Research Article

Detection and Location of Malicious Nodes Based on Homomorphic Fingerprinting in Wireless Sensor Networks

Figure 1

Source node D transmits data to a base station through multiple paths.