Research Article
Exploiting Blockchain and RMCV-Based Malicious Node Detection in ETD-LEACH for Wireless Sensor Networks
Table 10
Performance analysis of ETD-LEACH under DoS and MITM attacks and RMCV scheme.
| Protocols | First node dead | Last node dead |
| DoS-ETD-LEACH | 500th round | 2300th round | MITM-ETD-LEACH | 400th round | 1400th round | RMCV-ETD-LEACH | 700th round | 3900th round |
|
|