Research Article

Detection and Location of Malicious Nodes Based on Homomorphic Fingerprinting in Wireless Sensor Networks

Table 2

Data forwarding table (DFT).

Seq_NumberFinger_printingEncoding_VectorEncoded_DataBlock

……......…………
……......…………