Research Article

Exploiting Blockchain and RMCV-Based Malicious Node Detection in ETD-LEACH for Wireless Sensor Networks

Figure 9

Comparison of number of alive nodes in ETD-LEACH and RMCV-ETD-LEACH.