Research Article

System for Malicious Node Detection in IPv6-Based Wireless Sensor Networks

Table 2

Performance analysis of 10-node network.

10 nodesReceived packetsLost packetsHops to BSETXEnergy consumption (mW)Duty cycle (%)
CPULPMListenTransmitTotalListenTransmit

Scenario 1 (Rx/Tx = 100%)
w/o IDS62.2220.0001.6671.0000.0640.1620.3920.0290.6470.6540.055
w/ IDS67.4440.0001.6671.0000.0650.1620.3940.0320.6520.6570.060

Scenario 2 (Rx/Tx = 80%)
w/o IDS58.6671.2221.6901.7660.0810.1610.4310.1330.8060.7180.250
w/ IDS65.8890.6672.0791.9140.0980.1610.4730.2190.9510.7890.412

Scenario 3 (Rx/Tx = 60%)
w/o IDS51.8897.3331.6925.1480.1220.1600.5270.4091.2180.8780.770
w/ IDS50.55610.5561.7184.5540.1340.1590.5440.4781.3150.9070.899