Research Article

Exploiting Blockchain and RMCV-Based Malicious Node Detection in ETD-LEACH for Wireless Sensor Networks

Figure 6

Comparison of energy between ETD-LEACH and ETH-LEACH.