Research Article
Exploiting Blockchain and RMCV-Based Malicious Node Detection in ETD-LEACH for Wireless Sensor Networks
Table 2
Identified limitations’ mapping with proposed solutions and validations.
| Identified limitations | Proposed solutions | Performed validations |
| L1: inefficient CHs’ selection | S1: ETD-LEACH | V1: dead nodes, delay, energy consumption, and throughput, as shown in Figures 4, 5, 6, and 7, respectively | L2: presence of malicious nodes | S2: RMCV | V2: PDR, number of alive nodes, and energy consumption, as shown in Figures 8, 9, and 10, respectively | L3: single point of failure | S3: blockchain | V3, V4: transaction cost shown in Figure 11 | L4: PoW utilizes high computational power | S4: PoA | | L5: no secure routing using XOR | S5: SHA-256 | V5: execution time shown in Figure 12 |
|
|