Research Article

Exploiting Blockchain and RMCV-Based Malicious Node Detection in ETD-LEACH for Wireless Sensor Networks

Figure 15

Comparison of energy consumption in DoS-ETD-LEACH, MITM-ETD-LEACH, and RMCV-ETD-LEACH.