Skip to main content
. 2019 Jul 18;19(14):3165. doi: 10.3390/s19143165

Table 2.

The configuration of NS2 for a different network environment.

S. No. Transmitting Nodes IoT Nodes Compromised Miners Attack Probability
1 25 5, 10, 20 2, 10, 20 5%
2 100 25, 50, 75 15, 25, 50 25%