Research Article

Exploiting Blockchain and RMCV-Based Malicious Node Detection in ETD-LEACH for Wireless Sensor Networks

Table 6

Performance analysis of PDR in ETD-LEACH and RMCV-ETD-LEACH.

ProtocolsPDR

ETD-LEACH89.9%
RMCV-ETD-LEACH99.9%