Research Article
UIV-TSP: A Blockchain-Enabled Antileakage Sharing Protection Scheme for Undisclosed IIoT Vulnerabilities
Algorithm 2
Pseudocode implementation of Match verification value and self-destruct.
(i) | Input: uiv | (ii) | Output: access/deny | (1) | | (2) | If tokentracingnot in | (3) | Go to step 15. | (4) | Else | (5) | Acquire | (6) | | (7) | Ifthen | (8) | Assign access authorities | (9) | Ifthen | (10) | Go to step 8. | (11) | Else | (12) | Send an encrypted feedback message to TA. | (13) | Destroy the target | (14) | End if | (15) | End if |
|