Research Article
System for Malicious Node Detection in IPv6-Based Wireless Sensor Networks
Table 11
Detection in 17-node network, scenario 2.
| | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 |
| 1 | | 0.0/0.0 | | | 0.0/0.0 | | | | | | | | | | | | 2 | 0.0/0.0 | | 3.0/3.0 | | | 0.0/0.0 | | | | | | | | | | | 3 | | 0.0/0.0 | | 5.9/5.9 | | | 1.5/1.5 | | | | | | | | | | 4 | | | 2.8/2.8 | | | | | 2.8/2.8 | | | | | | | | | 5 | 0.0/0.0 | | | | | 0.0/0.0 | | | 1.5/1.5 | | | | | | | | 6 | | 0.0/0.0 | | | 0.0/0.0 | | 1.5/1.5 | | | 80.3/80.3 | | | | | | | 7 | | | 2.9/2.9 | | | 0.0/0.0 | | 2.9/2.9 | | | 1.5/1.5 | | | | | | 8 | | | | 5.9/5.9 | | | 1.5/1.5 | | | | | 7.2/7.2 | | | | | 9 | | | | | 0.0/0.0 | | | | | 79.1/79.1 | | | 6.0/6.0 | | | | 10 | | | | | | 0.0/80.3 | | | 1.5/83.1 | | 1.5/83.1 | | | 3.0/83.6 | | | 11 | | | | | | | 1.5/1.5 | | | 79.1/79.1 | | 7.4/7.4 | | | 1.5/1.5 | | 12 | | | | | | | | 2.8/2.8 | | | 1.4/1.4 | | | | | 7.0/7.0 | 13 | | | | | | | | | 1.4/1.4 | | | | | 2.8/2.8 | | | 14 | | | | | | | | | | 75.4/75.4 | | | 5.7/5.7 | | 1.4/1.4 | | 15 | | | | | | | | | | | 1.5/1.5 | | | 2.9/2.9 | | 7.5/7.5 | 16 | | | | | | | | | | | | 6.9/6.9 | | | 1.4/1.4 | | (%) | 0.0/0.0 | 0.0/0.0 | 2.9/2.9 | 5.9/5.9 | 0.0/0.0 | 0.0/20.1 | 1.5/1.5 | 2.8/2.8 | 1.5/28.7 | 78.5/78.5 | 1.5/21.9 | 7.2/7.2 | 5.9/5.9 | 2.9/29.8 | 1.4/1.4 | 7.3/7.3 |
|
|