Research Article
Unified Authentication and Access Control for Future Mobile Communication-Based Lightweight IoT Systems Using Blockchain
Pseudocode 1
Pseudocode of Authentication.
| Inputs Data from the user, = | | Qutput: Private key from the user | | Start | | 1 forto length (private key) | | 2 | | 3 | | 4 end for | | 5 smart contractint 0 | | 6 smart contractsmart contract % length (private key) | | 7 Private keycheck private key | | 8 forto length (private key) | | 9 | | 10key value (i) | | 11 swap(smart contract (idy1), smart contract (idy2)) | | 12 end for | | End |
|