Figure 5From: An energy-efficient random verification protocol for the detection of node clone attacks in wireless sensor networks Communication overhead of RM, RMC, LSM, and P-MPC. Back to article page