Research Article

WRHT: A Hybrid Technique for Detection of Wormhole Attack in Wireless Sensor Networks

Table 5

score () analysis.

NodesChiu and Lui (2006) [2]Hayajneh et al. (2009) [34]Wang et al. (2010) [35]Kim et al. (2011) [24]Ji et al. (2015) [30]Tsitsiroudi et al. (2016) [31]Biswas et al. (2014) [32]Patel and Aggarwal (2016) [33]WRHT

500.72490.6960.71340.73950.7830.840.7910.8170.826
1000.73270.66990.70470.72210.75690.7910.8090.8260.843
1500.74460.68730.62640.73950.77430.810.8260.8170.852
2000.73270.71340.73080.75690.820.8170.8430.8520.861
2500.71810.70470.71340.73080.7910.830.8170.8170.852
3000.74460.71340.6960.71340.820.7830.810.8090.835
3500.72490.68730.68730.73080.7650.7740.8170.8350.861
4000.71360.68730.6960.71340.7740.7830.820.8260.843
4500.73270.71340.68730.72210.840.7740.8090.8090.826
5000.71360.66990.73080.75690.7560.8170.8430.8260.852