Energy-Efficient Intelligent Routing Protocol for Wireless Sensor Networks Using Hybrid PSO-GA Optimization
Keywords:
Wireless Sensor Networks, Energy Efficiency, Routing Protocol, Particle Swarm Optimization, Genetic Algorithm.Abstract
Energy management is a major challenge in Wireless Sensor Networks (WSN), as the limited battery power of sensor nodes directly affects network lifetime. Various studies have focused on energy efficiency through the design of intelligent routing protocols, but most still face problems of load balancing and slow convergence. This study aims to develop a Hybrid Particle Swarm Optimization – Genetic Algorithm (PSO-GA) based intelligent routing protocol to improve energy efficiency and network stability. A quantitative approach was used through MATLAB-based experimental simulations with a first-order radio energy model. The PSO algorithm was used to accelerate convergence, while GA maintained solution diversity so that the system did not get stuck at a local optimum. Simulation results show that Hybrid PSO-GA can reduce energy consumption by up to 25%, extend network lifetime by 32%, increase packet delivery ratio to 96.4%, and reduce average delay to 0.22 seconds compared to conventional protocols. The hybrid approach proves effective in balancing energy consumption between nodes and maintaining communication stability. These results indicate that Hybrid PSO-GA has the potential to become the basis for developing future intelligent routing protocols for WSNs and large-scale IoT applications.
Downloads
References
REFERENSI
[1] S. A. Moeed, S. A. Syed, G. B. Mohammad, V. Prashanthi, and S. Nimmala, “Efficient Hybrid Mayfly-Harris Hawks Optimization Support Vector Machine (EMHHO-SVM) Based Data Aggregation and Clustering Technique for Wireless Sensor Networks,” Wirel. Pers. Commun., vol. 142, no. 1–2, pp. 39–101, 2025, doi: 10.1007/s11277-025-11799-z.
[2] O. Pinarer and O. Komili, “Humanity Lifeline: A Resilient Communication and Sensor Network Framework for Disaster Response,” IEEE Access, vol. 13, pp. 95922–95933, 2025, doi: 10.1109/ACCESS.2025.3575712.
[3] D. Eun Lee, K. Nakamura, and B. W. Hong, “Diffusion Models With Implicit Conditions Driven by Latent Shifts,” IEEE Access, vol. 13, pp. 152651–152668, 2025, doi: 10.1109/ACCESS.2025.3603215.
[4] M. Furka, M. Kaluz, M. Fikar, and M. Klauco, “Guidelines for Secure Process Control: Harnessing the Power of Homomorphic Encryption and State Feedback Control,” IEEE Access, vol. 11, pp. 110328–110341, 2023, doi: 10.1109/ACCESS.2023.3322035.
[5] M. Azlor, B. Martinez, M. Gasulla, and F. Reverter, “Study of the Applicability and Limitations of the FOCV Technique for Indoor Low-Area PV Cells,” IEEE Trans. Instrum. Meas., vol. 74, 2025, doi: 10.1109/TIM.2025.3527620.
[6] F. P. E. Putra, U. Ubaidi, A. Hamzah, W. A. Pramadi, and A. Nuraini, “Systematic Literature Review: Security Gap Detection On Websites Using Owasp Zap,” Brill. Res. Artif. Intell., vol. 4, no. 1, pp. 348–355, 2024, doi: 10.47709/brilliance.v4i1.4227.
[7] I. Shallari, I. S. Leal, S. Krug, A. Jantsch, and M. O’Nils, “Design Space Exploration for an IoT Node: Trade-Offs in Processing and Communication,” IEEE Access, vol. 9, pp. 65078–65090, 2021, doi: 10.1109/ACCESS.2021.3074875.
[8] F. P. Eka Putra, F. Muslim, N. Hasanah, Holipah, R. Paradina, and R. Alim, “Analisis Komparasi Protokol Websocket dan MQTT Dalam Proses Push Notification,” J. Sistim Inf. dan Teknol., pp. 63–72, 2024, doi: 10.60083/jsisfotek.v5i4.325.
[9] F. P. Eka Putra, A. M. Ubaidillah Solichin, M. N. Wildanul Hakim, and M. T. Ramadhan, “Pemanfaatan Teknologi Wireless dan Mobile Network Berbasis 5G Untuk Pemerataan Akses Jaringan di Indonesia,” Infotek J. Inform. dan Teknol., vol. 8, no. 2, pp. 415–425, 2025, doi: 10.29408/jit.v8i2.30559.
[10] F. P. Eka Putra, L. Fitriyah, Z. Naimah, and S. A. Rofika, “Evaluasi Kinerja Aplikasi Wireshark Dalam Monitoring Jaringan Kecil Dengan Topologi Star dan Bus,” J. Ilm. Ilk. - Ilmu Komput. Inform., vol. 8, no. 2, pp. 164–176, 2025, doi: 10.47324/ilkominfo.v8i2.343.
[11] P. Camarillo-Ramirez, F. Cervantes-Alvarez, and L. F. Gutierrez-Preciado, “Semantic Maps for Knowledge Graphs: A Semantic-Based Summarization Approach,” IEEE Access, vol. 12, pp. 6729–6744, 2024, doi: 10.1109/ACCESS.2024.3351170.
[12] Q. Zhen, J. Shi, T. Na, H. Wang, and J. Sun, “Numerical study on energy harvesting from flow-induced vibrations of dual-interfering-cylinders in ocean currents,” Phys. Fluids, vol. 37, no. 9, 2025, doi: 10.1063/5.0282953.
[13] S. Safiuddin and F. P. E. Putra, “Strategi Efisiensi Wireless Sensor Network (WSN),” INFORMATICS Educ. Prof. J. Informatics, vol. 8, no. 1, p. 52, 2023, doi: 10.51211/itbi.v8i1.2441.
[14] F. P. E. Putra, F. Fauzan, S. Syirofi, M. Mursidi, D. Wahid, and A. Nuraini, “Sistem Pengendali Lingkungan Pertanian Dengan Wireless Sensor Network Untuk Mengoptimalkan Budidaya Hidroponik,” 2024. doi: 10.47709/digitech.v3i2.3461.
[15] K. Aravind and P. K. R. Maddikunta, “Optimized Fuzzy Logic Based Energy-Efficient Geographical Data Routing in Internet of Things,” IEEE Access, vol. 12, pp. 18913–18930, 2024, doi: 10.1109/ACCESS.2024.3354174.
[16] A. Zulfikri, F. P. E. Putra, M. A. Huda, H. Hasbullah, M. Mahendra, and M. Surur, “Analisis Keamanan Jaringan Dari Serangan Malware Menggunakan Filtering Firewall Dengan Port Blocking,” 2023. doi: 10.47709/digitech.v3i2.3379.
[17] S. Burok, F. P. Eka Putra, Akmal, and L. Fermadi, “Anti - Klon Pendekatan Ringan untuk Mendeteksi Serangan Kloning RFID,” Infotek J. Inform. dan Teknol., vol. 8, no. 2, pp. 458–468, 2025, doi: 10.29408/jit.v8i2.30392.
[18] F. Prasetyo Eka Putra, S. R. Sutarsih, S. Sofiyulloh, P. Permana, and M. Umar Mansyur, “Optimalisasi Perancangan Aplikasi Manajemen Data Koloman, Di Desa Pulau Mandangin Sampang – Madura Berbasis Website,” Rabit J. Teknol. dan Sist. Inf. Univrab, vol. 9, no. 2, pp. 285–294, 2024, doi: 10.36341/rabit.v9i2.4840.
[19] P. K. Ray, H. K. Sahoo, A. Mohanty, J. K. Bhutto, A. B. Barnawi, and A. Ali Alshaya, “Robust H-Infinity Filter and PSO-SVM Based Monitoring of Power Quality Disturbances System,” IEEE Access, vol. 12, pp. 39041–39057, 2024, doi: 10.1109/ACCESS.2024.3367727.
[20] F. P. E. Putra, R. W. Efendi, A. B. Tamam, and W. A. Pramadi, “Tren dan Praktik Terbaik dalam Pengembangan Web Berbasis API : Kajian Literatur terhadap Framework Laravel dan React,” Infomatek, vol. 27, no. 1, pp. 165–178, 2025, doi: 10.23969/infomatek.v27i1.25122.
[21] M. Zayyadi et al., “Pemberdayaan Sekolah Inklusi Melalui E-Modul Berjenjang Sebagai Pengembangan Kompetensi Guru Dalam Pemenuhan Layanan Pendidikan Inklusif,” 2024. doi: 10.37303/peduli.v8i2.681.
[22] F. P. E. Putra, U. Ubaidi, A. B. Tamam, and R. W. Efendi, “Implementation And Simulation Of Dynamic Arp Inspection In Cisco Packet Tracer For Network Security,” Brill. Res. Artif. Intell., vol. 4, no. 1, pp. 340–347, 2024, doi: 10.47709/brilliance.v4i1.4199.
[23] Fauzan Prasetyo Eka Putra, Dian Tri Agustina, Triana Selvia Khusnul Khotimah, and Tarisha Ramadhanty, “Analisis Kinerja Jaringan 5G dalam Meningkatkan Konektivitas Internet of Things (IoT),” 2025, researchgate.net. doi: 10.55606/jitek.v5i1.5836.
[24] F. P. Eka Putra, . S., A. Ramadhani, and . M., “Integrasi Teknologi Kuantum dan fiber Optik untuk Meningkatkan Keamanan dan Efisiensi Jaringan Masa Depan,” J. Ilm. Ilk. - Ilmu Komput. Inform., vol. 8, no. 2, pp. 151–163, 2025, doi: 10.47324/ilkominfo.v8i2.342.
[25] S. Arifin, N. P. Dewi, . U., M. N. Arifin, and F. P. E. Putra, “Aplikasi Pengolahan Data Mahasiswa Kkn Pada Universitas Madura,” Insa. Comtech Inf. Sci. Comput. Technol. J., vol. 8, no. 2, p. 24, 2023, doi: 10.53712/jic.v8i2.2085.
[26] F. Prasetyo, E. Putra, M. Riski, M. S. Yahya, and M. H. Ramadhan, “Mengenal Teknologi Jaringan Nirkabel Terbaru Teknologi 5G,” J. Sistim Inf. dan Teknol., vol. 5, no. 2, pp. 167–174, 2023, doi: 10.37034/jsisfotek.v5i1.233.
[27] F. P. E. Putra, D. A. M. Putra, A. Firdaus, and A. Hamzah, “Analisis Kecepatan Dan Kinerja Jaringan 5G (generasi ke 5) Pada Wilayah Perkotaan,” INFORMATICS Educ. Prof. J. Informatics, vol. 8, no. 1, p. 47, 2023, doi: 10.51211/itbi.v8i1.2439.
[28] S. A. Abdulzahra and A. K. M. Al-Qurabat, “Data Aggregation Mechanisms in Wireless Sensor Networks of IoT: A Survey,” Int. J. Comput. Digit. Syst., vol. 13, no. 1, 2023, doi: 10.12785/ijcds/130101.
[29] A. Armijo and D. Zamora-Sánchez, “Integration of Railway Bridge Structural Health Monitoring into the Internet of Things with a Digital Twin: A Case Study,” Sensors, vol. 24, no. 7, 2024, doi: 10.3390/s24072115.
[30] T. Anwar, Q. Raza, B. Ali, and E. Hemati, “Numerical investigation of thermoreactive hybrid nanofluid flow with Cattaneo–Christov heat flux over a porous disk,” Int. J. Thermofluids, vol. 29, 2025, doi: 10.1016/j.ijft.2025.101389.
[31] R. K. Karne and T. K. Sreeja, “Efficient Cluster-Based Routing Protocol for VANET Traffic Forecasting with Hybrid Optimization Algorithm,” J. Inf. Sci. Eng., vol. 40, no. 6, pp. 1393–1407, 2024, doi: 10.6688/JISE.202411_40(6).0014.
[32] M. Khofikur R.A, F. P. Eka Putra, M. W. Ridho G, and V. Huda, “Analisis Kinerja dan Keamanan Protokol PPTP dan L2TP/IPSec VPN pada Jaringan MikroTik,” Infotek J. Inform. dan Teknol., vol. 8, no. 2, pp. 334–344, 2025, doi: 10.29408/jit.v8i2.30230.
[33] Y. AlZahrani, “Security and privacy-aware data authentication control routing for wireless multimedia sensor networks,” Internet Technol. Lett., vol. 8, no. 3, 2025, doi: 10.1002/itl2.575.
[34] D. Yu, T. Yuan, P. Li, X. Liu, W. Xie, and Z. Yang, “Range-Free Localization Scheme Based on a Reconstructed Marine Predators Algorithm With Adaptive Enhancement for Wireless Sensor Networks,” IEEE Access, vol. 12, pp. 59702–59715, 2024, doi: 10.1109/ACCESS.2024.3388497.
[35] J. Sun, P. Zhang, and X. Kong, “Wireless sensor node localization algorithm combined with PSO-DFP,” J. Intell. Syst., vol. 32, no. 1, 2023, doi: 10.1515/jisys-2022-0323.
[36] V. Kumar and R. Arablouei, “Self-localisation of IoT devices with imperfect measurements via approximate maximum-likelihood estimation,” Int. J. Sens. Networks, vol. 46, no. 2, pp. 87–99, 2024, doi: 10.1504/IJSNET.2024.141787.
[37] H. Wang, Y. Zou, X. Liu, and Z. Meng, “A Rapid Time Synchronization Scheme Using Virtual Links and Maximum Consensus for Wireless Sensor Networks,” IEEE Internet Things J., vol. 12, no. 3, pp. 3318–3329, 2025, doi: 10.1109/JIOT.2024.3480331.
[38] A. B. Popa, B. C. Ciobanu, V. Iancu, F. Pop, and P. G. Popescu, “SkySwapping: Entanglement resupply by separating quantum swapping and photon exchange,” Futur. Gener. Comput. Syst., vol. 158, pp. 89–97, 2024, doi: 10.1016/j.future.2024.04.031.
[39] F. Prasetyo, E. Putra, M. Riski, M. S. Yahya, and M. H. Ramadhan, “Mengenal Teknologi Jaringan Nirkabel Terbaru Teknologi 5G,” J. Sistim Inf. dan Teknol., vol. 5, no. 2, pp. 167–174, 2023, [Online]. Available: https://jsisfotek.org/index.php
[40] X. Han et al., “Power Generation Promotion on Photovoltaic Panels by Ag/TiO2/SiO2Coatings with Enhanced Antireflection and Self-Cleaning Properties,” Ind. Eng. Chem. Res., vol. 64, no. 33, pp. 16250–16262, 2025, doi: 10.1021/acs.iecr.5c02403.
[41] F. P. Eka Putra, M. N. Arifin, K. Zulfana Imam, E. Saputra, and Sofiyullah, “Pengembangan Sistem Informasi Laboratorium Terintegerasi Sistem Akademik Menggunakan Agile Scrum,” J. Inf. dan Teknol., pp. 109–119, 2023, doi: 10.37034/jidt.v5i2.367.
[42] S. Veerarathinakumar and B. Devanathan, “Unprecedented Harmony Search Optimization-Based Leach Routing Protocol (Uhso-Lrp) for Enhancing Wireless Body Area Networking (Wban) Lifetime,” J. Theor. Appl. Inf. Technol., vol. 102, no. 22, pp. 8404–8425, 2024, [Online]. Available: https://www.scopus.com/inward/record.uri?eid=2-s2.0-85211000503&partnerID=40&md5=15011c069bec238c23df8727b9ba09bf
[43] G. Vanitha, P. Amudha, and S. P. Sivakumari, “Smart Bandwidth Prediction, Power Management and Adaptive Network Coding for WSN,” Int. J. Intell. Eng. Syst., vol. 16, no. 3, pp. 105–114, 2023, doi: 10.22266/ijies2023.0630.08.
[44] C. Diao, W. Zhao, L. Li, C. Liu, M. Tian, and X. Wang, “Analytical Modeling and Optimization of Permanent Magnet Synchronous Machine With Hybrid Magnets,” IEEE Trans. Ind. Appl., vol. 61, no. 1, pp. 243–254, 2025, doi: 10.1109/TIA.2024.3481390.
[45] W. Yang et al., “Precise Wireless Charging in Complicated Environments,” IEEE/ACM Trans. Netw., vol. 32, no. 6, pp. 4944–4959, 2024, doi: 10.1109/TNET.2024.3441113.
[46] P. E. G. Silva, P. S. Dester, H. Siljak, N. Marchetti, P. H. J. Nardelli, and R. A. A. de Souza, “A novel semantic-functional approach for multiuser event-trigger communication,” Ad Hoc Networks, vol. 159, 2024, doi: 10.1016/j.adhoc.2024.103496.
[47] H. Zeb, A. Ghani, M. Gohar, A. Alzahrani, M. Bilal, and D. Kwak, “Location Centric Energy Harvesting Aware Routing Protocol for IoT in Smart Cities,” IEEE Access, vol. 11, pp. 102352–102365, 2023, doi: 10.1109/ACCESS.2023.3317268.
[48] R. Padmaraj and K. Selvakumar, “Efficient Sink Node Position Estimation using Harris Hawks Optimization Algorithm in Wireless Sensor Networks,” Fusion Pract. Appl., vol. 16, no. 1, pp. 233–243, 2024, doi: 10.54216/FPA.160116.
[49] K. R. Kannan and C. N. Marimuthu, “Energy Efficient Routing Technique Using Enthalpy Ant Net Routing for Zone-Based MANETS,” IETE J. Res., vol. 70, no. 7, pp. 6202–6214, 2024, doi: 10.1080/03772063.2023.2299682.
[50] C. Y. Jiang, J. Wu, R. Gou, and J. F. Fu, “Research on adaptive particle swarm optimization particle filter target tracking algorithm in wireless sensor networks,” Adv. Control Appl. Eng. Ind. Syst., vol. 6, no. 3, 2024, doi: 10.1002/adc2.205.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Ahmad Fauzan, Khoirul Mufid (Penulis)

This work is licensed under a Creative Commons Attribution 4.0 International License.








