Research Article

Exploiting Blockchain and RMCV-Based Malicious Node Detection in ETD-LEACH for Wireless Sensor Networks

Table 1

List of acronyms.

AcronymsDescription

BSBase station
CACentral authority
CHsCluster heads
CVCurrent value
DoSDenial of service
ETD-LEACHEnergy temperature degree-low energy-adaptive clustering hierarchy
ETH-LEACHEnergy threshold-low energy-adaptive clustering hierarchy
HTHard threshold
IoTsInternet of things
MITMMan-in-the-middle
ONsOrdinary nodes
PDRPacket delivery ratio
PoAProof of authority
PoWProof of work
RMCVReal-time message content validation
SHA-256Secure hashing algorithm-256
STSoft threshold
WSNsWireless sensor networks
Conflict
Exponential function
Type of message
Group of ONs
Information
Location of sender
Location of receiver
Probability of ONs
Nodes
CVCurrent sensed value