Research Article

Exploiting Blockchain and RMCV-Based Malicious Node Detection in ETD-LEACH for Wireless Sensor Networks

Table 7

Performance analysis of alive nodes in ETD-LEACH and RMCV-ETD-LEACH.

ProtocolsFirst node aliveLast node alive

ETD-LEACH1000th round3900th round
RMCV-ETD-LEACH1100th round4800th round