Research Article

Exploiting Blockchain and RMCV-Based Malicious Node Detection in ETD-LEACH for Wireless Sensor Networks

Table 10

Performance analysis of ETD-LEACH under DoS and MITM attacks and RMCV scheme.

ProtocolsFirst node deadLast node dead

DoS-ETD-LEACH500th round2300th round
MITM-ETD-LEACH400th round1400th round
RMCV-ETD-LEACH700th round3900th round