Research Article
Detection and Location of Malicious Nodes Based on Homomorphic Fingerprinting in Wireless Sensor Networks
Algorithm 1
Location of malicious nodes.
| | Input: the path of pollution attack,the pollution packet , and the response packet | | Output: malicious node or malicious link | | For (i = m; i > 1; i--) do | | | | If cannot get accurately then | | Return | | End if | | | | | | End for | | For(i = 1; i ≤ m; i++) do | | If then | | Return and | | End if | | End for |
|