Figure 1From: An energy-efficient random verification protocol for the detection of node clone attacks in wireless sensor networks The invalidity of line intersection. Back to article page