Figure 3From: An energy-efficient random verification protocol for the detection of node clone attacks in wireless sensor networks Collision probability of cell mapping. Back to article page