2018
DOI: 10.1016/j.procs.2017.12.029
|View full text |Cite
|
Sign up to set email alerts
|

Leach Based Hierarchical Routing Protocol for Monitoring of Over-ground Pipelines Using Linear Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
6
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 20 publications
(8 citation statements)
references
References 15 publications
0
8
0
Order By: Relevance
“…Literature [27] proposed a sensor network security protocol SPIN to solve the problems of sensor network node key agreement, point-to-point authentication, and data freshness. Literature [28,29] proposed a secure LEACH protocol (SecLEACH) on the basis of random key distribution, SPIN, and μTESLA. Literature [30] introduces a security authentication scheme between nodes and proposes a secure LEACH protocol to contain abnormal nodes, namely, SLEACH.…”
Section: Protocols In Wireless Sensormentioning
confidence: 99%
“…Literature [27] proposed a sensor network security protocol SPIN to solve the problems of sensor network node key agreement, point-to-point authentication, and data freshness. Literature [28,29] proposed a secure LEACH protocol (SecLEACH) on the basis of random key distribution, SPIN, and μTESLA. Literature [30] introduces a security authentication scheme between nodes and proposes a secure LEACH protocol to contain abnormal nodes, namely, SLEACH.…”
Section: Protocols In Wireless Sensormentioning
confidence: 99%
“…By using layer slicing and virtual sinks, the transmission success rate arises. Later, in order to meet the requirements of multi-layered structure, Sudeep et al [ 14 ] proposed the leach-based hierarchical routing protocol for LSNs. For node assignment in LSN, the authors in [ 15 ] presented three optimization models for determining the node density under different requirements.…”
Section: Related Workmentioning
confidence: 99%
“…For example, in applications such as monitoring water, oil, or gas pipelines, roads, tunnels, borders, etc., wireless communication technologies provide clear advantages (such as self-organization, rapid deployment, cost, or flexibility) for the creation of highly reliable and self-healing industrial systems that can respond to new events [ 1 ]. This problem has been studied in recent years, and different authors proposed the deployment of Linear Wireless Sensor Networks (LWSN) [ 2 ], characterized by sparse node deployment along the linear infrastructure. It is assumed that nodes cannot move after being deployed.…”
Section: Introductionmentioning
confidence: 99%
“…It is assumed that nodes cannot move after being deployed. One of the main constraints in linear topology is the reduced number of neighbor nodes that limits the feasible transmission routes [ 2 ]. Such limitations make traditional solutions for Wireless Sensor Networks (WSNs) inapplicable to LWSNs [ 3 ].…”
Section: Introductionmentioning
confidence: 99%