Research Article

Vampire Attack Mitigation and Network Performance Improvement Using Probabilistic Fuzzy Chain Set with Authentication Routing Protocol and Hybrid Clustering-Based Optimization in Wireless Sensor Network

Table 1

Comparative analysis of the proposed and existing techniques in vampire attack mitigation.

ParametersTAODVLEACHWOAPFCS-ARP_HC

Throughput939597.898
PDR87.88888.589
Energy consumption636574.575.5
Attack detection ratio81.58287.888
Latency585653.546
Control overhead5052.85362