Research Article
WRHT: A Hybrid Technique for Detection of Wormhole Attack in Wireless Sensor Networks
| Nodes | Chiu and Lui (2006) [2] | Hayajneh et al. (2009) [34] | Wang et al. (2010) [35] | Kim et al. (2011) [24] | Ji et al. (2015) [30] | Tsitsiroudi et al. (2016) [31] | Biswas et al. (2014) [32] | Patel and Aggarwal (2016) [33] | WRHT |
| 50 | 0.74 | 0.80 | 0.82 | 0.85 | 0.90 | 0.92 | 0.91 | 0.94 | 0.95 | 100 | 0.75 | 0.77 | 0.81 | 0.83 | 0.87 | 0.91 | 0.93 | 0.95 | 0.97 | 150 | 0.76 | 0.79 | 0.72 | 0.85 | 0.89 | 0.92 | 0.95 | 0.94 | 0.98 | 200 | 0.77 | 0.82 | 0.84 | 0.87 | 0.92 | 0.94 | 0.97 | 0.98 | 0.99 | 250 | 0.76 | 0.81 | 0.82 | 0.84 | 0.91 | 0.92 | 0.94 | 0.94 | 0.98 | 300 | 0.74 | 0.82 | 0.80 | 0.82 | 0.92 | 0.90 | 0.92 | 0.93 | 0.96 | 350 | 0.77 | 0.79 | 0.79 | 0.84 | 0.88 | 0.89 | 0.94 | 0.96 | 0.99 | 400 | 0.75 | 0.79 | 0.80 | 0.82 | 0.89 | 0.90 | 0.92 | 0.95 | 0.97 | 450 | 0.74 | 0.82 | 0.79 | 0.83 | 0.92 | 0.89 | 0.93 | 0.93 | 0.95 | 500 | 0.76 | 0.77 | 0.84 | 0.87 | 0.87 | 0.94 | 0.97 | 0.95 | 0.98 |
|
|