Research Article

UIV-TSP: A Blockchain-Enabled Antileakage Sharing Protection Scheme for Undisclosed IIoT Vulnerabilities

Table 3

Description of simulation elements.

ParametersDescriptionDefault

Number of SWs2000
Percentage of dishonest SWs10%–50%
Threshold of trust value(0.2, 0.5, 0.8)
CycleNumber of cycle simulation200
Embedded times of access credential(1, 2, 3, 4)
The length of access credential(256, 512, 1024)