Research Article
Trusted Computing and Privacy Protection Method for Computer IoT Nodes Based on Fuzzy Logic Blockchain
Table 6
Credits of each initiator.
| Validating node | Originator’s α | Alice | Bill | Mark | Joan | Niki |
| Bob | 0.60655 | NULL | 0.19099 | NULL | NULL | Node 1 | NULL | 0.67334 | 0.59754 | 0.80887 | 0.87398 | Node 2 | 0.74394 | 0.01243 | NULL | 0.80887 | 0.00626 | Node 3 | 0.80879 | 0.06765 | NULL | 0.62195 | 0.87398 | Node 4 | NULL | 0.72451 | 0.85353 | 0.20675 | 0.43024 | Node 5 | 0.08552 | 0.01243 | 0.08645 | 0.02133 | 0.87398 | Node 6 | 0.14239 | 0.01243 | NULL | 0.36076 | 0.00626 | Node 7 | NULL | 0.35659 | 0.44967 | 0.56303 | 0.43024 | Node 8 | 0.77812 | 0.01243 | NULL | 0.56303 | 0.57468 | Node 9 | 0.74394 | 0.22647 | 0.02575 | 0.68034 | 0.57468 |
|
|