Research Article

Exploiting Blockchain and RMCV-Based Malicious Node Detection in ETD-LEACH for Wireless Sensor Networks

Figure 16

Comparison of end-to-end delay in DoS-ETD-LEACH, MITM-ETD-LEACH, and RMCV-ETD-LEACH.