Skip to main content

Table 1 Comparisons of average communication overhead and memory overhead

From: An energy-efficient random verification protocol for the detection of node clone attacks in wireless sensor networks

 

Communication overhead

Memory overhead

Randomized multicast (RM)

O(n2)

O n

Line-selected multicast (LSM)

O g × p f × d × n

O g × p f × d × n

RMC

O n × m 2

O n

P-MPC

O r × n +O s

o(w)