Research Article

UIV-TSP: A Blockchain-Enabled Antileakage Sharing Protection Scheme for Undisclosed IIoT Vulnerabilities

Algorithm 1

Pseudocode of token generation and update.
(i)Input:
(ii)Output: tokenaccess
(1)If in then
(2)  
(3)  If tokenaccess in blockchain then
(4)   Update tokenaccess,
(5)  else
(6)   Store tokenaccess,
(7)   If end of request access, then
(8)    Revoke tokenaccess
(9)    
(10)    
(11)     Store tokenaccess,
(12)     Embed to vulj
(13)   End If
(14)  End If
(15)End If