Research Article

Trusted Computing and Privacy Protection Method for Computer IoT Nodes Based on Fuzzy Logic Blockchain

Table 4

Initiator information stored by Bob and the verification node.

Validating nodeInitiator (k/time, M/bitcoin)
AliceBillMarkJoanNiki

Bob(53,2654)NULL(23,1345)NULLNULL
Node 1NULL(60,2958)(51,2677)(79,4089)(97,5140)
Node 2(68,3457)(7,279)NULL(79,4089)(4,246)
Node 3(80,4036)(14,762)NULL(54,2743)(97,5140)
Node 4NULL(66,3280)(91,4692)(26,1295)(37,2167)
Node 5(17,795)(7,279)(15,911)(8,419)(97,5140)
Node 6(22,1034)(7,279)NULL(35,1818)(4,246)
Node 7NULL(37,1679)(40,2133)(49,2491)(37,2167)
Node 8(73,3770)(7,279)NULL(49,2491)(48,2640)
Node 9(68,3457)(28,1327)(8,506)(59,3087)(48,2640)