Implementation of Triple Des on Rat Pest Attack Detection Data Using Lora Transmission

Authors

  • Muhammad Nanak Zakaria Politeknik Negeri Malang
  • Rizky Ardiansyah Politeknik Negeri Malang
  • Muhammad Ibnu Atho’illah Politeknik Negeri Malang

DOI:

https://doi.org/10.33795/jartel.v15i4.8652

Keywords:

Triple DES, LoRa, encryption, pest detection, WSN, cryptography, LoRaWAN

Abstract

Information security is a critical requirement in Wireless Sensor Networks (WSN), where resource-constrained sensor nodes must ensure confidentiality, integrity, and availability of transmitted data. LoRa (Long Range) is widely adopted in WSN due to its long-range coverage and low power consumption, but it lacks built-in security, leaving data vulnerable to interception and attacks such as eavesdropping, selective forwarding, sinkhole, and wormhole. This research addresses these vulnerabilities by implementing the Triple Data Encryption Standard (3DES) algorithm in a LoRa-based WSN rat pest detection system. The proposed system consists of an ESP32 with a PIR sensor and buzzer as sensor nodes, a LoRa module for communication, a LoRaWAN gateway, The Things Network (TTN) as middleware, and Node-RED for data processing and visualization. Experimental results show that 3DES can be executed in real time with an average encryption delay of 1.4 milliseconds. The decryption process achieved 100% accuracy, ensuring data integrity and confidentiality, while also demonstrating resilience against ciphertext-only attacks. These findings confirm that integrating 3DES strengthens the security of LoRa-based WSN, providing a reliable cryptographic solution for smart agriculture applications, particularly in rat pest detection systems.

References

D. K. Gupta et al., “Load Frequency Control Analysis of Cyber-Physical Power System with Denial-of-Service Attack in Deregulated Power Markets,” Smart Grids Sustain. Energy, vol. 10, no. 1, p. 22, 2025, doi: 10.1007/s40866-025-00250-8.

M. C. Osazuwa, O. Mitchell, and C. Osazuwa, “Confidentiality, Integrity, and Availability in Network Systems: A Review of Related Literature,” Int. J. Innov. Sci. Res. Technol., vol. 8, no. December 2023, 2023, doi: 10.5281/zenodo.10464076.

S. Nurul, Shynta Anggrainy, and Siska Aprelyani, “Faktor-Faktor Yang Mempengaruhi Keamanan Sistem Informasi: Keamanan Informasi, Teknologi Informasi Dan Network (Literature Review Sim),” J. Ekon. Manaj. Sist. Inf., vol. 3, no. 5, pp. 564–573, 2022, doi: 10.31933/jemsi.v3i5.992.

J. Qadir, “Cybersecurity in LoRaWAN Networks: Vulnerability Analysis and Enhancing Security Measures for IoT Connectivity,” 2023.

P. Maurya, A. Hazra, P. Kumari, T. B. Sørensen, and S. K. Das, “A Comprehensive Survey of Data-Driven Solutions for LoRaWAN: Challenges and Future Directions,” ACM Trans. Internet Things, vol. 6, no. 1, 2025, doi: 10.1145/3711953.

M. F. Iman, A. Kusyanti, and R. Primananda, “Implementasi Algoritme Clefia 128-Bit untuk Pengamanan Modul Komunikasi Lora,” J. Teknol. Inf. dan Ilmu Komput., vol. 9, no. 7, pp. 1647–1654, 2022, doi: 10.25126/jtiik.2022976766.

A. Budillon, F. Mazzenga, and P. Tognolatti, “Challenges and opportunities in LoRaWAN security: exploring protocol vulnerabilities, privacy threats and the role of edge computing,” no. 1706250, 2024, [Online]. Available: https://iris.uniroma1.it/handle/11573/1700890

F. Saghaei, H. R. Zarandi, and M. Tavakkoli, “A Comprehensive Vulnerability Analysis of LoRaWAN- based Cyber-Physical Systems in the Presence of EMI and PSD Transient Faults,” 2025.

M. Alfarisi and H. Nurwarsito, “Analisis Dampak Serangan Wormhole terhadap Protokol Routing Ad-Hoc On Demand Distance Vector (AODV) pada LoRa,” … Teknol. Inf. dan Ilmu …, vol. 6, no. 5, pp. 2054–2063, 2022, [Online]. Available: https://j-ptiik.ub.ac.id/index.php/j-ptiik/article/view/10994

J. R. Gómez, H. F. V. Montoya, and Á. L. Henao, “Implementing a Wormhole Attack on Wireless Sensor Networks with XBee S2C Devices,” Rev. Colomb. Comput., vol. 20, no. 1, pp. 41–58, 2019, doi: 10.29375/25392115.3606.

N. E. W. Industries, D. Economy, P. Of, and T. H. E. Future, “Sessions Schedule & Abstracts Програма & Резюмета”.

M. Jouhari, N. Saeed, M. S. Alouini, and E. M. Amhoud, “A Survey on Scalable LoRaWAN for Massive IoT: Recent Advances, Potentials, and Challenges,” IEEE Commun. Surv. Tutorials, vol. 25, no. 3, pp. 1841–1876, 2023, doi: 10.1109/COMST.2023.3274934.

A. H. Alshehri, “Wormhole attack detection and mitigation model for Internet of Things and WSN using machine learning,” PeerJ Comput. Sci., vol. 10, pp. 1–22, 2024, doi: 10.7717/PEERJ-CS.2257.

K. Ntshabele, B. Isong, N. Gasela, and A. M. Abu-Mahfouz, “A Comprehensive Analysis of LoRaWAN Key Security Models and Possible Attack Solutions,” Mathematics, vol. 10, no. 19, pp. 1–19, 2022, doi: 10.3390/math10193421.

M. H. M. Baig, H. B. Ul Haq, and W. Habib, “A Comparative Analysis of AES, RSA, and 3DES Encryption Standards based on Speed and Performance,” Manag. Sci. Adv., vol. 1, no. 1, pp. 20–30, 2024, doi: 10.31181/msa1120244.

M. Siahaan and J. Manurung, “Perancangan Aplikasi Penyandian Teks Menggunakan Algoritma Triple DES,” J. Ilmu Komput. dan Sist. …, vol. 3, no. 3, pp. 197–201, 2021, [Online]. Available: http://ejournal.sisfokomtek.org/index.php/jikom/article/view/116

S. Abboud and N. Abdoun, “Enhancing LoRaWAN Security: An Advanced AES-Based Cryptographic Approach,” IEEE Access, vol. 12, no. December 2023, pp. 2589–2606, 2024, doi: 10.1109/ACCESS.2023.3348416.

P. Thaenkaew, B. Quoitin, and A. Meddahi, “Leveraging Larger AES Keys in LoRaWAN: A Practical Evaluation of Energy and Time Costs,” Sensors, vol. 23, no. 22, pp. 1–23, 2023, doi: 10.3390/s23229172.

Z. Basim, “Steganografi Dengan Algoritma Eof Untuk Keamanan Data Berbasis Desktop Pada Smk As- Su ’ Udiyyah,” Skanika, vol. 3, no. 4, pp. 54–60, 2020.

V. Bonilla, B. Campoverde, and S. G. Yoo, “A Systematic Literature Review of LoRaWAN: Sensors and Applications,” Sensors, vol. 23, no. 20, 2023, doi: 10.3390/s23208440.

D. Hercog, T. Lerher, M. Truntič, and O. Težak, “Design and Implementation of ESP32-Based IoT Devices,” Sensors, vol. 23, no. 15, 2023, doi: 10.3390/s23156739.

M. Bender, E. Kirdan, M. O. Pahl, and G. Carle, “Open-source MQTT evaluation,” 2021 IEEE 18th Annu. Consum. Commun. Netw. Conf. CCNC 2021, no. January 2021, pp. 1–5, 2021, doi: 10.1109/CCNC49032.2021.9369499.

M. A. Ferrag, L. Maglaras, A. Ahmim, M. Derdour, and H. Janicke, “RDTIDS: Rules and decision tree-based intrusion detection system for internet-of-things networks,” Futur. Internet, vol. 12, no. 3, pp. 1–14, 2020, doi: 10.3390/fi12030044.

I. B. P. Widja, “Rancang Bangun Media Storage Berbasis Armbian Menggunakan Orange-Pi dan Openmediavault,” Patria Artha Technol. J., vol. 5, no. 1, pp. 19–32, 2021, doi: 10.33857/patj.v5i1.396.

J. W. Jolles, “Broad-scale applications of the Raspberry Pi: A review and guide for biologists,” Methods Ecol. Evol., vol. 12, no. 9, pp. 1562–1579, 2021, doi: 10.1111/2041-210X.13652.

H. Yamashika, W. Mustakim, and M. Giatman, “Mobile Application Design For Learning Digital Engineering Based On Figma And Android Studio,” J. Comput. Sci. Inf. Technol. Telecommun. Eng., vol. 4, no. 1, pp. 370–376, 2023, doi: 10.30596/jcositte.v4i1.13184

Downloads

Published

29-12-2025

How to Cite

Zakaria, M. N., Ardiansyah, R., & Atho’illah, M. I. (2025). Implementation of Triple Des on Rat Pest Attack Detection Data Using Lora Transmission. JURNAL JARTEL: Jurnal Jaringan Telekomunikasi, 15(4), 494–502. https://doi.org/10.33795/jartel.v15i4.8652