Research Article

Detection and Location of Malicious Nodes Based on Homomorphic Fingerprinting in Wireless Sensor Networks

Algorithm 1

Location of malicious nodes.
Input: the path of pollution attack,the pollution packet , and the response packet
 Output: malicious node or malicious link
 For (i = m; i > 1; i--) do
  
  If cannot get accurately then
   Return
  End if
  
  
 End for
 For(i = 1; i ≤ m; i++) do
  If then
   Return and
  End if
 End for