Research Article

Exploiting Blockchain and RMCV-Based Malicious Node Detection in ETD-LEACH for Wireless Sensor Networks

Figure 5

Comparison of delay between ETD-LEACH and ETH-LEACH.