Research Article

Trusted Computing and Privacy Protection Method for Computer IoT Nodes Based on Fuzzy Logic Blockchain

Table 6

Credits of each initiator.

Validating nodeOriginator’s α
AliceBillMarkJoanNiki

Bob0.60655NULL0.19099NULLNULL
Node 1NULL0.673340.597540.808870.87398
Node 20.743940.01243NULL0.808870.00626
Node 30.808790.06765NULL0.621950.87398
Node 4NULL0.724510.853530.206750.43024
Node 50.085520.012430.086450.021330.87398
Node 60.142390.01243NULL0.360760.00626
Node 7NULL0.356590.449670.563030.43024
Node 80.778120.01243NULL0.563030.57468
Node 90.743940.226470.025750.680340.57468