2022
DOI: 10.3390/s22218431
|View full text |Cite
|
Sign up to set email alerts
|

A Secure LEACH-PRO Protocol Based on Blockchain

Abstract: Wireless Sensor Networks (WSNs) are becoming more popular for many applications due to their convenient services. However, sensor nodes may suffer from significant security flaws, leading researchers to propose authentication schemes to protect WSNs. Although these authentication protocols significantly fulfill the required protection, security enhancement with less energy consumption is essential to preserve the availability of resources and secure better performance. In 2020, Youssef et al. suggested a schem… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 30 publications
0
4
0
Order By: Relevance
“…To ensure the security of patients data this model incorporates clouds based on technology and transfer learning trained models. In their study, Aljumaie et. al., 2022 propose a version of the LEACH PRO protocol that incorporates security techniques to safeguard Wireless Sensor Networks (WSNs) (Aljumaie & Alhakami, 2022).…”
Section: Literature Reviewmentioning
confidence: 91%
See 1 more Smart Citation
“…To ensure the security of patients data this model incorporates clouds based on technology and transfer learning trained models. In their study, Aljumaie et. al., 2022 propose a version of the LEACH PRO protocol that incorporates security techniques to safeguard Wireless Sensor Networks (WSNs) (Aljumaie & Alhakami, 2022).…”
Section: Literature Reviewmentioning
confidence: 91%
“…In their study, Aljumaie et. al., 2022 propose a version of the LEACH PRO protocol that incorporates security techniques to safeguard Wireless Sensor Networks (WSNs) (Aljumaie & Alhakami, 2022). Zhao et.…”
Section: Literature Reviewmentioning
confidence: 91%
“…This survey highlights the limitations of existing security protocols in addressing industrial WSNs' speci c security requirements [14], emphasizing the need for tailored security solutions for industrial environments.…”
Section: Literatures Reviewmentioning
confidence: 99%
“…The Low Energy Adaptive Clustering Hierarchy (LEACH) protocol is a well-known clustering and hierarchical approach [9][10][11]. Numerous works aimed at improving the performance of the LEACH algorithm have been published [9,[12][13][14][15][16]. Artificial neural networks (ANNs) are used in wireless sensor networks to address problems such as clustering and classification, with the aim of reducing energy consumption [17][18][19][20][21][22][23].…”
Section: Introductionmentioning
confidence: 99%