Research Article

Exploiting Blockchain and RMCV-Based Malicious Node Detection in ETD-LEACH for Wireless Sensor Networks

Figure 12

Comparison of execution time of SHA-1, SHA-256, and SHA-512.