Research Article

UIV-TSP: A Blockchain-Enabled Antileakage Sharing Protection Scheme for Undisclosed IIoT Vulnerabilities

Algorithm 2

Pseudocode implementation of Match verification value and self-destruct.
(i)Input: uiv
(ii)Output: access/deny
(1)
(2)If tokentracingnot in
(3) Go to step 15.
(4)Else
(5) Acquire
(6)
(7)Ifthen
(8)  Assign access authorities
(9)Ifthen
(10)  Go to step 8.
(11)Else
(12)  Send an encrypted feedback message to TA.
(13)  Destroy the target
(14) End if
(15)End if