{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,3]],"date-time":"2026-01-03T05:29:16Z","timestamp":1767418156385,"version":"3.48.0"},"reference-count":36,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,11,10]],"date-time":"2025-11-10T00:00:00Z","timestamp":1762732800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,11,10]],"date-time":"2025-11-10T00:00:00Z","timestamp":1762732800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,11,10]]},"DOI":"10.1109\/enc68268.2025.11311881","type":"proceedings-article","created":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T18:15:34Z","timestamp":1767377734000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["LP Gas Leak Detection Prototype for Rural Areas With Aes-256 Encryption via LoRa and 3G Network Transmission"],"prefix":"10.1109","author":[{"given":"Soto-Ortiz S.","family":"I","sequence":"first","affiliation":[{"name":"Ingenier&#x00ED;a en Tecnolog&#x00ED;as de la Informaci&#x00F3;n y Comunicaciones,Tecnol&#x00F3;gico Nacional de M&#x00E9;xico Campus Occidente del Estado de Hidalgo,M&#x00E9;xico"}]},{"given":"Salazar-P\u00e9rez P.","family":"J","sequence":"additional","affiliation":[{"name":"Ingenier&#x00ED;a en Tecnolog&#x00ED;as de la Informaci&#x00F3;n y Comunicaciones,Tecnol&#x00F3;gico Nacional de M&#x00E9;xico Campus Occidente del Estado de Hidalgo,M&#x00E9;xico"}]},{"given":"Homero","family":"De Jes\u00fas Portillo Calva","sequence":"additional","affiliation":[{"name":"Ingenier&#x00ED;a en Tecnolog&#x00ED;as de la Informaci&#x00F3;n y Comunicaciones,Tecnol&#x00F3;gico Nacional de M&#x00E9;xico Campus Occidente del Estado de Hidalgo,M&#x00E9;xico"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.31653\/2306-5761.29.2020.46-55"},{"volume-title":"Safety Data Sheet: LP Gas.","year":"2025","key":"ref2"},{"volume-title":"Getting Started with Arduino IDE.","year":"2025","key":"ref3"},{"volume-title":"Node-RED Documentation.","year":"2025","key":"ref4"},{"volume-title":"Node-RED Dashboard.","year":"2025","key":"ref5"},{"volume-title":"HiveMQ Documentation.","year":"2025","key":"ref6"},{"volume-title":"Grafana Documentation.","year":"2025","key":"ref7"},{"volume-title":"Grafana Dashboards.","year":"2025","key":"ref8"},{"volume-title":"InfluxDB Documentation.","year":"2025","key":"ref9"},{"volume-title":"Arduino UNO R3.","year":"2025","key":"ref10"},{"volume-title":"WiFi LoRa 32(V3), ESP32S3 + SX1262 LoRa Node.","year":"2025","key":"ref11"},{"volume-title":"T-SIM7600G-H R2 \/ T-SIM7600E-H Introduction.","year":"2025","key":"ref12"},{"volume-title":"Raspberry Pi 4 Model B Specifications.","year":"2025","key":"ref13"},{"article-title":"MQ-6 Semiconductor Sensor for Combustible Gas","volume-title":"Datasheet","year":"2020","key":"ref14"},{"key":"ref15","article-title":"MAX6675 Cold-Junction Compensated Thermocouple-to-Digital Converter","volume":"5","year":"2013","journal-title":"Datasheet, Rev."},{"article-title":"P265 Series Pressure Transducers","volume-title":"Datasheet","year":"2019","key":"ref16"},{"volume-title":"ESP-NOW Documentation.","year":"2025","key":"ref17"},{"volume-title":"MQTT Essentials.","year":"2025","key":"ref18"},{"volume-title":"How to Use AES-256 Encryption to Secure Data.","year":"2025","key":"ref19"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ieeestd.2008.4493450"},{"volume-title":"AES 256 Encryption.","year":"2025","key":"ref21"},{"volume-title":"Power Bank 1Hora GAR094 10000 mAh.","year":"2025","key":"ref22"},{"volume-title":"Standard for the Storage and Handling of Liquefied Petroleum Gas.","year":"2020","key":"ref23"},{"volume-title":"IoT (Internet of Things) SDLC (Software Development Life Cycle)","year":"2023","author":"Tek","key":"ref24"},{"issue":"3","key":"ref25","first-page":"46","article-title":"Study of the IoT layered model for downlink connections in Sigfox network interconnection platform","volume":"13","author":"Rubio","year":"2021","journal-title":"Revista Logos Ciencia & Tecnolog\u00eda"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.14483\/2322939x.15712"},{"key":"ref27","first-page":"15","article-title":"LoRa-based smart indoor air quality monitoring system","volume-title":"Proc. IEEE Region 10 Conf. (TENCON)","author":"Kodali","year":"2019"},{"key":"ref28","first-page":"1","article-title":"An IoT-based wireless sensor network for indoor air quality monitoring","volume-title":"Proc. Int. Conf. on Computing, Communication and Green Engineering (CCGE)","author":"Singh","year":"2021"},{"issue":"15","key":"ref29","first-page":"13456","article-title":"Lightweight AES implementation for secure IoT farming applications","volume-title":"IEEE Internet of Things Journal","volume":"9","author":"Perez","year":"2022"},{"key":"ref30","first-page":"1","article-title":"A multi-sensor data fusion approach for methane leak detection in pipelines","volume-title":"Proc. IEEE Int. Conf. on Industrial Technology (ICIT)","author":"Chen","year":"2023"},{"journal-title":"FIPS PUB 197","article-title":"Advanced Encryption Standard (AES)","year":"2001","key":"ref31"},{"issue":"5","key":"ref32","first-page":"3456","article-title":"Hardware accelerated AES for secure LoRaWAN: A performance analysis on ESP32 platforms","volume-title":"IEEE Internet of Things Journal","volume":"8","author":"Kumar","year":"2021"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.17487\/rfc8439"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.6028\/nist.ir.8369"},{"issue":"2","key":"ref35","first-page":"312","article-title":"Performance evaluation of lightweight cryptography algorithms in constrained IoT devices","volume-title":"IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst.","volume":"41","author":"Ibrahim","year":"2022"},{"key":"ref36","article-title":"Comparative Analysis of Cryptographic Algorithms for IoT Security","author":"McKay","year":"2020","journal-title":"NIST Special Publication 800\u2013208"}],"event":{"name":"2025 Mexican International Conference on Computer Science (ENC)","start":{"date-parts":[[2025,11,10]]},"location":"Orizaba, Veracruz, Mexico","end":{"date-parts":[[2025,11,14]]}},"container-title":["2025 Mexican International Conference on Computer Science (ENC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11311716\/11311718\/11311881.pdf?arnumber=11311881","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,3]],"date-time":"2026-01-03T05:27:23Z","timestamp":1767418043000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11311881\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,10]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/enc68268.2025.11311881","relation":{},"subject":[],"published":{"date-parts":[[2025,11,10]]}}}