Research Article

Named Data Networking-Based On-Demand Secure Vehicle-To-Vehicle Communications

Algorithm 4

Trust evaluation for cluster head (CH) selection.
Steps:
   1. Start
2.
if () then && ()&&())  cluster-member()
3.
ifthen
cluster-member() ⟵ Cn
VPID ⟵ allocate((Vpk, Vprk))
else
!cluster-member() ⟵ Cn
       //Malicious node
4.
ifthen
CH⟵trustable()
CHj++
broadcast(RSU, BS)
RSU⟵save-info()
6. broadcast()
7. End