Tinjauan Literatur tentang Perkembangan Wireless Sensor Network dalam Berbagai Bidang Aplikasi
Kata Kunci:
Wireless Sensor Network, IoT, Edge Computing, Smart System, Literature ReviewAbstrak
Wireless Sensor Network (WSN) telah berkembang menjadi komponen kunci dalam berbagai aplikasi modern seperti smart city, pertanian presisi, pemantauan lingkungan, dan sistem industri berbasis IoT. Perkembangan pesat teknologi sensor, komunikasi nirkabel, dan komputasi tepi (edge computing) mendorong munculnya berbagai pendekatan baru untuk meningkatkan performa, keandalan, dan efisiensi sistem WSN. Namun, kemajuan tersebut diiringi oleh beragam tantangan seperti keterbatasan energi, heterogenitas perangkat, kompleksitas topologi jaringan, serta isu keamanan dan privasi. Penelitian ini bertujuan untuk memetakan perkembangan terbaru WSN melalui kajian literatur sistematis terhadap 50 publikasi ilmiah dari jurnal internasional dan nasional bereputasi, termasuk 10 artikel dari peneliti Fauzan Prasetyo Eka Putra sebagai bagian dari persyaratan institusional. Analisis dilakukan dengan pendekatan klasifikasi tematik berdasarkan bidang aplikasi, teknologi yang digunakan, dan arah pengembangan riset. Hasil kajian menunjukkan bahwa tren penelitian terkini berfokus pada integrasi kecerdasan buatan, optimasi manajemen energi, peningkatan keamanan protokol, serta penerapan arsitektur hibrida berbasis edge–cloud. Selain itu, WSN semakin diarahkan pada model adaptif yang mampu bekerja pada lingkungan dinamis dengan kebutuhan skalabilitas tinggi. Kajian ini diharapkan dapat memberikan gambaran komprehensif mengenai perkembangan WSN serta mengidentifikasi peluang penelitian masa depan dalam konteks aplikasi lintas sektor.
Unduhan
Referensi
[1] J. Sistim, F. Prasetyo, E. Putra, S. M. Dewi, and A. Hamzah, “Privasi dan Keamanan Penerapan IoT Dalam Kehidupan Sehari-Hari : Tantangan dan Implikasi,” vol. 5, no. 2, pp. 26–32, 2023, doi: 10.37034/jsisfotek.v5i1.232.
[2] S. Safiuddin and F. P. E. Putra, “Strategi Efisiensi Wireless Sensor Network (WSN),” INFORMATICS Educ. Prof. J. Informatics, vol. 8, no. 1, p. 52, Jul. 2023, doi: 10.51211/itbi.v8i1.2441.
[3] A. F. Rachman, F. P. E. Putra, S. Syirofi, and D. Wahid, “Case Study of Computer Network Development for the Internet Of Things (IoT) Industry in an Urban Environment,” Brill. Res. Artif. Intell., vol. 4, no. 1, pp. 399–407, Aug. 2024, doi: 10.47709/brilliance.v4i1.4302.
[4] F. Prasetyo, E. Putra, F. Muslim, N. Hasanah, R. Paradina, and R. Alim, “Jurnal Sistim Informasi dan Teknologi Analisis Komparasi Protokol Websocket dan MQTT Dalam Proses Push Notification,” vol. 5, pp. 63–72, 2024, doi: 10.60083/jsisfotek.v5i4.325.
[5] F. P. E. Putra, D. E. Arissandi, A. Rofiqi, and M. F. Hidayat, “Pemanfaatan Mikrotik Dalam Manajemen Bandwidth Pada Jaringan Sekolah,” Mar. 2025, researchgate.net. doi: 10.55606/jitek.v5i1.5938.
[6] F. P. Eka Putra, A. Hamzah, W. Agel, and R. O. Firmansyah Kusuma, “Impelementasi Sistem Keamanan Jaringan Mikrotik Menggunakan Firewall Filtering dan Port Knocking,” J. Sistim Inf. dan Teknol., pp. 82–87, Jan. 2024, doi: 10.60083/jsisfotek.v5i4.329.
[7] J. Informatika, F. Prasetyo, E. Putra, D. A. Siswoyo, M. I. A. Yaqin, and R. Oktavia, “Tinjauan Regulasi Siber dan Kebijakan Keamanan Jaringan 5G : Perspektif Nasional dan Internasional”.
[8] V. No, F. Prasetyo, E. Putra, S. Burok, L. Fermadi, and V. No, “Infotek : Jurnal Informatika dan Teknologi Anti-Klon Pendekatan Ringan untuk Mendeteksi Serangan Kloning RFID Infotek : Jurnal Informatika dan Teknologi Radio Frequency Identification ( RFID ) telah menjadi teknologi identifikasi nirkabel yang banyak digu,” vol. 8, no. 2, pp. 458–468, 2025, doi: 10.29408/jit.v8i2.30392.
[9] F. P. Eka Putra, A. Baidawi, A. A. Mubarok, and Frediyanto, “Merancang Jaringan Sensor Nirkabel dan IoT untuk Kota Pintar Pamekasan,” Jul. 2023, academia.edu. doi: 10.37034/jidt.v5i2.331.
[10] F. Prasetyo Eka Putra, S. R. Sutarsih, S. Sofiyulloh, P. Permana, and M. Umar Mansyur, “OPTIMALISASI PERANCANGAN APLIKASI MANAJEMEN DATA KOLOMAN, DI DESA PULAU MANDANGIN SAMPANG – MADURA BERBASIS WEBSITE,” Rabit J. Teknol. dan Sist. Inf. Univrab, vol. 9, no. 2, pp. 285–294, Jul. 2024, doi: 10.36341/rabit.v9i2.4840.
[11] H. Panda, R. Ramesh, S. Subbaiyan, and S. T. Nagendra, “Soil – Water – Air ( SWA ) Interface Channel Model for River Bridge Pillar Health Monitoring Using WSN,” pp. 1–22, 2025, doi: https://doi.org/10.3390/info16121019.
[12] V. No et al., “Infotek : Jurnal Informatika dan Teknologi Pemanfaatan Teknologi Wireless dan Mobile Network Berbasis 5G Untuk Pemerataan Akses Jaringan di Indonesia Infotek : Jurnal Informatika dan Teknologi Perkembangan teknologi telekomunikasi global telah mengalami l,” vol. 8, no. 2, 2025, doi: 10.29408/jit.v8i2.30559.
[13] A. Srivastava and P. K. Mishra, “A survey on WSN issues with its heuristics and meta-heuristics solutions,” Wirel. Pers. Commun., 2021, doi: 10.1007/s11277-021-08659-x.
[14] S. Hudda and K. Haribabu, “A review on WSN based resource constrained smart IoT systems,” 2025, Springer. doi: 10.1007/s43926-025-00152-2.
[15] M. Singh and M. P. Singh, “Congestion avoidance with source location privacy using octopus-based dynamic routing protocol in WSN,” Wirel. Networks, 2023, doi: 10.1007/s11276-022-03165-9.
[16] F. P. E. Putra, U. Ubaidi, R. O. F. Kusuma, A. M. Syam, and S. A. Efendy, “Effect Of Distance On Wi-Fi Signal Quality In The Home Environment,” Brill. Res. Artif. Intell., vol. 4, no. 1, pp. 391–398, Aug. 2024, doi: 10.47709/brilliance.v4i1.4319.
[17] K. S. Adu-Manu et al., “Combinatorial bat optimization for wsn with hoover index clustering,” Wirel. Pers. …, 2020, doi: 10.1155/2022/1628537.
[18] S. A. Abbas, L. Farzinvash, and M. Zolfy, “A Two-Phase Genetic Algorithm Approach for Sleep Scheduling, Routing, and Clustering in Heterogeneous Wireless Sensor Networks,” Preprints, 2025, doi: https://doi.org/10.3390/network5040050.
[19] S. Reports, “Scientific Reports Article in Press An improved grey wolf optimizer with multi- stage differentiation strategies coverage in three-dimensional wireless sensor network IN An Improved Grey Wolf Optimizer with Coverage in Three-Dimensional Wireless IN,” 2025, doi: https:// doi.org/10.1038/s41598-025-28820-x.
[20] E. T. Fute, H. M. Kamdjou, A. El Amraoui, and ..., “DDCA-WSN: A distributed data compression and aggregation approach for low resources wireless sensors networks,” … Inf. Networks, 2022, doi: 10.1007/s10776-021-00543-6.
[21] A. Anu Prithiga, S. Priyadharshini, P. Ramesh, S. Parveen, N. Vidhya, and P. T. V. Bhuvaneswari, “Performance analysis of topologies and ratios with machine learning using Cooja simulator,” Discov. Networks, vol. 1, no. 1, pp. 1–17, 2025, doi: 10.1007/s44354-025-00003-0.
[22] “A Proposed Spectral Clustering Method for Wireless Sensor Networks,” vol. 7, no. 2, pp. 209–223, 2025, doi: https://doi.org/10.31838/NJAP/07.02.25.
[23] S. Sujanthi and S. N. Kalyani, “SecDL: QoS-aware secure deep learning approach for dynamic cluster-based routing in WSN assisted IoT,” Wirel. Pers. Commun., 2020, doi: 10.1007/s11277-020-07469-x.
[24] U. K. Lilhore, S. Simaiya, S. Dalal, Y. K. Sharma, and ..., “Secure WSN architecture utilizing hybrid encryption with DKM to ensure consistent IoV communication,” Wirel. Pers. …, 2024, doi: 10.1007/s11277-024-10859-0.
[25] M. N. Zakaria, Y. Heru, P. Isnomo, and M. P. Rahayu, “Perbandingan performansi pengiriman data antar node wireless sensor menggunakan kriptografi RSA dan RC 4,” vol. 23, no. 2, pp. 62–71, 2025, doi: 10.33795/eltek.v23i2.8614.
[26] S. Das and U. K. Mondal, “Blockchain-implied Architecture for Secure and Energy Efficient Processing of IoT Data in Pervasive WSNs,” 2025, doi: https://doi.org/10.26636/jtit.2025.4.2194.
[27] K. S. Adu-Manu, F. Engmann, and ..., “WSN protocols and security challenges for environmental monitoring applications: A survey,” J. …, 2022, doi: 10.1155/2022/1628537.
[28] F. P. E. Putra, M. Dafid, and I. Syafi’i, “Firewall Implementation as a Computer Network Security Strategy for Data Protection,” Brill. Res. Artif. Intell., vol. 5, no. 1, pp. 291–297, 2025, doi: 10.47709/brilliance.v5i1.6162.
[29] S. Abidin, V. R. Vadi, and A. Rana, “On confidentiality, integrity, authenticity, and Freshness (CIAF) in WSN,” Adv. Comput. Commun. …, 2020, doi: 10.1007/978-981-15-4409-5_8.
[30] N. Singh, D. Virmani, and X. Z. Gao, “A fuzzy logic-based method to avert intrusions in wireless sensor networks using WSN-DS dataset,” Int. J. Comput. …, 2020, doi: 10.1142/S1469026820500182.
[31] N. Patel and V. Kumar, “An efficient key distribution scheme for WSN with mutual healing capability,” Multimed. Tools Appl., 2022, doi: 10.1007/s11042-022-13501-y.
[32] D. Chouhan and S. S. Shrivastava, “A Study of Cryptographic Scheme for Safe Data Transfer in Wireless Sensor Network Involving Logic Gate,” vol. 4, pp. 94–104, 2025, doi: https://doi.org/10.70558/IJST.2025.v2.i4.241109.
[33] S. A. Kumar and P. Ilango, “The Impact of Wireless Sensor Network in the Field of Precision Agriculture: A Review,” Wirel. Pers. Commun., vol. 98, no. 1, pp. 685–698, 2018, doi: 10.1007/s11277-017-4890-z.
[34] Y. Mekonnen, S. Namuduri, L. Burton, A. Sarwat, and S. Bhansali, “Review—Machine Learning Techniques in Wireless Sensor Network Based Precision Agriculture,” J. Electrochem. Soc., vol. 167, no. 3, p. 037522, 2020, doi: 10.1149/2.0222003jes.
[35] S. Saif, K. Karmakar, S. Biswas, and S. Neogy, “MLIDS: Machine learning enabled intrusion detection system for health monitoring framework using BA-WSN,” … Wirel. Inf. networks, 2022, doi: 10.1007/s10776-022-00574-7.
[36] M. K. Al-azzawi and S. H. Abid, “Application of Wireless Body Area Networks and Wearable Sensors for Monitoring Sports People Health,” Fusion Pract. Appl., vol. 21, no. 2, pp. 353–368, 2026, doi: 10.54216/fpa.210222.
[37] S. Pirbhulal et al., “A novel secure IoT-based smart home automation system using a wireless sensor network,” Sensors (Switzerland), vol. 17, no. 1, pp. 1–19, 2017, doi: 10.3390/s17010069.
[38] E. Bicamumakuba, M. N. Reza, H. Jin, Samsuzzaman, K.-H. Lee, and S.-O. Chung, “Multi-Sensor Monitoring, Intelligent Control, and Data Processing for Smart Greenhouse Environment Management,” Sensors, vol. 25, no. 19, p. 6134, 2025, doi: 10.3390/s25196134.
[39] Q. O. Ajiboye, I. K. Egbuna, B. A.-R. Adekunle, S. Obafisoye, and , Ebipade Ebimobowei Amasuomo, “Edge computing and next generation wireless networks: A synergistic approach for efficient sensor data processing,” Int. J. Futur. Eng. Innov., vol. 2, no. 3, pp. 69–76, 2025, doi: 10.54660/ijfei.2025.2.3.69-76.
[40] D. A. Sokolov, “Autonomous DevOps Framework for Multi - Cloud ERP Systems : AI - Driven Integration of SAP S / 4HANA with Apache Ecosystem and Wireless Sensor Networks,” vol. 7, no. 6, pp. 10917–10923, 2025, doi: 10.15662/IJEETR.2025.0706004.
[41] P. Gulganwa and S. Jain, “EES-WCA: energy efficient and secure weighted clustering for WSN using machine learning approach,” Int. J. Inf. Technol., 2022, doi: 10.1007/s41870-021-00744-5.
[42] M. Hussain, M. Hussain, N. Aamer, and F. Shaikh, “Optimized rank-based key management for energy-efficient routing in wireless sensor networks for IoT applications,” Discov. Internet Things, vol. 5, no. 1, 2025, doi: 10.1007/s43926-025-00224-3.
[43] M. Shafiq, H. Ashraf, A. Ullah, and S. Tahira, “Systematic literature review on energy efficient routing schemes in WSN–a survey,” Mob. Networks Appl., 2020, doi: 10.1007/s11036-020-01523-5.
[44] B. Kitchenham, O. Pearl Brereton, D. Budgen, M. Turner, J. Bailey, and S. Linkman, “Systematic literature reviews in software engineering - A systematic literature review,” Inf. Softw. Technol., vol. 51, no. 1, pp. 7–15, 2009, doi: 10.1016/j.infsof.2008.09.009.
[45] M.-S. Hosseini, F. Jahanshahlou, M. A. Akbarzadeh, M. Zarei, and Y. Vaez-Gharamaleki, “Formulating research questions for evidence-based studies,” J. Med. Surgery, Public Heal., vol. 2, no. December 2023, p. 100046, 2024, doi: 10.1016/j.glmedi.2023.100046.
[46] J. R. Polanin, T. D. Pigott, D. L. Espelage, and J. K. Grotpeter, “Best practice guidelines for abstract screening large-evidence systematic reviews and meta-analyses,” Res. Synth. Methods, vol. 10, no. 3, pp. 330–342, 2019, doi: 10.1002/jrsm.1354.
[47] S. R. Jonnalagadda, P. Goyal, and M. D. Huffman, “Automating data extraction in systematic reviews: A systematic review,” Syst. Rev., vol. 4, no. 1, 2015, doi: 10.1186/s13643-015-0066-7.
[48] M. Afifi, H. Stryhn, and J. Sanchez, “Data extraction and comparison for complex systematic reviews: a step-by-step guideline and an implementation example using open-source software,” Syst. Rev., vol. 12, no. 1, pp. 1–14, 2023, doi: 10.1186/s13643-023-02322-1.
[49] D. Escudero-Mancebo, N. Fernández-Villalobos, Ó. Martín-Llorente, and A. Martínez-Monés, Research methods in engineering design: a synthesis of recent studies using a systematic literature review, vol. 34, no. 2. Springer London, 2023. doi: 10.1007/s00163-022-00406-y.
[50] N. Shaheen et al., “Appraising systematic reviews: a comprehensive guide to ensuring validity and reliability,” Front. Res. Metrics Anal., vol. 8, 2023, doi: 10.3389/frma.2023.1268045.
Unduhan
Diterbitkan
Terbitan
Bagian
Lisensi
Hak Cipta (c) 2025 Rayyan, Habibullah Sukron, Syamsul Arifin (Penulis)

Artikel ini berlisensi Creative Commons Attribution 4.0 International License.








