Research Article

Exploiting Blockchain and RMCV-Based Malicious Node Detection in ETD-LEACH for Wireless Sensor Networks

Figure 4

Comparison of dead nodes between ETD-LEACH and ETH-LEACH.