Research Article
System for Malicious Node Detection in IPv6-Based Wireless Sensor Networks
Table 12
Detection in 17-node network, scenario 3.
| | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 |
| 1 | | 0.0/0.0 | | | 0.0/0.0 | | | | | | | | | | | | 2 | 3.1/3.1 | | 12.1/12.1 | | | 0.0/0.0 | | | | | | | | | | | 3 | | 0.0/0.0 | | 27.5/27.5 | | | 17.6/17.6 | | | | | | | | | | 4 | | | 8.3/8.3 | | | | | 24.7/24.7 | | | | | | | | | 5 | 3.1/3.1 | | | | | 0.0/0.0 | | | 12.1/12.1 | | | | | | | | 6 | | 0.0/0.0 | | | 0.0/0.0 | | 20.0/20.0 | | | 80.3/80.3 | | | | | | | 7 | | | 9.7/9.7 | | | 0.0/0.0 | | 28.8/28.8 | | | 36.1/36.1 | | | | | | 8 | | | | 20.1/20.1 | | | 12.0/12.0 | | | | | 48.0/48.0 | | | | | 9 | | | | | 0.0/0.0 | | | | | 70.6/70.6 | | | 30.6/30.6 | | | | 10 | | | | | | 0.0/80.3 | | | 9.0/83.3 | | 33.5/90.3 | | | 23.6/86.4 | | | 11 | | | | | | | 11.0/11.0 | | | 44.0/44.0 | | 41.1/41.1 | | | 53.2/53.2 | | 12 | | | | | | | | 9.0/9.0 | | | 11.3/11.3 | | | | | 24.2/24.2 | 13 | | | | | | | | | 7.9/7.9 | | | | | 20.7/20.7 | | | 14 | | | | | | | | | | 54.8/54.8 | | | 23.8/23.8 | | 66.1/66.1 | | 15 | | | | | | | | | | | 1.4/1.4 | | | 1.0/1.0 | | 0.0/0.0 | 16 | | | | | | | | | | | | 2.3/2.3 | | | 0.0/0.0 | | (%) | 3.1/3.1 | 0.0/0.0 | 10.0/10.0 | 23.8/23.8 | 0.0/0.0 | 0.0/20.1 | 15.2/15.2 | 20.8/20.8 | 9.7/34.4 | 62.4/62.4 | 20.6/34.8 | 30.5/30.5 | 27.2/27.2 | 15.1/36.0 | 39.8/39.8 | 12.1/12.1 |
|
|