Literature Review on the Development of Wireless Sensor Networks in Various Application Fields
Keywords:
Wireless Sensor Network, IoT, Edge Camping, Smart System, Literature ReviewAbstract
Wireless Sensor Networks (WSNs) have evolved into key components of various modern applications such as smart cities, precision agriculture, environmental monitoring, and IoT-based industrial systems. The rapid advancement of sensor technology, wireless communication, and edge computing has led to the emergence of new approaches aimed at improving the performance, reliability, and efficiency of WSN systems. However, these advancements are accompanied by a range of challenges, including energy limitations, device heterogeneity, network topology complexity, as well as security and privacy issues.
This study aims to map recent developments in WSNs through a systematic literature review of 50 scientific publications from reputable international and national journals, including 10 articles by researcher Fauzan Prasetyo Eka Putra as part of institutional requirements. The analysis employs a thematic classification approach based on application domains, applied technologies, and research development directions.
The findings indicate that current research trends focus on the integration of artificial intelligence, energy management optimization, enhanced protocol security, and the implementation of hybrid edge–cloud architectures. In addition, WSNs are increasingly directed toward adaptive models capable of operating in dynamic environments with high scalability demands.
This review is expected to provide a comprehensive overview of WSN advancements and identify future research opportunities within cross-sector application contexts.
Downloads
References
[1] J. Sistim, F. Prasetyo, E. Putra, S. M. Dewi, and A. Hamzah, “Privasi dan Keamanan Penerapan IoT Dalam Kehidupan Sehari-Hari : Tantangan dan Implikasi,” vol. 5, no. 2, pp. 26–32, 2023, doi: 10.37034/jsisfotek.v5i1.232.
[2] S. Safiuddin and F. P. E. Putra, “Strategi Efisiensi Wireless Sensor Network (WSN),” INFORMATICS Educ. Prof. J. Informatics, vol. 8, no. 1, p. 52, Jul. 2023, doi: 10.51211/itbi.v8i1.2441.
[3] A. F. Rachman, F. P. E. Putra, S. Syirofi, and D. Wahid, “Case Study of Computer Network Development for the Internet Of Things (IoT) Industry in an Urban Environment,” Brill. Res. Artif. Intell., vol. 4, no. 1, pp. 399–407, Aug. 2024, doi: 10.47709/brilliance.v4i1.4302.
[4] F. Prasetyo, E. Putra, F. Muslim, N. Hasanah, R. Paradina, and R. Alim, “Jurnal Sistim Informasi dan Teknologi Analisis Komparasi Protokol Websocket dan MQTT Dalam Proses Push Notification,” vol. 5, pp. 63–72, 2024, doi: 10.60083/jsisfotek.v5i4.325.
[5] F. P. E. Putra, D. E. Arissandi, A. Rofiqi, and M. F. Hidayat, “Pemanfaatan Mikrotik Dalam Manajemen Bandwidth Pada Jaringan Sekolah,” Mar. 2025, researchgate.net. doi: 10.55606/jitek.v5i1.5938.
[6] F. P. Eka Putra, A. Hamzah, W. Agel, and R. O. Firmansyah Kusuma, “Impelementasi Sistem Keamanan Jaringan Mikrotik Menggunakan Firewall Filtering dan Port Knocking,” J. Sistim Inf. dan Teknol., pp. 82–87, Jan. 2024, doi: 10.60083/jsisfotek.v5i4.329.
[7] J. Informatika, F. Prasetyo, E. Putra, D. A. Siswoyo, M. I. A. Yaqin, and R. Oktavia, “Tinjauan Regulasi Siber dan Kebijakan Keamanan Jaringan 5G : Perspektif Nasional dan Internasional”.
[8] V. No, F. Prasetyo, E. Putra, S. Burok, L. Fermadi, and V. No, “Infotek : Jurnal Informatika dan Teknologi Anti-Klon Pendekatan Ringan untuk Mendeteksi Serangan Kloning RFID Infotek : Jurnal Informatika dan Teknologi Radio Frequency Identification ( RFID ) telah menjadi teknologi identifikasi nirkabel yang banyak digu,” vol. 8, no. 2, pp. 458–468, 2025, doi: 10.29408/jit.v8i2.30392.
[9] F. P. Eka Putra, A. Baidawi, A. A. Mubarok, and Frediyanto, “Merancang Jaringan Sensor Nirkabel dan IoT untuk Kota Pintar Pamekasan,” Jul. 2023, academia.edu. doi: 10.37034/jidt.v5i2.331.
[10] F. Prasetyo Eka Putra, S. R. Sutarsih, S. Sofiyulloh, P. Permana, and M. Umar Mansyur, “OPTIMALISASI PERANCANGAN APLIKASI MANAJEMEN DATA KOLOMAN, DI DESA PULAU MANDANGIN SAMPANG – MADURA BERBASIS WEBSITE,” Rabit J. Teknol. dan Sist. Inf. Univrab, vol. 9, no. 2, pp. 285–294, Jul. 2024, doi: 10.36341/rabit.v9i2.4840.
[11] H. Panda, R. Ramesh, S. Subbaiyan, and S. T. Nagendra, “Soil – Water – Air ( SWA ) Interface Channel Model for River Bridge Pillar Health Monitoring Using WSN,” pp. 1–22, 2025, doi: https://doi.org/10.3390/info16121019.
[12] V. No et al., “Infotek : Jurnal Informatika dan Teknologi Pemanfaatan Teknologi Wireless dan Mobile Network Berbasis 5G Untuk Pemerataan Akses Jaringan di Indonesia Infotek : Jurnal Informatika dan Teknologi Perkembangan teknologi telekomunikasi global telah mengalami l,” vol. 8, no. 2, 2025, doi: 10.29408/jit.v8i2.30559.
[13] A. Srivastava and P. K. Mishra, “A survey on WSN issues with its heuristics and meta-heuristics solutions,” Wirel. Pers. Commun., 2021, doi: 10.1007/s11277-021-08659-x.
[14] S. Hudda and K. Haribabu, “A review on WSN based resource constrained smart IoT systems,” 2025, Springer. doi: 10.1007/s43926-025-00152-2.
[15] M. Singh and M. P. Singh, “Congestion avoidance with source location privacy using octopus-based dynamic routing protocol in WSN,” Wirel. Networks, 2023, doi: 10.1007/s11276-022-03165-9.
[16] F. P. E. Putra, U. Ubaidi, R. O. F. Kusuma, A. M. Syam, and S. A. Efendy, “Effect Of Distance On Wi-Fi Signal Quality In The Home Environment,” Brill. Res. Artif. Intell., vol. 4, no. 1, pp. 391–398, Aug. 2024, doi: 10.47709/brilliance.v4i1.4319.
[17] K. S. Adu-Manu et al., “Combinatorial bat optimization for wsn with hoover index clustering,” Wirel. Pers. …, 2020, doi: 10.1155/2022/1628537.
[18] S. A. Abbas, L. Farzinvash, and M. Zolfy, “A Two-Phase Genetic Algorithm Approach for Sleep Scheduling, Routing, and Clustering in Heterogeneous Wireless Sensor Networks,” Preprints, 2025, doi: https://doi.org/10.3390/network5040050.
[19] S. Reports, “Scientific Reports Article in Press An improved grey wolf optimizer with multi- stage differentiation strategies coverage in three-dimensional wireless sensor network IN An Improved Grey Wolf Optimizer with Coverage in Three-Dimensional Wireless IN,” 2025, doi: https:// doi.org/10.1038/s41598-025-28820-x.
[20] E. T. Fute, H. M. Kamdjou, A. El Amraoui, and ..., “DDCA-WSN: A distributed data compression and aggregation approach for low resources wireless sensors networks,” … Inf. Networks, 2022, doi: 10.1007/s10776-021-00543-6.
[21] A. Anu Prithiga, S. Priyadharshini, P. Ramesh, S. Parveen, N. Vidhya, and P. T. V. Bhuvaneswari, “Performance analysis of topologies and ratios with machine learning using Cooja simulator,” Discov. Networks, vol. 1, no. 1, pp. 1–17, 2025, doi: 10.1007/s44354-025-00003-0.
[22] “A Proposed Spectral Clustering Method for Wireless Sensor Networks,” vol. 7, no. 2, pp. 209–223, 2025, doi: https://doi.org/10.31838/NJAP/07.02.25.
[23] S. Sujanthi and S. N. Kalyani, “SecDL: QoS-aware secure deep learning approach for dynamic cluster-based routing in WSN assisted IoT,” Wirel. Pers. Commun., 2020, doi: 10.1007/s11277-020-07469-x.
[24] U. K. Lilhore, S. Simaiya, S. Dalal, Y. K. Sharma, and ..., “Secure WSN architecture utilizing hybrid encryption with DKM to ensure consistent IoV communication,” Wirel. Pers. …, 2024, doi: 10.1007/s11277-024-10859-0.
[25] M. N. Zakaria, Y. Heru, P. Isnomo, and M. P. Rahayu, “Perbandingan performansi pengiriman data antar node wireless sensor menggunakan kriptografi RSA dan RC 4,” vol. 23, no. 2, pp. 62–71, 2025, doi: 10.33795/eltek.v23i2.8614.
[26] S. Das and U. K. Mondal, “Blockchain-implied Architecture for Secure and Energy Efficient Processing of IoT Data in Pervasive WSNs,” 2025, doi: https://doi.org/10.26636/jtit.2025.4.2194.
[27] K. S. Adu-Manu, F. Engmann, and ..., “WSN protocols and security challenges for environmental monitoring applications: A survey,” J. …, 2022, doi: 10.1155/2022/1628537.
[28] F. P. E. Putra, M. Dafid, and I. Syafi’i, “Firewall Implementation as a Computer Network Security Strategy for Data Protection,” Brill. Res. Artif. Intell., vol. 5, no. 1, pp. 291–297, 2025, doi: 10.47709/brilliance.v5i1.6162.
[29] S. Abidin, V. R. Vadi, and A. Rana, “On confidentiality, integrity, authenticity, and Freshness (CIAF) in WSN,” Adv. Comput. Commun. …, 2020, doi: 10.1007/978-981-15-4409-5_8.
[30] N. Singh, D. Virmani, and X. Z. Gao, “A fuzzy logic-based method to avert intrusions in wireless sensor networks using WSN-DS dataset,” Int. J. Comput. …, 2020, doi: 10.1142/S1469026820500182.
[31] N. Patel and V. Kumar, “An efficient key distribution scheme for WSN with mutual healing capability,” Multimed. Tools Appl., 2022, doi: 10.1007/s11042-022-13501-y.
[32] D. Chouhan and S. S. Shrivastava, “A Study of Cryptographic Scheme for Safe Data Transfer in Wireless Sensor Network Involving Logic Gate,” vol. 4, pp. 94–104, 2025, doi: https://doi.org/10.70558/IJST.2025.v2.i4.241109.
[33] S. A. Kumar and P. Ilango, “The Impact of Wireless Sensor Network in the Field of Precision Agriculture: A Review,” Wirel. Pers. Commun., vol. 98, no. 1, pp. 685–698, 2018, doi: 10.1007/s11277-017-4890-z.
[34] Y. Mekonnen, S. Namuduri, L. Burton, A. Sarwat, and S. Bhansali, “Review—Machine Learning Techniques in Wireless Sensor Network Based Precision Agriculture,” J. Electrochem. Soc., vol. 167, no. 3, p. 037522, 2020, doi: 10.1149/2.0222003jes.
[35] S. Saif, K. Karmakar, S. Biswas, and S. Neogy, “MLIDS: Machine learning enabled intrusion detection system for health monitoring framework using BA-WSN,” … Wirel. Inf. networks, 2022, doi: 10.1007/s10776-022-00574-7.
[36] M. K. Al-azzawi and S. H. Abid, “Application of Wireless Body Area Networks and Wearable Sensors for Monitoring Sports People Health,” Fusion Pract. Appl., vol. 21, no. 2, pp. 353–368, 2026, doi: 10.54216/fpa.210222.
[37] S. Pirbhulal et al., “A novel secure IoT-based smart home automation system using a wireless sensor network,” Sensors (Switzerland), vol. 17, no. 1, pp. 1–19, 2017, doi: 10.3390/s17010069.
[38] E. Bicamumakuba, M. N. Reza, H. Jin, Samsuzzaman, K.-H. Lee, and S.-O. Chung, “Multi-Sensor Monitoring, Intelligent Control, and Data Processing for Smart Greenhouse Environment Management,” Sensors, vol. 25, no. 19, p. 6134, 2025, doi: 10.3390/s25196134.
[39] Q. O. Ajiboye, I. K. Egbuna, B. A.-R. Adekunle, S. Obafisoye, and , Ebipade Ebimobowei Amasuomo, “Edge computing and next generation wireless networks: A synergistic approach for efficient sensor data processing,” Int. J. Futur. Eng. Innov., vol. 2, no. 3, pp. 69–76, 2025, doi: 10.54660/ijfei.2025.2.3.69-76.
[40] D. A. Sokolov, “Autonomous DevOps Framework for Multi - Cloud ERP Systems : AI - Driven Integration of SAP S / 4HANA with Apache Ecosystem and Wireless Sensor Networks,” vol. 7, no. 6, pp. 10917–10923, 2025, doi: 10.15662/IJEETR.2025.0706004.
[41] P. Gulganwa and S. Jain, “EES-WCA: energy efficient and secure weighted clustering for WSN using machine learning approach,” Int. J. Inf. Technol., 2022, doi: 10.1007/s41870-021-00744-5.
[42] M. Hussain, M. Hussain, N. Aamer, and F. Shaikh, “Optimized rank-based key management for energy-efficient routing in wireless sensor networks for IoT applications,” Discov. Internet Things, vol. 5, no. 1, 2025, doi: 10.1007/s43926-025-00224-3.
[43] M. Shafiq, H. Ashraf, A. Ullah, and S. Tahira, “Systematic literature review on energy efficient routing schemes in WSN–a survey,” Mob. Networks Appl., 2020, doi: 10.1007/s11036-020-01523-5.
[44] B. Kitchenham, O. Pearl Brereton, D. Budgen, M. Turner, J. Bailey, and S. Linkman, “Systematic literature reviews in software engineering - A systematic literature review,” Inf. Softw. Technol., vol. 51, no. 1, pp. 7–15, 2009, doi: 10.1016/j.infsof.2008.09.009.
[45] M.-S. Hosseini, F. Jahanshahlou, M. A. Akbarzadeh, M. Zarei, and Y. Vaez-Gharamaleki, “Formulating research questions for evidence-based studies,” J. Med. Surgery, Public Heal., vol. 2, no. December 2023, p. 100046, 2024, doi: 10.1016/j.glmedi.2023.100046.
[46] J. R. Polanin, T. D. Pigott, D. L. Espelage, and J. K. Grotpeter, “Best practice guidelines for abstract screening large-evidence systematic reviews and meta-analyses,” Res. Synth. Methods, vol. 10, no. 3, pp. 330–342, 2019, doi: 10.1002/jrsm.1354.
[47] S. R. Jonnalagadda, P. Goyal, and M. D. Huffman, “Automating data extraction in systematic reviews: A systematic review,” Syst. Rev., vol. 4, no. 1, 2015, doi: 10.1186/s13643-015-0066-7.
[48] M. Afifi, H. Stryhn, and J. Sanchez, “Data extraction and comparison for complex systematic reviews: a step-by-step guideline and an implementation example using open-source software,” Syst. Rev., vol. 12, no. 1, pp. 1–14, 2023, doi: 10.1186/s13643-023-02322-1.
[49] D. Escudero-Mancebo, N. Fernández-Villalobos, Ó. Martín-Llorente, and A. Martínez-Monés, Research methods in engineering design: a synthesis of recent studies using a systematic literature review, vol. 34, no. 2. Springer London, 2023. doi: 10.1007/s00163-022-00406-y.
[50] N. Shaheen et al., “Appraising systematic reviews: a comprehensive guide to ensuring validity and reliability,” Front. Res. Metrics Anal., vol. 8, 2023, doi: 10.3389/frma.2023.1268045.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Rayyan, Habibullah Sukron, Syamsul Arifin (Penulis)

This work is licensed under a Creative Commons Attribution 4.0 International License.








