Research Article

Exploiting Blockchain and RMCV-Based Malicious Node Detection in ETD-LEACH for Wireless Sensor Networks

Table 4

Performance analysis of ETD-LEACH and ETH-LEACH.

ProtocolsFirst node diesLast node dies

ETD-LEACH4000th round9500th round
ETH-LEACH3000th round7500th round