Research Article

UIV-TSP: A Blockchain-Enabled Antileakage Sharing Protection Scheme for Undisclosed IIoT Vulnerabilities

Algorithm 3

Pseudocode implementation of trap external conspirators.
(i)Input:
(ii)Output:
(1)Init trust value of SW, , number of conspirators of SW
(2) evaluate based on the feedback , retrieves SW historical trust values
(3)If then
(4) Release false to SW to induce unauthorized behavior,
(5) Extract the corresponding to the malicious SW
(6) increased number of SW conspirators
(7)If valid time expire then
(8)  Invoke Self- Destruct
(9)Else:
(10)   not in
(11)   add ()
(12)End if
(13)Else
(14)  Release normal to SW.
(15)End if