Research Article
Named Data Networking-Based On-Demand Secure Vehicle-To-Vehicle Communications
Algorithm 2
Policy for the message verification of minor nodes and proof-of-work (Pow) consensus.
| Steps: | | 1. Start | | 2. Nonce-value-check() Bi | | 3. N () | | 4. check-trust() (check(LOC) | | && check-time()&& ) | | 5. check() | | 6. | | if () then | | if () | | | | update TL | | m= True Message ++ | | n= False Message ++ | | | | update TL | | 7. add-new() | | 8. End |
|