Research Article
System for Malicious Node Detection in IPv6-Based Wireless Sensor Networks
Table 10
Detection in 17-node network, scenario 1.
| | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 |
| 1 | | 0.0/0.0 | | | 0.0/0.0 | | | | | | | | | | | | 2 | 0.0/0.0 | | 0.0/0.0 | | | 0.0/0.0 | | | | | | | | | | | 3 | | 0.0/0.0 | | 0.0/0.0 | | | 0.0/0.0 | | | | | | | | | | 4 | | | 0.0/0.0 | | | | | 0.0/0.0 | | | | | | | | | 5 | 0.0/0.0 | | | | | 0.0/0.0 | | | 0.0/0.0 | | | | | | | | 6 | | 0.0/0.0 | | | 0.0/0.0 | | 0.0/0.0 | | | 80.3/80.3 | | | | | | | 7 | | | 0.0/0.0 | | | 0.0/0.0 | | 0.0/0.0 | | | 0.0/0.0 | | | | | | 8 | | | | 0.0/0.0 | | | 0.0/0.0 | | | | | 0.0/0.0 | | | | | 9 | | | | | 0.0/0.0 | | | | | 80.3/80.3 | | | 0.0/0.0 | | | | 10 | | | | | | 0.0/80.6 | | | 0.0/80.6 | | 0.0/80.6 | | | 0.0/80.3 | | | 11 | | | | | | | 0.0/0.0 | | | 80.3/80.3 | | 0.0/0.0 | | | 0.0/0.0 | | 12 | | | | | | | | 0.0/0.0 | | | 0.0/0.0 | | | | | 0.0/0.0 | 13 | | | | | | | | | 0.0/0.0 | | | | | 0.0/0.0 | | | 14 | | | | | | | | | | 80.3/80.3 | | | 0.0/0.0 | | 0.0/0.0 | | 15 | | | | | | | | | | | 0.0/0.0 | | | 0.0/0.0 | | 0.0/0.0 | 16 | | | | | | | | | | | | 0.0/0.0 | | | 0.0/0.0 | | (%) | 0.0/0.0 | 0.0/0.0 | 0.0/0.0 | 0.0/0.0 | 0.0/0.0 | 0.0/20.2 | 0.0/0.0 | 0.0/0.0 | 0.0/26.9 | 80.3/80.3 | 0.0/20.2 | 0.0/0.0 | 0.0/0.0 | 0.0/26.8 | 0.0/0.0 | 0.0/0.0 |
|
|