Research Article
Detection and Location of Malicious Nodes Based on Homomorphic Fingerprinting in Wireless Sensor Networks
Algorithm 1
Location of malicious nodes.
| Input: the path of pollution attack,the pollution packet , and the response packet | Output: malicious node or malicious link | For (i = m; i > 1; i--) do | | If cannot get accurately then | Return | End if | | | End for | For(i = 1; i ≤ m; i++) do | If then | Return and | End if | End for |
|