Research Article
Exploiting Blockchain and RMCV-Based Malicious Node Detection in ETD-LEACH for Wireless Sensor Networks
| Acronyms | Description |
| BS | Base station | CA | Central authority | CHs | Cluster heads | CV | Current value | DoS | Denial of service | ETD-LEACH | Energy temperature degree-low energy-adaptive clustering hierarchy | ETH-LEACH | Energy threshold-low energy-adaptive clustering hierarchy | HT | Hard threshold | IoTs | Internet of things | MITM | Man-in-the-middle | ONs | Ordinary nodes | PDR | Packet delivery ratio | PoA | Proof of authority | PoW | Proof of work | RMCV | Real-time message content validation | SHA-256 | Secure hashing algorithm-256 | ST | Soft threshold | WSNs | Wireless sensor networks | | Conflict | | Exponential function | | Type of message | | Group of ONs | | Information | | Location of sender | | Location of receiver | | Probability of ONs | | Nodes | CV | Current sensed value |
|
|