Research Article

WRHT: A Hybrid Technique for Detection of Wormhole Attack in Wireless Sensor Networks

Table 6

Matthews correlation coefficient () analysis.

NodesChiu and Lui (2006) [2]Hayajneh et al. (2009) [34]Wang et al. (2010) [35]Kim et al. (2011) [24]Ji et al. (2015) [30]Tsitsiroudi et al. (2016) [31]Biswas et al. (2014) [32]Patel and Aggarwal (2016) [33]WRHT

500.7930.7680.7870.8160.8640.8830.8730.9020.912
1000.8990.7390.7770.7960.8350.8730.8920.9120.931
1500.8520.7580.6910.8160.8540.8830.9120.9020.980
2000.8260.7870.8060.8350.8830.9020.9310.9800.950
2500.8520.7770.7870.8060.8730.8830.9020.9020.980
3000.8120.7870.7680.7870.8830.8640.8830.8920.921
3500.8260.7580.7580.8060.8440.8540.9020.9210.950
4000.8990.7580.7680.7870.8540.8640.8830.9120.931
4500.7930.7870.7580.7960.8830.8540.8920.8920.912
5000.8520.7390.8060.8350.8350.9020.9310.9120.980