Research Article
WRHT: A Hybrid Technique for Detection of Wormhole Attack in Wireless Sensor Networks
| Nodes | Chiu and Lui (2006) [2] | Hayajneh et al. (2009) [34] | Wang et al. (2010) [35] | Kim et al. (2011) [24] | Ji et al. (2015) [30] | Tsitsiroudi et al. (2016) [31] | Biswas et al. (2014) [32] | Patel and Aggarwal (2016) [33] | WRHT |
| 50 | 0.7249 | 0.696 | 0.7134 | 0.7395 | 0.783 | 0.84 | 0.791 | 0.817 | 0.826 | 100 | 0.7327 | 0.6699 | 0.7047 | 0.7221 | 0.7569 | 0.791 | 0.809 | 0.826 | 0.843 | 150 | 0.7446 | 0.6873 | 0.6264 | 0.7395 | 0.7743 | 0.81 | 0.826 | 0.817 | 0.852 | 200 | 0.7327 | 0.7134 | 0.7308 | 0.7569 | 0.82 | 0.817 | 0.843 | 0.852 | 0.861 | 250 | 0.7181 | 0.7047 | 0.7134 | 0.7308 | 0.791 | 0.83 | 0.817 | 0.817 | 0.852 | 300 | 0.7446 | 0.7134 | 0.696 | 0.7134 | 0.82 | 0.783 | 0.81 | 0.809 | 0.835 | 350 | 0.7249 | 0.6873 | 0.6873 | 0.7308 | 0.765 | 0.774 | 0.817 | 0.835 | 0.861 | 400 | 0.7136 | 0.6873 | 0.696 | 0.7134 | 0.774 | 0.783 | 0.82 | 0.826 | 0.843 | 450 | 0.7327 | 0.7134 | 0.6873 | 0.7221 | 0.84 | 0.774 | 0.809 | 0.809 | 0.826 | 500 | 0.7136 | 0.6699 | 0.7308 | 0.7569 | 0.756 | 0.817 | 0.843 | 0.826 | 0.852 |
|
|