Research Article

Named Data Networking-Based On-Demand Secure Vehicle-To-Vehicle Communications

Algorithm 2

Policy for the message verification of minor nodes and proof-of-work (Pow) consensus.
Steps:
   1. Start
   2. Nonce-value-check() Bi
   3. N ()
   4. check-trust() (check(LOC)
   && check-time()&& )
   5. check()
   6.
if () then
      if ()
      
      update TL
      m= True Message ++
      n= False Message ++
    
      update TL
   7. add-new()
   8. End