Research Article

Exploiting Blockchain and RMCV-Based Malicious Node Detection in ETD-LEACH for Wireless Sensor Networks

Table 2

Identified limitations’ mapping with proposed solutions and validations.

Identified limitationsProposed solutionsPerformed validations

L1: inefficient CHs’ selectionS1: ETD-LEACHV1: dead nodes, delay, energy consumption, and throughput, as shown in Figures 4, 5, 6, and 7, respectively
L2: presence of malicious nodesS2: RMCVV2: PDR, number of alive nodes, and energy consumption, as shown in Figures 8, 9, and 10, respectively
L3: single point of failureS3: blockchainV3, V4: transaction cost shown in Figure 11
L4: PoW utilizes high computational powerS4: PoA
L5: no secure routing using XORS5: SHA-256V5: execution time shown in Figure 12