Figure 4From: An energy-efficient random verification protocol for the detection of node clone attacks in wireless sensor networks Success rate of detecting replicas in RMC, P-MPC, and LSM. Back to article page