Skip to main content

Table 2 Experimental parameters and their configuration

From: An improved AODV routing security algorithm based on blockchain technology in ad hoc network

Environment/conditions

Strategy adopted

Failure situation

The environment is good and malicious nodes exist

Two paths

Uneven distribution of nodes

The environment is good and malicious nodes do not exist

Rerouting from breakpoint

Uneven distribution of nodes

The environment is bad and malicious nodes exist

Rerouting from the source node

Uneven distribution of nodes