Exploiting blockchain and rmcv-based malicious node detection in etd-leach for wireless sensor networks

HIGHLIGHTS

  • who: Exploiting Blockchain et al. from the Department of Computer Science, COMSATS University Islamabad, Islamabad, Pakistan Department of Cybersecurity, College of Computer Science and Engineering, University of Jeddah, Jeddah, Saudi Arabia have published the research work: Exploiting Blockchain and RMCV-Based Malicious Node Detection in ETD-LEACH for Wireless Sensor Networks, in the Journal: Wireless Communications and Mobile Computing 100 Energy consumption (J)
  • what: In this paper a routing protocol on energy temperature degree-low energy-adaptive clustering hierarchy (ETD-LEACH) is proposed. The authors focus on the efficient selection of cluster heads (CHs), malicious . . .

     

    Logo ScioWire Beta black

    If you want to have access to all the content you need to log in!

    Thanks :)

    If you don't have an account, you can create one here.

     

Scroll to Top

Add A Knowledge Base Question !

+ = Verify Human or Spambot ?