Research Article
UIV-TSP: A Blockchain-Enabled Antileakage Sharing Protection Scheme for Undisclosed IIoT Vulnerabilities
Algorithm 3
Pseudocode implementation of trap external conspirators.
(i) | Input: | (ii) | Output: | (1) | Init trust value of SW, , number of conspirators of SW | (2) | evaluate based on the feedback , retrieves SW historical trust values | (3) | If then | (4) | Release false to SW to induce unauthorized behavior, | (5) | Extract the corresponding to the malicious SW | (6) | increased number of SW conspirators | (7) | If valid time expire then | (8) | Invoke Self- Destruct | (9) | Else: | (10) | not in | (11) | add () | (12) | End if | (13) | Else | (14) | Release normal to SW. | (15) | End if |
|