Jaringan Sensor Nirkabel: Sebuah Survei dan Analisis Arah Penelitian

Penulis

  • Suhdi Penulis

Kata Kunci:

Jaringan Sensor Nirkabel, Pengelompokan, Perutean, Pemilihan kepala cluster, Manajemen Topologi

Abstrak

Jaringan Sensor Nirkabel (Wireless Sensor Networks/WSN) biasanya terdiri dari ribuan sensor dengan sumber daya terbatas untuk memonitor lingkungan sekitar, mengumpulkan informasi, dan mengirimkan data ke mesin jarak jauh untuk diproses lebih lanjut. Meskipun WSN dianggap sebagai jaringan ad-hoc yang sangat fleksibel, manajemen jaringan merupakan salah satu tantangan mendasar yang harus diatasi dalam jenis jaringan ini mengingat ukuran penyebaran dan masalah kualitas yang terkait seperti manajemen sumber daya, skalabilitas, dan keandalan. Manajemen topologi dianggap sebagai teknik umum untuk mengatasi masalah ini dalam jaringan ad-hoc seperti WSN. Clustering adalah metode manajemen topologi yang paling terkenal di WSN, mengelompokkan node untuk mengelolanya dan / atau menjalankan berbagai tugas secara terdistribusi, misalnya, manajemen sumber daya. Meskipun teknik clustering terutama dikenal untuk mengurangi konsumsi energi, ada berbagai tujuan berbasis kualitas yang dapat direalisasikan melalui clustering. Dalam makalah ini, kami meninjau secara komprehensif teknik pengelompokan WSN yang sudah ada, tujuan mereka dan sifat jaringan yang didukung oleh teknik tersebut. Setelah menyaring lebih dari 500 teknik clustering, sekitar 215 teknik yang paling penting diekstraksi, ditinjau, dikategorikan dan diklasifikasikan berdasarkan tujuan clustering dan juga sifat jaringan seperti mobilitas dan heterogenitas. Selain itu, statistik disediakan mengenai metrik yang ditinjau, memberikan wawasan yang sangat berguna untuk desain teknik clustering di WSN.

Unduhan

Data unduhan tidak tersedia.

Referensi

[1] M. Faris, M. N. Mahmud, M. F. M. Salleh, and A. Alnoor, “Wireless sensor network security: A recent review based on state-of-the-art works,” Int. J. Eng. Bus. Manag., vol. 15, 2023, doi: 10.1177/18479790231157220.

[2] Y. Y. Ghadi et al., “Machine Learning Solutions for the Security of Wireless Sensor Networks: A Review,” IEEE Access, vol. 12, pp. 12699–12719, 2024, doi: 10.1109/ACCESS.2024.3355312.

[3] S. S. Vellela and R. Balamanigandan, “An intelligent sleep-awake energy management system for wireless sensor network,” Peer-to-Peer Netw. Appl., vol. 16, no. 6, pp. 2714–2731, 2023, doi: 10.1007/s12083-023-01558-x.

[4] M. Malik, V. K. Gahlawat, R. S. Mor, and A. Hosseinian-Far, “Towards white revolution 2.0: challenges and opportunities for the industry 4.0 technologies in Indian dairy industry,” Oper. Manag. Res., vol. 17, no. 3, pp. 811–832, 2024, doi: 10.1007/s12063-024-00482-4.

[5] Y. Li, Q. Fan, H. Huang, Z. Han, and Q. Gu, “A Modified YOLOv8 Detection Network for UAV Aerial Image Recognition,” Drones, vol. 7, no. 5, 2023, doi: 10.3390/drones7050304.

[6] F. P. Eka Putra, Amir Hamzah, W. Agel, and R. O. Firmansyah Kusuma, “Impelementasi Sistem Keamanan Jaringan Mikrotik Menggunakan Firewall Filtering dan Port Knocking,” J. Sistim Inf. dan Teknol., pp. 82–87, 2024, doi: 10.60083/jsisfotek.v5i4.329.

[7] M. Alipio and M. Bures, “A cache-aware congestion control mechanism using deep reinforcement learning for wireless sensor networks,” Ad Hoc Networks, vol. 166, 2025, doi: 10.1016/j.adhoc.2024.103678.

[8] F. P. Eka Putra, F. I. Maulana, N. M. Akbar, and W. Febriantoro, “Twitter sentiment analysis about economic recession in indonesia,” 2023. doi: 10.31763/businta.v7i1.592.

[9] W. Robert, M. Bounabi, and A. Badr, “Leveraging AI in Mixed Hierarchical Topologies to Improve WSN: A Survey,” 2025, researchgate.net. doi: 10.58496/bjn/2025/005.

[10] F. P. E. Putra, K. Mufidah, R. M. Ilhamsyah, S. A. Efendy, and S. N. R. Barokah, “Tinjauan Performa RouterOS Mikrotik dalam Jaringan Internet: Analisis Kinerja dan Kelayakan,” 2024. doi: 10.47709/digitech.v3i2.3446.

[11] S. Arul Jothi, R. Venkatesan, and V. Santhi, “Rule-Based Outlier Detection with a Modified Variational AutoEncoder for Enhancing Data Accuracy in Wireless Sensor Networks,” Int. J. Fuzzy Syst., vol. 25, no. 6, pp. 2187–2202, 2023, doi: 10.1007/s40815-023-01496-z.

[12] F. P. Eka Putra, L. Fitriyah, Z. Naimah, and S. A. Rofika, “Evaluasi Kinerja Aplikasi Wireshark Dalam Monitoring Jaringan Kecil Dengan Topologi Star dan Bus,” J. Ilm. Ilk. - Ilmu Komput. Inform., vol. 8, no. 2, pp. 164–176, 2025, doi: 10.47324/ilkominfo.v8i2.343.

[13] P. C. Shaker Reddy and Y. Sucharitha, “A Design and Challenges in Energy Optimizing CR-Wireless Sensor Networks,” Recent Adv. Comput. Sci. Commun., vol. 16, no. 5, 2022, doi: 10.2174/2666255816666221104115024.

[14] R. Liang et al., “Towards Effective Detection of Ponzi Schemes on Ethereum with Contract Runtime Behavior Graph,” ACM Trans. Softw. Eng. Methodol., vol. 34, no. 4, 2025, doi: 10.1145/3707458.

[15] F. P. E. Putra, S. Syirofi, D. Wahid, and A. M. Syam, “Security Analysis And Data Recovery On Large-Scale Computer Networks,” 2025. doi: 10.47709/brilliance.v5i1.6276.

[16] F. P. Eka Putra, F. Muslim, N. Hasanah, Holipah, R. Paradina, and R. Alim, “Analisis Komparasi Protokol Websocket dan MQTT Dalam Proses Push Notification,” J. Sistim Inf. dan Teknol., pp. 63–72, 2024, doi: 10.60083/jsisfotek.v5i4.325.

[17] Y. Tay, M. Dehghani, D. Bahri, and D. Metzler, “Efficient Transformers: A Survey,” ACM Comput. Surv., vol. 55, no. 6, 2023, doi: 10.1145/3530811.

[18] S. Venkatasubramanian and R. Mohankumar, “DDoS attack detection in WSN using modified BGRU with MFO model,” Adv. Appl. Gener. AI Nat. Lang. Process. Model., pp. 286–305, 2023, doi: 10.4018/9798369305027.ch014.

[19] N. Moussa, E. Nurellari, and A. El Belrhiti El Alaoui, “A novel energy-efficient and reliable ACO-based routing protocol for WSN-enabled forest fires detection,” J. Ambient Intell. Humaniz. Comput., vol. 14, no. 9, pp. 11639–11655, 2023, doi: 10.1007/s12652-022-03727-x.

[20] M. Dener, C. Okur, S. Al, and A. Orman, “WSN-BFSF: A New Data Set for Attacks Detection in Wireless Sensor Networks,” IEEE Internet Things J., vol. 11, no. 2, pp. 2109–2125, 2024, doi: 10.1109/JIOT.2023.3292209.

[21] M. Faris, M. N. Mahmud, M. F. M. Salleh, and A. Alnoor, “Wireless sensor network security: A recent review based on state-of-the-art works,” Int. J. Eng. Bus. Manag., vol. 15, 2023, doi: 10.1177/18479790231157220.

[22] O. A. Amodu, U. A. Bukar, R. A. Raja Mahmood, C. Jarray, and M. Othman, “Age of Information minimization in UAV-aided data collection for WSN and IoT applications: A systematic review,” J. Netw. Comput. Appl., vol. 216, 2023, doi: 10.1016/j.jnca.2023.103652.

[23] S. Tumula et al., “An opportunistic energy-efficient dynamic self-configuration clustering algorithm in WSN-based IoT networks,” Int. J. Commun. Syst., vol. 37, no. 1, 2024, doi: 10.1002/dac.5633.

[24] M. Gurupriya, C. S. Vasavi, G. Ramasamy, and B. Karthikeyan, “Combinatorial Bat Optimization for WSN with Hoover Index Clustering,” 2023 Int. Conf. Next Gener. Electron. NEleX 2023, 2023, doi: 10.1109/NEleX59773.2023.10421682.

[25] A. Islam, N. F. M. Zawawi, and S. A. Wahab, “Rethinking survival, renewal, and growth strategies of SMEs in Bangladesh: the role of spiritual leadership in crisis situation,” PSU Res. Rev., vol. 8, no. 1, pp. 19–40, 2024, doi: 10.1108/PRR-02-2021-0010.

[26] F. P. Eka Putra, M. N. Arifin, K. Zulfana Imam, E. Saputra, and Sofiyullah, “Pengembangan Sistem Informasi Laboratorium Terintegerasi Sistem Akademik Menggunakan Agile Scrum,” J. Inf. dan Teknol., pp. 109–119, 2023, doi: 10.37034/jidt.v5i2.367.

[27] S. Verma, S. Zeadally, S. Kaur, and A. K. Sharma, “Intelligent and Secure Clustering in Wireless Sensor Network (WSN)-Based Intelligent Transportation Systems,” IEEE Trans. Intell. Transp. Syst., vol. 23, no. 8, pp. 13473–13481, 2022, doi: 10.1109/TITS.2021.3124730.

[28] M. M. Azari et al., “Evolution of Non-Terrestrial Networks from 5G to 6G: A Survey,” IEEE Commun. Surv. Tutorials, vol. 24, no. 4, pp. 2633–2672, 2022, doi: 10.1109/COMST.2022.3199901.

[29] B. Saoud, I. Shayea, M. H. Azmi, and A. A. El-Saleh, “New scheme of WSN routing to ensure data communication between sensor nodes based on energy warning,” 2023, Elsevier. doi: 10.1016/j.aej.2023.08.058.

[30] M. Almokdad and R. Zentar, “Characterization of recycled dredged Sediments: Toward circular economy in road construction,” Constr. Build. Mater., vol. 402, 2023, doi: 10.1016/j.conbuildmat.2023.132974.

[31] M. K. Senapati, O. Al Zaabi, K. Al Hosani, K. Al Jaafari, C. Pradhan, and U. Ranjan Muduli, “Advancing Electric Vehicle Charging Ecosystems With Intelligent Control of DC Microgrid Stability,” IEEE Trans. Ind. Appl., vol. 60, no. 5, pp. 7264–7278, 2024, doi: 10.1109/TIA.2024.3413052.

[32] Y. D. Xue et al., “Serviceability evaluation of highway tunnels based on data mining and machine learning: A case study of continental United States,” Tunn. Undergr. Sp. Technol., vol. 142, 2023, doi: 10.1016/j.tust.2023.105418.

[33] X. Zhou and J. Yang, “Status of the high-intensity heavy-ion accelerator facility in China,” AAPPS Bull., vol. 32, no. 1, 2022, doi: 10.1007/s43673-022-00064-1.

[34] M. Chen and Y. Tan, “SF-FWA: A Self-Adaptive Fast Fireworks Algorithm for effective large-scale optimization,” Swarm Evol. Comput., vol. 80, 2023, doi: 10.1016/j.swevo.2023.101314.

[35] T. Srividya, P. R. Kannan Rajkumar, M. Sivasakthi, A. Sujitha, and R. Jeyalakshmi, “A state-of-the-art on development of geopolymer concrete and its field applications,” Case Stud. Constr. Mater., vol. 16, 2022, doi: 10.1016/j.cscm.2021.e00812.

[36] S. S. Vellela and R. Balamanigandan, “Optimized clustering routing framework to maintain the optimal energy status in the wsn mobile cloud environment,” Multimed. Tools Appl., vol. 83, no. 3, pp. 7919–7938, 2024, doi: 10.1007/s11042-023-15926-5.

[37] S. Kaviarasan and R. Srinivasan, “Developing a novel energy efficient routing protocol in WSN using adaptive remora optimization algorithm,” Expert Syst. Appl., vol. 244, 2024, doi: 10.1016/j.eswa.2023.122873.

[38] K. Anusha et al., “HOEEACR: Hybrid Optimized Energy-Efficient Adaptive Clustered Routing for WSN,” IETE J. Res., vol. 70, no. 7, pp. 6027–6039, 2024, doi: 10.1080/03772063.2023.2298510.

[39] A. V. Agrawal, L. P. Magulur, S. G. Priya, A. Kaur, G. Singh, and S. Boopathi, “Smart precision agriculture using IoT and WSN,” Handb. Res. Data Sci. Cybersecurity Innov. Ind. 4.0 Technol., pp. 524–541, 2023, doi: 10.4018/978-1-6684-8145-5.ch026.

[40] S. Suma Christal Mary, K. Murugeswari, S. Jyothi Shri, and N. Senthamilarasi, “A secure and effective data aggregation in WSN for improved security and data privacy,” Rev. Comput. Eng. Res., vol. 10, no. 3, pp. 83–95, 2023, doi: 10.18488/76.v10i3.3494.

[41] M. Karthikeyan, D. Manimegalai, and K. RajaGopal, “Firefly algorithm based WSN-IoT security enhancement with machine learning for intrusion detection,” 2024, nature.com. doi: 10.1038/s41598-023-50554-x.

[42] J. B. Fernandes, B. Gopi, M. A. Shariff, M. R. Pasha, S. Srinivasan, and S. P. Maniraj, “Reliable and Efficient Routing for Water Quality Monitoring in Underwater WSN,” 2024 2nd Int. Conf. Comput. Commun. Control. IC4 2024, 2024, doi: 10.1109/IC457434.2024.10486620.

[43] M. Shahid et al., “Link-Quality-Based Energy-Efficient Routing Protocol for WSN in IoT,” IEEE Trans. Consum. Electron., vol. 70, no. 1, pp. 4645–4653, 2024, doi: 10.1109/TCE.2024.3356195.

[44] M. Gurupriya, C. S. Vasavi, G. Ramasamy, and B. Karthikeyan, “Combinatorial Bat Optimization for WSN with Hoover Index Clustering,” 2023 Int. Conf. Next Gener. Electron. NEleX 2023, 2023, doi: 10.1109/NEleX59773.2023.10421682.

[45] Á. García, A. Bregon, and M. A. Martínez-Prieto, “Digital Twin Learning Ecosystem: A cyber–physical framework to integrate human-machine knowledge in traditional manufacturing,” Internet of Things (Netherlands), vol. 25, 2024, doi: 10.1016/j.iot.2024.101094.

[46] F. P. E. Putra, D. A. Siswoyo, M. I. A. Yaqin, and R. Oktavia, “Tinjauan Regulasi Siber dan Kebijakan Keamanan Jaringan 5G: Perspektif Nasional dan Internasional,” 2025, researchgate.net. doi: 10.55606/jitek.v5i1.6141.

[47] S. Jothi Lakshmi and M. Karishma, “A Modified DSR Protocol Using Deep Reinforced Learning for MANETS,” IETE J. Res., vol. 70, no. 5, pp. 4628–4639, 2024, doi: 10.1080/03772063.2023.2223168.

[48] M. Y. Arafat and S. Moh, “A Q-Learning-Based Topology-Aware Routing Protocol for Flying Ad Hoc Networks,” IEEE Internet Things J., vol. 9, no. 3, pp. 1985–2000, 2022, doi: 10.1109/JIOT.2021.3089759.

[49] L. Nie, X. Wang, Q. Zhao, Z. Shang, L. Feng, and G. Li, “Digital Twin for Transportation Big Data: A Reinforcement Learning-Based Network Traffic Prediction Approach,” IEEE Trans. Intell. Transp. Syst., vol. 25, no. 1, pp. 896–906, 2024, doi: 10.1109/TITS.2022.3232518.

[50] Y. Shen, Y. Fu, and M. Song, “Digital finance promotes sustainable total factor eco-efficiency: evidence from China,” Appl. Econ., vol. 56, no. 36, pp. 4389–4403, 2024, doi: 10.1080/00036846.2023.2211337.

[51] A. G. Fareed, F. De Felice, A. Forcina, and A. Petrillo, “Role and applications of advanced digital technologies in achieving sustainability in multimodal logistics operations: A systematic literature review,” Sustain. Futur., vol. 8, 2024, doi: 10.1016/j.sftr.2024.100278.

[52] F. Prasetyo, M. N. Arifin, and A. Irmawan, “Optimization of Mobile Ad Hoc Network DSDV and OLSR Using Evolutionary Algorithm for Elearning induction mode,” 2020, core.ac.uk. doi: 10.17977/um072v2i12020p1-8.

Unduhan

Diterbitkan

2026-04-08 — Diperbaharui pada 2025-10-02

Cara Mengutip

Jaringan Sensor Nirkabel: Sebuah Survei dan Analisis Arah Penelitian. (2025). Karapan Network Journal : Journal Computer Technology and Mobile Ad Hoc Network, 1(01). https://ejournal.omahtabing.com/knj/article/view/2

Artikel paling banyak dibaca berdasarkan penulis yang sama