Figure 6From: An energy-efficient random verification protocol for the detection of node clone attacks in wireless sensor networks The percentage of energy depletion node varies with the number of protocol running rounds. Back to article page