Research Article

Exploiting Blockchain and RMCV-Based Malicious Node Detection in ETD-LEACH for Wireless Sensor Networks

Figure 14

Comparison of dead nodes in DoS-ETD-LEACH, MITM-ETD-LEACH, and RMCV-ETD-LEACH.