Skip to main content
. 2023 Jul 28;23(15):6751. doi: 10.3390/s23156751
Algorithm 1: Fusion-based trust anomaly detection algorithm.
Input:ζi, ρ, μ*
Output:ηti, ϱSR, ςt, S2
begin
1:    detection system is ready
2:    returnηti
3:    for n = 1: length(ζi)
4:            Tn=ζi(n), Tn+1=ζi(n+1)
5:            T=TnTn+1
6:            if T<ρ then
7:                be considered normal
8:            else
9:                Tn+1 is added to ξt(n)
10:      end for
11:      foreach T in ξt(n)
12:         if TnaTa=0, TnbTb0
13:               anomaly source is in communication layer
14:         elseif TnaTa0, TnbTb=0
15:               anomaly source is in transaction layer
16:         elseif TnaTa=0, TnbTb=0
17:               anomaly source is in both layers
18:         return ϱSR
19:      end for
20:      S2=1n1i=1n(NTiμ*)2
21:      return S2, ςt
end