Figure 2From: An energy-efficient random verification protocol for the detection of node clone attacks in wireless sensor networksProtocol diagram. Empty circles denote the common sensor nodes, filled circles denote sensor nodes deployed in the forwarding path of the location information, letter a denotes one sensor node, letter g denotes the replica of node a, letter t and letter m denote sensor nodes deployed in the intersection points of the forwarding path.Back to article page