Research Article

Exploiting Blockchain and RMCV-Based Malicious Node Detection in ETD-LEACH for Wireless Sensor Networks

Figure 7

Comparison of throughput between ETD-LEACH and ETH-LEACH.