From: An energy-efficient random verification protocol for the detection of node clone attacks in wireless sensor networks
Communication overhead
Memory overhead
Randomized multicast (RM)
O(n2)
O n
Line-selected multicast (LSM)
O g × p f × d × n
RMC
O n × m 2
P-MPC
O r × n +O s
o(w)