Protokol Routing Cerdas Hemat Energi untuk Jaringan Sensor Nirkabel Menggunakan Optimasi PSO-GA Hibrida
Kata Kunci:
Jaringan Sensor Nirkabel, Efisiensi Energi, Protokol Perutean, Optimasi Kawanan Partikel, Algoritma GenetikaAbstrak
Pengelolaan energi merupakan tantangan utama dalam Wireless Sensor Networks (WSN), karena keterbatasan daya baterai pada node sensor berpengaruh langsung terhadap umur jaringan. Berbagai penelitian telah berfokus pada efisiensi energi melalui desain protokol routing cerdas, namun sebagian besar masih menghadapi masalah keseimbangan beban dan konvergensi lambat. Penelitian ini bertujuan untuk mengembangkan protokol routing cerdas berbasis Hybrid Particle Swarm Optimization – Genetic Algorithm (PSO-GA) guna meningkatkan efisiensi energi dan kestabilan jaringan. Pendekatan kuantitatif digunakan melalui simulasi eksperimental berbasis MATLAB dengan model energi radio orde pertama. Algoritma PSO digunakan untuk mempercepat konvergensi, sedangkan GA menjaga keragaman solusi agar sistem tidak terjebak pada local optimum. Hasil simulasi menunjukkan bahwa Hybrid PSO-GA mampu mengurangi konsumsi energi hingga 25%, memperpanjang umur jaringan sebesar 32%, meningkatkan packet delivery ratio menjadi 96,4%, serta menurunkan average delay hingga 0,22 detik dibandingkan protokol konvensional. Pendekatan hibrida terbukti efektif dalam menyeimbangkan konsumsi energi antar node dan menjaga kestabilan komunikasi. Hasil ini menunjukkan bahwa Hybrid PSO-GA berpotensi menjadi dasar pengembangan protokol routing cerdas masa depan untuk WSN dan aplikasi IoT berskala besar.
Unduhan
Referensi
REFERENSI
[1] S. A. Moeed, S. A. Syed, G. B. Mohammad, V. Prashanthi, and S. Nimmala, “Efficient Hybrid Mayfly-Harris Hawks Optimization Support Vector Machine (EMHHO-SVM) Based Data Aggregation and Clustering Technique for Wireless Sensor Networks,” Wirel. Pers. Commun., vol. 142, no. 1–2, pp. 39–101, 2025, doi: 10.1007/s11277-025-11799-z.
[2] O. Pinarer and O. Komili, “Humanity Lifeline: A Resilient Communication and Sensor Network Framework for Disaster Response,” IEEE Access, vol. 13, pp. 95922–95933, 2025, doi: 10.1109/ACCESS.2025.3575712.
[3] D. Eun Lee, K. Nakamura, and B. W. Hong, “Diffusion Models With Implicit Conditions Driven by Latent Shifts,” IEEE Access, vol. 13, pp. 152651–152668, 2025, doi: 10.1109/ACCESS.2025.3603215.
[4] M. Furka, M. Kaluz, M. Fikar, and M. Klauco, “Guidelines for Secure Process Control: Harnessing the Power of Homomorphic Encryption and State Feedback Control,” IEEE Access, vol. 11, pp. 110328–110341, 2023, doi: 10.1109/ACCESS.2023.3322035.
[5] M. Azlor, B. Martinez, M. Gasulla, and F. Reverter, “Study of the Applicability and Limitations of the FOCV Technique for Indoor Low-Area PV Cells,” IEEE Trans. Instrum. Meas., vol. 74, 2025, doi: 10.1109/TIM.2025.3527620.
[6] F. P. E. Putra, U. Ubaidi, A. Hamzah, W. A. Pramadi, and A. Nuraini, “Systematic Literature Review: Security Gap Detection On Websites Using Owasp Zap,” Brill. Res. Artif. Intell., vol. 4, no. 1, pp. 348–355, 2024, doi: 10.47709/brilliance.v4i1.4227.
[7] I. Shallari, I. S. Leal, S. Krug, A. Jantsch, and M. O’Nils, “Design Space Exploration for an IoT Node: Trade-Offs in Processing and Communication,” IEEE Access, vol. 9, pp. 65078–65090, 2021, doi: 10.1109/ACCESS.2021.3074875.
[8] F. P. Eka Putra, F. Muslim, N. Hasanah, Holipah, R. Paradina, and R. Alim, “Analisis Komparasi Protokol Websocket dan MQTT Dalam Proses Push Notification,” J. Sistim Inf. dan Teknol., pp. 63–72, 2024, doi: 10.60083/jsisfotek.v5i4.325.
[9] F. P. Eka Putra, A. M. Ubaidillah Solichin, M. N. Wildanul Hakim, and M. T. Ramadhan, “Pemanfaatan Teknologi Wireless dan Mobile Network Berbasis 5G Untuk Pemerataan Akses Jaringan di Indonesia,” Infotek J. Inform. dan Teknol., vol. 8, no. 2, pp. 415–425, 2025, doi: 10.29408/jit.v8i2.30559.
[10] F. P. Eka Putra, L. Fitriyah, Z. Naimah, and S. A. Rofika, “Evaluasi Kinerja Aplikasi Wireshark Dalam Monitoring Jaringan Kecil Dengan Topologi Star dan Bus,” J. Ilm. Ilk. - Ilmu Komput. Inform., vol. 8, no. 2, pp. 164–176, 2025, doi: 10.47324/ilkominfo.v8i2.343.
[11] P. Camarillo-Ramirez, F. Cervantes-Alvarez, and L. F. Gutierrez-Preciado, “Semantic Maps for Knowledge Graphs: A Semantic-Based Summarization Approach,” IEEE Access, vol. 12, pp. 6729–6744, 2024, doi: 10.1109/ACCESS.2024.3351170.
[12] Q. Zhen, J. Shi, T. Na, H. Wang, and J. Sun, “Numerical study on energy harvesting from flow-induced vibrations of dual-interfering-cylinders in ocean currents,” Phys. Fluids, vol. 37, no. 9, 2025, doi: 10.1063/5.0282953.
[13] S. Safiuddin and F. P. E. Putra, “Strategi Efisiensi Wireless Sensor Network (WSN),” INFORMATICS Educ. Prof. J. Informatics, vol. 8, no. 1, p. 52, 2023, doi: 10.51211/itbi.v8i1.2441.
[14] F. P. E. Putra, F. Fauzan, S. Syirofi, M. Mursidi, D. Wahid, and A. Nuraini, “Sistem Pengendali Lingkungan Pertanian Dengan Wireless Sensor Network Untuk Mengoptimalkan Budidaya Hidroponik,” 2024. doi: 10.47709/digitech.v3i2.3461.
[15] K. Aravind and P. K. R. Maddikunta, “Optimized Fuzzy Logic Based Energy-Efficient Geographical Data Routing in Internet of Things,” IEEE Access, vol. 12, pp. 18913–18930, 2024, doi: 10.1109/ACCESS.2024.3354174.
[16] A. Zulfikri, F. P. E. Putra, M. A. Huda, H. Hasbullah, M. Mahendra, and M. Surur, “Analisis Keamanan Jaringan Dari Serangan Malware Menggunakan Filtering Firewall Dengan Port Blocking,” 2023. doi: 10.47709/digitech.v3i2.3379.
[17] S. Burok, F. P. Eka Putra, Akmal, and L. Fermadi, “Anti - Klon Pendekatan Ringan untuk Mendeteksi Serangan Kloning RFID,” Infotek J. Inform. dan Teknol., vol. 8, no. 2, pp. 458–468, 2025, doi: 10.29408/jit.v8i2.30392.
[18] F. Prasetyo Eka Putra, S. R. Sutarsih, S. Sofiyulloh, P. Permana, and M. Umar Mansyur, “Optimalisasi Perancangan Aplikasi Manajemen Data Koloman, Di Desa Pulau Mandangin Sampang – Madura Berbasis Website,” Rabit J. Teknol. dan Sist. Inf. Univrab, vol. 9, no. 2, pp. 285–294, 2024, doi: 10.36341/rabit.v9i2.4840.
[19] P. K. Ray, H. K. Sahoo, A. Mohanty, J. K. Bhutto, A. B. Barnawi, and A. Ali Alshaya, “Robust H-Infinity Filter and PSO-SVM Based Monitoring of Power Quality Disturbances System,” IEEE Access, vol. 12, pp. 39041–39057, 2024, doi: 10.1109/ACCESS.2024.3367727.
[20] F. P. E. Putra, R. W. Efendi, A. B. Tamam, and W. A. Pramadi, “Tren dan Praktik Terbaik dalam Pengembangan Web Berbasis API : Kajian Literatur terhadap Framework Laravel dan React,” Infomatek, vol. 27, no. 1, pp. 165–178, 2025, doi: 10.23969/infomatek.v27i1.25122.
[21] M. Zayyadi et al., “Pemberdayaan Sekolah Inklusi Melalui E-Modul Berjenjang Sebagai Pengembangan Kompetensi Guru Dalam Pemenuhan Layanan Pendidikan Inklusif,” 2024. doi: 10.37303/peduli.v8i2.681.
[22] F. P. E. Putra, U. Ubaidi, A. B. Tamam, and R. W. Efendi, “Implementation And Simulation Of Dynamic Arp Inspection In Cisco Packet Tracer For Network Security,” Brill. Res. Artif. Intell., vol. 4, no. 1, pp. 340–347, 2024, doi: 10.47709/brilliance.v4i1.4199.
[23] Fauzan Prasetyo Eka Putra, Dian Tri Agustina, Triana Selvia Khusnul Khotimah, and Tarisha Ramadhanty, “Analisis Kinerja Jaringan 5G dalam Meningkatkan Konektivitas Internet of Things (IoT),” 2025, researchgate.net. doi: 10.55606/jitek.v5i1.5836.
[24] F. P. Eka Putra, . S., A. Ramadhani, and . M., “Integrasi Teknologi Kuantum dan fiber Optik untuk Meningkatkan Keamanan dan Efisiensi Jaringan Masa Depan,” J. Ilm. Ilk. - Ilmu Komput. Inform., vol. 8, no. 2, pp. 151–163, 2025, doi: 10.47324/ilkominfo.v8i2.342.
[25] S. Arifin, N. P. Dewi, . U., M. N. Arifin, and F. P. E. Putra, “Aplikasi Pengolahan Data Mahasiswa Kkn Pada Universitas Madura,” Insa. Comtech Inf. Sci. Comput. Technol. J., vol. 8, no. 2, p. 24, 2023, doi: 10.53712/jic.v8i2.2085.
[26] F. Prasetyo, E. Putra, M. Riski, M. S. Yahya, and M. H. Ramadhan, “Mengenal Teknologi Jaringan Nirkabel Terbaru Teknologi 5G,” J. Sistim Inf. dan Teknol., vol. 5, no. 2, pp. 167–174, 2023, doi: 10.37034/jsisfotek.v5i1.233.
[27] F. P. E. Putra, D. A. M. Putra, A. Firdaus, and A. Hamzah, “Analisis Kecepatan Dan Kinerja Jaringan 5G (generasi ke 5) Pada Wilayah Perkotaan,” INFORMATICS Educ. Prof. J. Informatics, vol. 8, no. 1, p. 47, 2023, doi: 10.51211/itbi.v8i1.2439.
[28] S. A. Abdulzahra and A. K. M. Al-Qurabat, “Data Aggregation Mechanisms in Wireless Sensor Networks of IoT: A Survey,” Int. J. Comput. Digit. Syst., vol. 13, no. 1, 2023, doi: 10.12785/ijcds/130101.
[29] A. Armijo and D. Zamora-Sánchez, “Integration of Railway Bridge Structural Health Monitoring into the Internet of Things with a Digital Twin: A Case Study,” Sensors, vol. 24, no. 7, 2024, doi: 10.3390/s24072115.
[30] T. Anwar, Q. Raza, B. Ali, and E. Hemati, “Numerical investigation of thermoreactive hybrid nanofluid flow with Cattaneo–Christov heat flux over a porous disk,” Int. J. Thermofluids, vol. 29, 2025, doi: 10.1016/j.ijft.2025.101389.
[31] R. K. Karne and T. K. Sreeja, “Efficient Cluster-Based Routing Protocol for VANET Traffic Forecasting with Hybrid Optimization Algorithm,” J. Inf. Sci. Eng., vol. 40, no. 6, pp. 1393–1407, 2024, doi: 10.6688/JISE.202411_40(6).0014.
[32] M. Khofikur R.A, F. P. Eka Putra, M. W. Ridho G, and V. Huda, “Analisis Kinerja dan Keamanan Protokol PPTP dan L2TP/IPSec VPN pada Jaringan MikroTik,” Infotek J. Inform. dan Teknol., vol. 8, no. 2, pp. 334–344, 2025, doi: 10.29408/jit.v8i2.30230.
[33] Y. AlZahrani, “Security and privacy-aware data authentication control routing for wireless multimedia sensor networks,” Internet Technol. Lett., vol. 8, no. 3, 2025, doi: 10.1002/itl2.575.
[34] D. Yu, T. Yuan, P. Li, X. Liu, W. Xie, and Z. Yang, “Range-Free Localization Scheme Based on a Reconstructed Marine Predators Algorithm With Adaptive Enhancement for Wireless Sensor Networks,” IEEE Access, vol. 12, pp. 59702–59715, 2024, doi: 10.1109/ACCESS.2024.3388497.
[35] J. Sun, P. Zhang, and X. Kong, “Wireless sensor node localization algorithm combined with PSO-DFP,” J. Intell. Syst., vol. 32, no. 1, 2023, doi: 10.1515/jisys-2022-0323.
[36] V. Kumar and R. Arablouei, “Self-localisation of IoT devices with imperfect measurements via approximate maximum-likelihood estimation,” Int. J. Sens. Networks, vol. 46, no. 2, pp. 87–99, 2024, doi: 10.1504/IJSNET.2024.141787.
[37] H. Wang, Y. Zou, X. Liu, and Z. Meng, “A Rapid Time Synchronization Scheme Using Virtual Links and Maximum Consensus for Wireless Sensor Networks,” IEEE Internet Things J., vol. 12, no. 3, pp. 3318–3329, 2025, doi: 10.1109/JIOT.2024.3480331.
[38] A. B. Popa, B. C. Ciobanu, V. Iancu, F. Pop, and P. G. Popescu, “SkySwapping: Entanglement resupply by separating quantum swapping and photon exchange,” Futur. Gener. Comput. Syst., vol. 158, pp. 89–97, 2024, doi: 10.1016/j.future.2024.04.031.
[39] F. Prasetyo, E. Putra, M. Riski, M. S. Yahya, and M. H. Ramadhan, “Mengenal Teknologi Jaringan Nirkabel Terbaru Teknologi 5G,” J. Sistim Inf. dan Teknol., vol. 5, no. 2, pp. 167–174, 2023, [Online]. Available: https://jsisfotek.org/index.php
[40] X. Han et al., “Power Generation Promotion on Photovoltaic Panels by Ag/TiO2/SiO2Coatings with Enhanced Antireflection and Self-Cleaning Properties,” Ind. Eng. Chem. Res., vol. 64, no. 33, pp. 16250–16262, 2025, doi: 10.1021/acs.iecr.5c02403.
[41] F. P. Eka Putra, M. N. Arifin, K. Zulfana Imam, E. Saputra, and Sofiyullah, “Pengembangan Sistem Informasi Laboratorium Terintegerasi Sistem Akademik Menggunakan Agile Scrum,” J. Inf. dan Teknol., pp. 109–119, 2023, doi: 10.37034/jidt.v5i2.367.
[42] S. Veerarathinakumar and B. Devanathan, “Unprecedented Harmony Search Optimization-Based Leach Routing Protocol (Uhso-Lrp) for Enhancing Wireless Body Area Networking (Wban) Lifetime,” J. Theor. Appl. Inf. Technol., vol. 102, no. 22, pp. 8404–8425, 2024, [Online]. Available: https://www.scopus.com/inward/record.uri?eid=2-s2.0-85211000503&partnerID=40&md5=15011c069bec238c23df8727b9ba09bf
[43] G. Vanitha, P. Amudha, and S. P. Sivakumari, “Smart Bandwidth Prediction, Power Management and Adaptive Network Coding for WSN,” Int. J. Intell. Eng. Syst., vol. 16, no. 3, pp. 105–114, 2023, doi: 10.22266/ijies2023.0630.08.
[44] C. Diao, W. Zhao, L. Li, C. Liu, M. Tian, and X. Wang, “Analytical Modeling and Optimization of Permanent Magnet Synchronous Machine With Hybrid Magnets,” IEEE Trans. Ind. Appl., vol. 61, no. 1, pp. 243–254, 2025, doi: 10.1109/TIA.2024.3481390.
[45] W. Yang et al., “Precise Wireless Charging in Complicated Environments,” IEEE/ACM Trans. Netw., vol. 32, no. 6, pp. 4944–4959, 2024, doi: 10.1109/TNET.2024.3441113.
[46] P. E. G. Silva, P. S. Dester, H. Siljak, N. Marchetti, P. H. J. Nardelli, and R. A. A. de Souza, “A novel semantic-functional approach for multiuser event-trigger communication,” Ad Hoc Networks, vol. 159, 2024, doi: 10.1016/j.adhoc.2024.103496.
[47] H. Zeb, A. Ghani, M. Gohar, A. Alzahrani, M. Bilal, and D. Kwak, “Location Centric Energy Harvesting Aware Routing Protocol for IoT in Smart Cities,” IEEE Access, vol. 11, pp. 102352–102365, 2023, doi: 10.1109/ACCESS.2023.3317268.
[48] R. Padmaraj and K. Selvakumar, “Efficient Sink Node Position Estimation using Harris Hawks Optimization Algorithm in Wireless Sensor Networks,” Fusion Pract. Appl., vol. 16, no. 1, pp. 233–243, 2024, doi: 10.54216/FPA.160116.
[49] K. R. Kannan and C. N. Marimuthu, “Energy Efficient Routing Technique Using Enthalpy Ant Net Routing for Zone-Based MANETS,” IETE J. Res., vol. 70, no. 7, pp. 6202–6214, 2024, doi: 10.1080/03772063.2023.2299682.
[50] C. Y. Jiang, J. Wu, R. Gou, and J. F. Fu, “Research on adaptive particle swarm optimization particle filter target tracking algorithm in wireless sensor networks,” Adv. Control Appl. Eng. Ind. Syst., vol. 6, no. 3, 2024, doi: 10.1002/adc2.205.
Unduhan
Diterbitkan
Terbitan
Bagian
Lisensi
Hak Cipta (c) 2025 Ahmad Fauzan, Khoirul Mufid (Penulis)

Artikel ini berlisensi Creative Commons Attribution 4.0 International License.








