{"id":"https://openalex.org/W2061079327","doi":"https://doi.org/10.1109/ntms.2014.6814009","title":"Checkpoint-based Fault-tolerance for LEACH Protocol","display_name":"Checkpoint-based Fault-tolerance for LEACH Protocol","publication_year":2014,"publication_date":"2014-03-01","ids":{"openalex":"https://openalex.org/W2061079327","doi":"https://doi.org/10.1109/ntms.2014.6814009","mag":"2061079327"},"language":"en","primary_location":{"id":"doi:10.1109/ntms.2014.6814009","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ntms.2014.6814009","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 6th International Conference on New Technologies, Mobility and Security (NTMS)","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5073474910","display_name":"Mohamed Lehsaini","orcid":"https://orcid.org/0000-0001-5349-8576"},"institutions":[{"id":"https://openalex.org/I90843659","display_name":"Universit\u00e9 de franche-comt\u00e9","ror":"https://ror.org/03pcc9z86","country_code":"FR","type":"education","lineage":["https://openalex.org/I90843659"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"Mohamed Lehsaini","raw_affiliation_strings":["STIC Laboratory, University of Tlemcen, Tlemcen, ALGERIA","Universit\u00e9 de franche-comt\u00e9, Besan\u00e7on, France"],"affiliations":[{"raw_affiliation_string":"STIC Laboratory, University of Tlemcen, Tlemcen, ALGERIA","institution_ids":[]},{"raw_affiliation_string":"Universit\u00e9 de franche-comt\u00e9, Besan\u00e7on, France","institution_ids":["https://openalex.org/I90843659"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5109192833","display_name":"Herv\u00e9 Guyennet","orcid":null},"institutions":[{"id":"https://openalex.org/I90843659","display_name":"Universit\u00e9 de franche-comt\u00e9","ror":"https://ror.org/03pcc9z86","country_code":"FR","type":"education","lineage":["https://openalex.org/I90843659"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Herve Guyennet","raw_affiliation_strings":["LIFC Laboratory, University of Franche-Comte, Besancon, FRANCE","Universit\u00e9 de franche-comt\u00e9, Besan\u00e7on, France"],"affiliations":[{"raw_affiliation_string":"LIFC Laboratory, University of Franche-Comte, Besancon, FRANCE","institution_ids":["https://openalex.org/I90843659"]},{"raw_affiliation_string":"Universit\u00e9 de franche-comt\u00e9, Besan\u00e7on, France","institution_ids":["https://openalex.org/I90843659"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5073474910"],"corresponding_institution_ids":["https://openalex.org/I90843659"],"apc_list":null,"apc_paid":null,"fwci":0.73535278,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.75555748,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":"2","issue":null,"first_page":"1","last_page":"4"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10444","display_name":"Context-Aware Activity Recognition Systems","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8128400444984436},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.7018016576766968},{"id":"https://openalex.org/keywords/routing-protocol","display_name":"Routing protocol","score":0.6882433891296387},{"id":"https://openalex.org/keywords/fault-tolerance","display_name":"Fault tolerance","score":0.6737958192825317},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.5691762566566467},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5426081418991089},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.4812150299549103},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.46906590461730957},{"id":"https://openalex.org/keywords/zone-routing-protocol","display_name":"Zone Routing Protocol","score":0.41766345500946045},{"id":"https://openalex.org/keywords/routing","display_name":"Routing (electronic design automation)","score":0.41577956080436707},{"id":"https://openalex.org/keywords/wireless-routing-protocol","display_name":"Wireless Routing Protocol","score":0.3196543753147125}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8128400444984436},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.7018016576766968},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.6882433891296387},{"id":"https://openalex.org/C63540848","wikidata":"https://www.wikidata.org/wiki/Q3140932","display_name":"Fault tolerance","level":2,"score":0.6737958192825317},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5691762566566467},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5426081418991089},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.4812150299549103},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.46906590461730957},{"id":"https://openalex.org/C189884158","wikidata":"https://www.wikidata.org/wiki/Q8073926","display_name":"Zone Routing Protocol","level":5,"score":0.41766345500946045},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.41577956080436707},{"id":"https://openalex.org/C47318570","wikidata":"https://www.wikidata.org/wiki/Q8026863","display_name":"Wireless Routing Protocol","level":4,"score":0.3196543753147125},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ntms.2014.6814009","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ntms.2014.6814009","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 6th International Conference on New Technologies, Mobility and Security (NTMS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5299999713897705,"display_name":"Climate action","id":"https://metadata.un.org/sdg/13"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W2050618904","https://openalex.org/W2083979857","https://openalex.org/W2104846640","https://openalex.org/W2106335692","https://openalex.org/W2150525525","https://openalex.org/W2164706953","https://openalex.org/W2169458211","https://openalex.org/W2333572547","https://openalex.org/W4235904988"],"related_works":["https://openalex.org/W2126842185","https://openalex.org/W2546592407","https://openalex.org/W2011277702","https://openalex.org/W1593279778","https://openalex.org/W3022598921","https://openalex.org/W2544170366","https://openalex.org/W1972673736","https://openalex.org/W3192945866","https://openalex.org/W2035482066","https://openalex.org/W1680412704"],"abstract_inverted_index":{"Most":[0],"routing":[1],"protocols":[2],"designed":[3],"for":[4,23],"wireless":[5],"sensor":[6],"networks":[7],"provide":[8],"good":[9],"results":[10],"in":[11,56],"ideal":[12],"environments.":[13,58],"However,":[14],"their":[15],"performance":[16,55],"degrades":[17],"dramatically":[18],"when":[19],"nodes":[20],"stop":[21],"working":[22],"various":[24],"causes":[25],"such":[26],"as":[27],"loss":[28],"of":[29,44,65,89],"energy,":[30],"crushed":[31],"by":[32,52],"animal":[33],"or":[34],"climatic":[35],"conditions.":[36],"In":[37],"this":[38,66],"paper,":[39],"we":[40,60],"highlight":[41],"the":[42,87],"weaknesses":[43],"LEACH":[45],"(Low":[46],"Energy":[47],"Adaptive":[48],"Clustering":[49],"Hierarchy)":[50],"protocol":[51,67],"evaluating":[53],"its":[54],"realistic":[57],"Then":[59],"propose":[61],"an":[62],"improved":[63],"version":[64],"based":[68],"on":[69],"checkpoint":[70],"approach":[71],"that":[72],"allows":[73],"it":[74],"to":[75,85],"become":[76],"a":[77],"fault-tolerant":[78],"protocol.":[79],"Finally,":[80],"several":[81],"simulations":[82],"were":[83],"conducted":[84],"illustrate":[86],"benefits":[88],"our":[90],"contribution.":[91]},"counts_by_year":[{"year":2014,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
