Research Article
UIV-TSP: A Blockchain-Enabled Antileakage Sharing Protection Scheme for Undisclosed IIoT Vulnerabilities
Algorithm 1
Pseudocode of token generation and update.
(i) | Input: | (ii) | Output: tokenaccess | (1) | If in then | (2) | | (3) | If tokenaccess in blockchain then | (4) | Update tokenaccess, | (5) | else | (6) | Store tokenaccess, | (7) | If end of request access, then | (8) | Revoke tokenaccess | (9) | | (10) | | (11) | Store tokenaccess, | (12) | Embed to vulj | (13) | End If | (14) | End If | (15) | End If |
|