, M. Daneshmand, and A. H. Gandomi, “A Three-Factor-Based Authentication Scheme of 5G Wireless Sensor Networks for IoT System,” IEEE Internet Things J, vol. 10, no. 17, pp. 15087–15099, Sep. 2023, doi: 10.1109/JIOT.2023.3264565.

[21] T. Saba, K. Haseeb, A. A. Shah, A. Rehman, U. Tariq, and Z. Mehmood, “A Machine-Learning-Based Approach for Autonomous IoT Security,” IT Prof, vol. 23, no. 3, pp. 69–75, May 2021, doi: 10.1109/MITP.2020.3031358.

[22] F. P. E. Putra, U. Ubaidi, A. Hamzah, W. A. Pramadi, and A. Nuraini, “Systematic Literature Review: Security Gap Detection On Websites Using Owasp Zap,” Brilliance: Research of Artificial Intelligence, vol. 4, no. 1, pp. 348–355, Jul. 2024, doi: 10.47709/brilliance.v4i1.4227.

[23] F. P. E. Putra, U. Ubaidi, A. B. Tamam, and R. W. Efendi, “Implementation And Simulation Of Dynamic Arp Inspection In Cisco Packet Tracer For Network Security,” Brilliance: Research of Artificial Intelligence, vol. 4, no. 1, pp. 340–347, Jul. 2024, doi: 10.47709/brilliance.v4i1.4199.

[24] S. M. Hussein, J. A. López Ramos, and A. M. Ashir, “A Secure and Efficient Method to Protect Communications and Energy Consumption in IoT Wireless Sensor Networks,” Electronics (Basel), vol. 11, no. 17, p. 2721, Aug. 2022, doi: 10.3390/electronics11172721.

[25] S. Nagaraj et al., “Improved Secure Encryption with Energy Optimization Using Random Permutation Pseudo Algorithm Based on Internet of Thing in Wireless Sensor Networks,” Energies (Basel), vol. 16, no. 1, p. 8, Dec. 2022, doi: 10.3390/en16010008.

[26] S. Hriez, S. Almajali, H. Elgala, M. Ayyash, and H. B. Salameh, “A Novel Trust-Aware and Energy-Aware Clustering Method That Uses Stochastic Fractal Search in IoT-Enabled Wireless Sensor Networks,” IEEE Syst J, vol. 16, no. 2, pp. 2693–2704, Jun. 2022, doi: 10.1109/JSYST.2021.3065323.

[27] F. P. E. Putra, R. M. Ilhamsyah, S. A. Efendy, and A. Rizki, “Implementation And Evaluation Of Zerotier-Based Virtual Network For Device Connectivity,” Brilliance: Research of Artificial Intelligence, vol. 5, no. 1, pp. 281–290, Jun. 2025, doi: 10.47709/brilliance.v5i1.5966.

[28] F. P. E. Putra, N. Ramadhani, F. Fauzan, and Moh. Mursidi, “Service Quality Analysis of RFID-Based Smart Door Lock in Front One Azana Style Hotel Area,” Brilliance: Research of Artificial Intelligence, vol. 4, no. 1, pp. 372–381, Jul. 2024, doi: 10.47709/brilliance.v4i1.4292.

[29] D. Antony Joseph Rajan and E. R. Naganathan, “Trust based anonymous intrusion detection for cloud assisted WSN-IOT,” Global Transitions Proceedings, vol. 3, no. 1, pp. 104–108, Jun. 2022, doi: 10.1016/j.gltp.2022.04.022.

[30] F. P. E. Putra, Moh. Irfan, M. Aziz, and R. N. Saputra, “Wireless Network Design at Pamekasan Regency Public Library,” Brilliance: Research of Artificial Intelligence, vol. 5, no. 1, pp. 144–150, May 2025, doi: 10.47709/brilliance.v5i1.5876.

[31] F. P. E. Putra, F. Mu’minin, A. Nuraini, S. N. R. Barokah, and K. Khairurrozi, “Designing an Information System for Student Admissions at SMAN 1 Pademawu Using the Waterfall Method,” Brilliance: Research of Artificial Intelligence, vol. 5, no. 1, pp. 582–591, Jul. 2025, doi: 10.47709/brilliance.v5i1.6508.

[32] H. Yu and Y. Bin Zikria, “Cognitive Radio Networks for Internet of Things and Wireless Sensor Networks,” Sensors, vol. 20, no. 18, p. 5288, Sep. 2020, doi: 10.3390/s20185288.

[33] G. Gardašević, K. Katzis, D. Bajić, and L. Berbakov, “Emerging Wireless Sensor Networks and Internet of Things Technologies—Foundations of Smart Healthcare,” Sensors, vol. 20, no. 13, p. 3619, Jun. 2020, doi: 10.3390/s20133619.

[34] S. Shankar, G. Deepika, G. Devi, S. Ramesh, S. Srivastava, and S. S. Kumar, “Development of Efficient Wireless Sensor Network for IoT Applications,” in 2023 3rd International Conference on Pervasive Computing and Social Networking (ICPCSN), IEEE, Jun. 2023, pp. 1419–1424. doi: 10.1109/ICPCSN58827.2023.00237.

[35] S. Ghorpade, M. Zennaro, and B. S. Chaudhari, “Towards green computing: intelligent bio-inspired agent for IoT-enabled wireless sensor networks,” International Journal of Sensor Networks, vol. 35, no. 2, p. 121, 2021, doi: 10.1504/IJSNET.2021.113632.

[36] M. Z. Ghawy et al., “An Effective Wireless Sensor Network Routing Protocol Based on Particle Swarm Optimization Algorithm,” Wirel Commun Mob Comput, vol. 2022, no. 1, Jan. 2022, doi: 10.1155/2022/8455065.

[37] S. Subramani and M. Selvi, “Multi-objective PSO based feature selection for intrusion detection in IoT based wireless sensor networks,” Optik (Stuttg), vol. 273, p. 170419, Feb. 2023, doi: 10.1016/j.ijleo.2022.170419.

[38] J. N. Ndunagu, K. E. Ukhurebor, M. Akaaza, and R. B. Onyancha, “Development of a Wireless Sensor Network and IoT-based Smart Irrigation System,” Appl Environ Soil Sci, vol. 2022, pp. 1–13, Jun. 2022, doi: 10.1155/2022/7678570.

[39] E. Hajian, M. R. Khayyambashi, and N. Movahhedinia, “A Mechanism for Load Balancing Routing and Virtualization Based on SDWSN for IoT Applications,” IEEE Access, vol. 10, pp. 37457–37476, 2022, doi: 10.1109/ACCESS.2022.3164693.

[40] C. Jothikumar, K. Ramana, V. D. Chakravarthy, S. Singh, and I.-H. Ra, “An Efficient Routing Approach to Maximize the Lifetime of IoT-Based Wireless Sensor Networks in 5G and Beyond,” Mobile Information Systems, vol. 2021, pp. 1–11, Jul. 2021, doi: 10.1155/2021/9160516.

[41] S. Rajasoundaran et al., “Secure routing with multi-watchdog construction using deep particle convolutional model for IoT based 5G wireless sensor networks,” Comput Commun, vol. 187, pp. 71–82, Apr. 2022, doi: 10.1016/j.comcom.2022.02.004.

[42] F. P. E. Putra, U. Ubaidi, M. A. Huda, H. Hasbullah, and A. Rohman, “Computer Network Management Optimization Through Big Data Analysis Using Time Series Analysis Method,” Brilliance: Research of Artificial Intelligence, vol. 4, no. 1, pp. 434–442, Aug. 2024, doi: 10.47709/brilliance.v4i1.4373.

[43] F. P. E. Putra, U. Ubaidi, A. Zulfikri, G. Arifin, and R. M. Ilhamsyah, “Analysis of Phishing Attack Trends, Impacts and Prevention Methods: Literature Study,” Brilliance: Research of Artificial Intelligence, vol. 4, no. 1, pp. 413–421, Aug. 2024, doi: 10.47709/brilliance.v4i1.4357.

[44] F. P. E. Putra, U. Ubaidi, R. O. F. Kusuma, A. M. Syam, and S. A. Efendy, “Effect Of Distance On Wi-Fi Signal Quality In The Home Environment,” Brilliance: Research of Artificial Intelligence, vol. 4, no. 1, pp. 391–398, Aug. 2024, doi: 10.47709/brilliance.v4i1.4319.

[45] A. F. Rachman, F. P. E. Putra, S. Syirofi, and D. Wahid, “Case Study of Computer Network Development for the Internet Of Things (IoT) Industry in an Urban Environment,” Brilliance: Research of Artificial Intelligence, vol. 4, no. 1, pp. 399–407, Aug. 2024, doi: 10.47709/brilliance.v4i1.4302.

[46] T. M. Bandara, W. Mudiyanselage, and M. Raza, “Smart farm and monitoring system for measuring the Environmental condition using wireless sensor network - IOT Technology in farming,” in 2020 5th International Conference on Innovative Technologies in Intelligent Systems and Industrial Applications (CITISIA), IEEE, Nov. 2020, pp. 1–7. doi: 10.1109/CITISIA50690.2020.9371830.

[47] J. R. Arunkumar, S. Velmurugan, B. Chinnaiah, G. Charulatha, M. Ramkumar Prabhu, and A. Prabhu Chakkaravarthy, “Logistic Regression with Elliptical Curve Cryptography to Establish Secure IoT,” Computer Systems Science and Engineering, vol. 45, no. 3, pp. 2635–2645, 2023, doi: 10.32604/csse.2023.031605.

[48] R. Cheour, S. Khriji, M. abid, and O. Kanoun, “Microcontrollers for IoT: Optimizations, Computing Paradigms, and Future Directions,” in 2020 IEEE 6th World Forum on Internet of Things (WF-IoT), IEEE, Jun. 2020, pp. 1–7. doi: 10.1109/WF-IoT48130.2020.9221219.

[49] Md. N. Mowla, N. Mowla, A. F. M. S. Shah, K. M. Rabie, and T. Shongwe, “Internet of Things and Wireless Sensor Networks for Smart Agriculture Applications: A Survey,” IEEE Access, vol. 11, pp. 145813–145852, 2023, doi: 10.1109/ACCESS.2023.3346299.

[50] B. B. Gupta and M. Quamara, “An overview of Internet of Things (IoT): Architectural aspects, challenges, and protocols,” Concurr Comput, vol. 32, no. 21, Nov. 2020, doi: 10.1002/cpe.4946.

Unduhan

Diterbitkan

2025-12-25

Cara Mengutip

Penerapan Algoritma Enkripsi Efisien untuk Melindungi Data pada Jaringan Sensor Nirkabel yang Terintegrasi dengan IoT. (2025). Karapan Network Journal : Journal Computer Technology and Mobile Ad Hoc Network, 2(01). https://ejournal.omahtabing.com/knj/article/view/83

Artikel paling banyak dibaca berdasarkan penulis yang sama