Research Article
Named Data Networking-Based On-Demand Secure Vehicle-To-Vehicle Communications
Algorithm 2
Policy for the message verification of minor nodes and proof-of-work (Pow) consensus.
Steps: | 1. Start | 2. Nonce-value-check() Bi | 3. N () | 4. check-trust() (check(LOC) | && check-time()&& ) | 5. check() | 6. | if () then | if () | | update TL | m= True Message ++ | n= False Message ++ | | update TL | 7. add-new() | 8. End |
|