Research Article
UIV-TSP: A Blockchain-Enabled Antileakage Sharing Protection Scheme for Undisclosed IIoT Vulnerabilities
Table 3
Description of simulation elements.
| Parameters | Description | Default |
| | Number of SWs | 2000 | | Percentage of dishonest SWs | 10%–50% | | Threshold of trust value | (0.2, 0.5, 0.8) | Cycle | Number of cycle simulation | 200 | | Embedded times of access credential | (1, 2, 3, 4) | | The length of access credential | (256, 512, 1024) |
|
|