Research Article
Named Data Networking-Based On-Demand Secure Vehicle-To-Vehicle Communications
Algorithm 4
Trust evaluation for cluster head (CH) selection.
Steps: | 1. Start | 2. | if () then && ()&&()) cluster-member() | 3. | ifthen | cluster-member() ⟵ Cn | VPID ⟵ allocate((Vpk, Vprk)) | else | !cluster-member() ⟵ Cn | //Malicious node | 4. | ifthen | CH⟵trustable() | CHj++ | broadcast(RSU, BS) | RSU⟵save-info() | 6. broadcast() | 7. End |
|