Research Article

Exploiting Blockchain and RMCV-Based Malicious Node Detection in ETD-LEACH for Wireless Sensor Networks

Figure 8

Comparison of PDR in ETD-LEACH and RMCV-ETD-LEACH.