Optimizing Energy Consumption in Wireless Sensor Network (WSN) Nodes Through Priority-Based Task Scheduling
Keywords:
Keywords: Wireless Sensor Network, Energy Efficiency, Task Scheduling, Task Priority, Network LifetimeAbstract
Wireless Sensor Networks (WSNs) are low-power wireless network technologies that are widely used in various monitoring applications. However, energy limitations in sensor nodes remain a major problem that affects network lifetime and system reliability. Existing energy conservation approaches generally focus on communication aspects, while internal node task management has not been optimally utilized. This study aims to optimize energy consumption in WSN nodes through the application of priority-based task scheduling to extend network lifetime and improve the success rate of critical task execution. This study uses a simulation-based quantitative study by applying a priority-based task scheduling algorithm at the sensor node level. The performance of the proposed method is compared to scheduling without priority using metrics of average node energy consumption, network lifetime, energy distribution between nodes, and task execution success. Simulation results show that priority-based scheduling can reduce average node energy consumption by approximately 33%, extend network lifetime by up to two times, and increase the success rate of high-priority task execution from 72.5% to 96.8%. Additionally, energy consumption distribution among nodes becomes more stable compared to the non-priority method. The results of the study prove that priority-based task scheduling is effective in optimizing energy consumption and improving the sustainability of WSNs. Further research can develop this approach by considering dynamic priority adaptation and implementation in real WSN environments.
Downloads
References
REFERENSI
[1] F. P. Eka Putra, A. M. Ubaidillah Solichin, M. N. Wildanul Hakim, and M. T. Ramadhan, “Pemanfaatan Teknologi Wireless dan Mobile Network Berbasis 5G Untuk Pemerataan Akses Jaringan di Indonesia,” Infotek J. Inform. dan Teknol., vol. 8, no. 2, pp. 415–425, 2025, doi: 10.29408/jit.v8i2.30559.
[2] I. Kahraman, A. Kose, M. Koca, and E. Anarim, “Age of Information in Internet of Things: A Survey,” IEEE Internet Things J., vol. 11, no. 6, pp. 9896–9914, 2024, doi: 10.1109/JIOT.2023.3324879.
[3] Ade Irawan, Wildan Hamzah Nur Fadholi, Zahwa Erikamaretha, and Fried Sinlae, “Tantangan dan Strategi Manajemen Keamanan Siber di Indonesia berbasis IoT,” J. Zetroem, vol. 6, no. 1, pp. 114–119, 2024, doi: 10.36526/ztr.v6i1.3376.
[4] A. Hazra, P. Rana, M. Adhikari, and T. Amgoth, “Fog computing for next-generation Internet of Things: Fundamental, state-of-the-art and research challenges,” Comput. Sci. Rev., vol. 48, 2023, doi: 10.1016/j.cosrev.2023.100549.
[5] D. Singh, “Internet of Things,” Factories Futur. Technol. Adv. Manuf. Ind., pp. 195–228, 2023, doi: 10.1002/9781119865216.ch9.
[6] Muhammad Rifaldi, N. R. Alham, N. Izzah, M. N. Ihsan, and M. Sugianto, “Analisis Efisiensi Sistem Pembangkit Listrik Tenaga Surya sebagai Sumber Energi Baru Terbarukan,” 2023, pdfs.semanticscholar.org. doi: 10.30872/retrotekin.v1i1.919.
[7] X. Xue, R. Shanmugam, S. K. Palanisamy, O. I. Khalaf, D. Selvaraj, and G. M. Abdulsahib, “A Hybrid Cross Layer with Harris-Hawk-Optimization-Based Efficient Routing for Wireless Sensor Networks,” 2023, mdpi.com. doi: 10.3390/sym15020438.
[8] N. Sajrianto, M. R. Bima, and Dwi Handayani, “Implikasi Integritas Aparatur Kejaksaan Dalam Penegakan Hukum Di Kejaksaan Negeri Gowa,” Innov. J. Soc. Sci. Res., vol. 5, no. 5, pp. 1–14, 2025, doi: 10.31004/innovative.v5i5.21228.
[9] Z. Munawar, N. Indah Putri, I. Iswanto, and D. Widhiantoro, “Analisis Keamanan Pada Teknologi Blockchain,” Infotronik J. Teknol. Inf. dan Elektron., vol. 8, no. 2, p. 67, 2023, doi: 10.32897/infotronik.2023.8.2.2062.
[10] F. P. E. Putra, U. Ubaidi, R. O. F. Kusuma, A. M. Syam, and S. A. Efendy, “Effect Of Distance On Wi-Fi Signal Quality In The Home Environment,” Brill. Res. Artif. Intell., vol. 4, no. 1, pp. 391–398, 2024, doi: 10.47709/brilliance.v4i1.4319.
[11] Muhamad Daffa Maulana Arrasyid, Gilar Sumilar, Dimas Adi Nugraha, and Elkin Rilvani, “Tren Algoritma Penjadwalan Tugas Pada Cloud Computing: Systematic Review Literature,” Modem J. Inform. dan Sains Teknol., vol. 3, no. 1, pp. 106–113, 2025, doi: 10.62951/modem.v3i1.362.
[12] A. Salam, “Internet of Things in Agricultural Innovation and Security,” Internet Things Sustain. Community …, pp. 71–112, 2024, doi: 10.1007/978-3-031-62162-8_3.
[13] F. P. E. Putra, F. Fauzan, S. Syirofi, M. Mursidi, D. Wahid, and A. Nuraini, “Sistem Pengendali Lingkungan Pertanian Dengan Wireless Sensor Network Untuk Mengoptimalkan Budidaya Hidroponik,” 2024. doi: 10.47709/digitech.v3i2.3461.
[14] S. Dargaoui, M. Azrour, A. El Allaoui, A. Guezzaz, A. Alabdulatif, and A. Alnajim, “Internet of Things Authentication Protocols: Comparative Study,” Comput. Mater. Contin., vol. 79, no. 1, pp. 65–91, 2024, doi: 10.32604/cmc.2024.047625.
[15] E. Fazel, M. Z. Nezhad, J. Rezazadeh, M. Moradi, and J. Ayoade, “IoT convergence with machine learning & blockchain: A review,” Internet of Things (Netherlands), vol. 26, 2024, doi: 10.1016/j.iot.2024.101187.
[16] P. Di Juni, M. Arief Hasan, Y. Sri Putri Sitompul, J. Alexander, I. Hidayat, and R. Marco Bilbo, “Audit Keamanan Basis Data Menggunakan Sql Server Audit Untuk Deteksi Aktivitas Tidak Sah,” 2025, ejournal.itn.ac.id. doi: 10.36040/jati.v9i2.13198.
[17] F. P. E. Putra, U. Ubaidi, D. Mayangsari, and N. Hasanah, “Netvista Public Wireless Network Quality Analysis Using Quality Of Service Parameters,” Brill. Res. Artif. Intell., vol. 4, no. 1, pp. 443–452, 2024, doi: 10.47709/brilliance.v4i1.4388.
[18] N. R. Sivakumar, S. M. Nagarajan, G. G. Devarajan, L. Pullagura, and R. P. Mahapatra, “Enhancing network lifespan in wireless sensor networks using deep learning based Graph Neural Network,” Phys. Commun., vol. 59, 2023, doi: 10.1016/j.phycom.2023.102076.
[19] Anggy Giri Prawiyogi and Aang Solahudin Anwar, “Perkembangan Internet of Things (IoT) pada Sektor Energi : Sistematik Literatur Review,” J. MENTARI Manajemen, Pendidik. dan Teknol. Inf., vol. 1, no. 2, pp. 187–197, 2023, doi: 10.34306/mentari.v1i2.254.
[20] K. M. Karthick Raghunath, M. S. Koti, R. Sivakami, V. Vinoth Kumar, G. NagaJyothi, and V. Muthukumaran, “Utilization of IoT-assisted computational strategies in wireless sensor networks for smart infrastructure management,” Int. J. Syst. Assur. Eng. Manag., vol. 15, no. 1, pp. 28–34, 2024, doi: 10.1007/s13198-021-01585-y.
[21] S. S. Vellela and R. Balamanigandan, “An intelligent sleep-awake energy management system for wireless sensor network,” Peer-to-Peer Netw. Appl., vol. 16, no. 6, pp. 2714–2731, 2023, doi: 10.1007/s12083-023-01558-x.
[22] F. P. E. Putra, R. M. Ilhamsyah, S. A. Efendy, and A. Rizki, “Implementation And Evaluation Of Zerotier-Based Virtual Network For Device Connectivity,” Brill. Res. Artif. Intell., vol. 5, no. 1, pp. 281–290, 2025, doi: 10.47709/brilliance.v5i1.5966.
[23] F. Marwati, A. Akrom, and A. Astofa, “Sosialiasi Pengenalan Pentingnya Cyber Security Guna Menjaga Keamanan Data Di Era Digital Pada Siswa/I PKBM Wong Sing Gesit,” JIPM J. Inov. Pengabdi. Masy., vol. 3, no. 1, pp. 11–16, 2025, doi: 10.55903/jipm.v3i1.211.
[24] Fauzan Prasetyo Eka Putra, Dea Aulia Siswoyo, M. Idris Ainul Yaqin, and Rica Oktavia, “Tinjauan Regulasi Siber dan Kebijakan Keamanan Jaringan 5G: Perspektif Nasional dan Internasional,” 2025, researchgate.net. doi: 10.55606/jitek.v5i1.6141.
[25] F. Soleymaani, M. A. Sandidzadeh, and A. Mirabadi, “Calibrating the train position and speed in signalling systems using balises and wireless sensor networks,” Int. J. Sens. Networks, vol. 46, no. 2, pp. 100–113, 2024, doi: 10.1504/IJSNET.2024.141785.
[26] L. Y. Rock, F. P. Tajudeen, and Y. W. Chung, “Usage and impact of the internet-of-things-based smart home technology: a quality-of-life perspective,” 2024, Springer. doi: 10.1007/s10209-022-00937-0.
[27] A. Riyanti, B. M. Rahmanto, D. R. Hardianto, R. D. A. Yuristiawan, and A. Setiawan, “Uji Penetrasi Injeksi SQL terhadap Celah Keamanan Database Website menggunakan SQLmap,” J. Internet Softw. Eng., vol. 1, no. 4, p. 9, 2024, doi: 10.47134/pjise.v1i4.2623.
[28] F. Prasetyo Eka Putra, S. R. Sutarsih, S. Sofiyulloh, P. Permana, and M. Umar Mansyur, “Optimalisasi Perancangan Aplikasi Manajemen Data Koloman, Di Desa Pulau Mandangin Sampang – Madura Berbasis Website,” Rabit J. Teknol. dan Sist. Inf. Univrab, vol. 9, no. 2, pp. 285–294, 2024, doi: 10.36341/rabit.v9i2.4840.
[29] D. Gupta, S. Wadhwa, S. Rani, Z. Khan, and W. Boulila, “EEDC: An Energy Efficient Data Communication Scheme Based on New Routing Approach in Wireless Sensor Networks for Future IoT Applications,” 2023, mdpi.com. doi: 10.3390/s23218839.
[30] D. Darmawan, “Nextcloud: Keamanan Data Terbaik Dengan Manajemen File dan Pengguna yang Cerdas,” J. Sos. Teknol., vol. 4, no. 1, pp. 80–89, 2024, doi: 10.59188/jurnalsostech.v4i1.1130.
[31] J. S. Manoharan, “A Metaheuristic Approach Towards Enhancement of Network Lifetime in Wireless Sensor Networks,” KSII Trans. Internet Inf. Syst., vol. 17, no. 4, pp. 1276–1295, 2023, doi: 10.3837/tiis.2023.04.013.
[32] Azis Hakim, “The Influence of Duties and Education Experience on New Personnel Duties in the Indonesian National Army’s Operating Staff Environment,” Int. J. Soc. Sci. Bus., vol. 7, no. 1, pp. 199–207, 2023, doi: 10.23887/ijssb.v7i1.57654.
[33] S. Syafrudi, J. I. Tambunan, P. K. Handayani, and F. Z. Ray, “Model Implementasi IoT Dual-Fungsi untuk Efisiensi Energi dan Penguatan Literasi Teknologi di Sekolah Menengah Kejuruan,” J. Pengabdi. dan Pengemb. Masy. Indones., vol. 4, no. 2, pp. 155–167, 2025, doi: 10.56303/jppmi.v4i2.518.
[34] F. P. Eka Putra, M. N. Arifin, K. Zulfana Imam, E. Saputra, and Sofiyullah, “Pengembangan Sistem Informasi Laboratorium Terintegerasi Sistem Akademik Menggunakan Agile Scrum,” J. Inf. dan Teknol., pp. 109–119, 2023, doi: 10.37034/jidt.v5i2.367.
[35] P. Pratama, Panji Defa Pratama, and Hozairi, “Penerapan Metode Assignment Problem dalam Optimalisasi Penugasan Guru di Pesantren Menggunakan Excel Solver,” 2025. doi: 10.38204/darmaabdikarya.v4i1.2505.
[36] M. Alrizq et al., “Optimization of sensor node location utilizing artificial intelligence for mobile wireless sensor network,” Wirel. Networks, vol. 30, no. 7, pp. 6619–6631, 2024, doi: 10.1007/s11276-023-03469-4.
[37] M. Ismail, A. Azwar, B. Baharuddin, and H. Hamria, “Analisis Penggunaan Teknologi Blockchain dalam Meningkatkan Keamanan Data: Studi Kasus Industri Keuangan,” J. Janitra Inform. dan Sist. Inf., vol. 5, no. 1, pp. 69–77, 2025, doi: 10.59395/m9krbe73.
[38] E. Pratama, A. Putri Handayani, F. Pebiana Putri, F. Juliana, and A. Perdana, “Pintarjadwalai : Aplikasi Produktivitas Berbasis Web Dengan Integrasi Manajemen Tugas Dan Focus Timer,” JATI (Jurnal Mhs. Tek. Inform., vol. 9, no. 4, pp. 6281–6287, 2025, doi: 10.36040/jati.v9i4.14035.
[39] Kasmawati Kasmawati and Jumrana Jumrana, “Pengaruh Pijat Bayi Terhadap Peningkatan Berat Badan Bayi Umur 3 Bulan di Rumah Sakit Wisata UIT Kota Makassar,” J. Vent., vol. 2, no. 2, pp. 181–210, 2024, doi: 10.59680/ventilator.v2i2.1340.
[40] K. Biswas, V. Muthukkumarasamy, M. J. M. Chowdhury, X. W. Wu, and K. Singh, “A multipath routing protocol for secure energy efficient communication in Wireless Sensor Networks,” Comput. Networks, vol. 232, 2023, doi: 10.1016/j.comnet.2023.109842.
[41] F. B. Prakoso, A. Yuniarto, and A. S. Rahman, “Pengaruh Penerapan Sistem Elevated Reservoir Terhadap Efisiensi Energi di Layanan Pompa Booster Gerilya,” J. Teknol. Lingkung. Lahan Basah, vol. 13, no. 1, pp. 011–020, 2025, doi: 10.26418/jtllb.v13i1.86646.
[42] F. P. Eka Putra, . S., A. Ramadhani, and . M., “Integrasi Teknologi Kuantum dan fiber Optik untuk Meningkatkan Keamanan dan Efisiensi Jaringan Masa Depan,” J. Ilm. Ilk. - Ilmu Komput. Inform., vol. 8, no. 2, pp. 151–163, 2025, doi: 10.47324/ilkominfo.v8i2.342.
[43] N. Meenakshi et al., “Efficient Communication in Wireless Sensor Networks Using Optimized Energy Efficient Engroove Leach Clustering Protocol,” Tsinghua Sci. Technol., vol. 29, no. 4, pp. 985–1001, 2024, doi: 10.26599/TST.2023.9010056.
[44] M. Saadati, S. M. Mazinani, A. A. Khazaei, and S. J. S. M. Chabok, “Energy efficient clustering for dense wireless sensor network by applying Graph Neural Networks with coverage metrics,” Ad Hoc Networks, vol. 156, 2024, doi: 10.1016/j.adhoc.2024.103432.
[45] W. Widiarto, D. Maheswari, D. P. Sari, and K. J. Arianto, “Implementasi Algoritma Round Robin dan Priority Pada Sistem Antrian Rumah Sakit,” J. Fasilkom, vol. 14, no. 2, pp. 507–513, 2024, doi: 10.37859/jf.v14i2.7334.
[46] Z. Marzuki and L. M. F. Purwanto, “Peningkatan Efisiensi Energi Bangunan Melalui Modifikasi Fasad Menggunakan Software Ecotect Gedung Fakultas Teknik Unkris : Sebuah Pendekatan Eksperimental,” Arsitekta J. Arsit. dan Kota Berkelanjutan, vol. 6, no. 01, pp. 30–45, 2024, doi: 10.47970/arsitekta.v6i01.530.
[47] Fauzan Prasetyo Eka Putra, Yogi Setiawan, Samsul Arifin, and Wahyu Hidayatullah, “Peran VPN dalam Menjaga Privasi Pengguna Jaringan Publik,” 2025, researchgate.net. doi: 10.55606/jitek.v5i1.5834.
[48] L. A. Pangestu, S. H. Suryawan, and A. J. Latipah, “Penerapan Algoritma Genetika Dalam Penjadwalan Mata Pelajaran,” 2023, academia.edu. doi: 10.31294/inf.v10i2.16701.
[49] Rangga Gelar Guntara, M. Rizki Nugraha, Y. Prasetyo, and R. Aprilia, “Implementasi Algoritma Genetika Untuk Aplikasi Penjadwalan Sidang Tugas Akhir Berbasis Web,” J. Minfo Polgan, vol. 12, no. 2, pp. 2224–2232, 2023, doi: 10.33395/jmp.v12i2.13206.
[50] V. Sharma et al., “OGAS: Omni-directional Glider Assisted Scheme for autonomous deployment of sensor nodes in open area wireless sensor network,” ISA Trans., vol. 132, pp. 131–145, 2023, doi: 10.1016/j.isatra.2022.08.001.
Published
Issue
Section
License
Copyright (c) 2025 Moh Gilank Alamsyah, Suro Jalil (Penulis)

This work is licensed under a Creative Commons Attribution 4.0 International License.








