Research Article
Cyber Security and Key Management Issues for Internet of Things: Techniques, Requirements, and Challenges
Algorithm 1
Algorithmic evaluation (♈, ♊, ʃ).
(1) | Step 1: Key Initialization, KI ab initio♈ | (2) | Step 2: key Generation, KG ♊ ≥ 0 | (3) | Step 3: key Registration, Kreg V | (4) | Step 4: key Backup, KB | (5) | Step 5: key Update, KU | (6) | Step 6: key Recovery Krec | (7) | Step 7: key Revocation Krev | (8) | Threshold value calculation | (9) | IF 0 ʃn(KI + KG + K.reg + KB + KU + KREV + KREV) ≤ 1 then Ok | (10) | ELSE if 0 ʃn ≥ 1, then Ţ! | (11) | END IF |
|