Research Article

Exploiting Blockchain and RMCV-Based Malicious Node Detection in ETD-LEACH for Wireless Sensor Networks

Table 3

Simulation parameters.

ParametersValue of parameters

Network interfaceWireless
Sensing area
DeploymentRandom
Total nodes100
Initial energy of nodes1.5 J
Data packet size4000 bps
ProtocolETD-LEACH
Rounds10,000
Malicious node detectionRMCV
ConsensusPoA
Hashing algorithmSHA-256