Research Article

Exploiting Blockchain and RMCV-Based Malicious Node Detection in ETD-LEACH for Wireless Sensor Networks

Table 5

Performance analysis of energy consumption in ETD-LEACH and ETH-LEACH.

ProtocolsEnergy consumption

ETD-LEACH0.1 J
ETH-LEACH1.3 J