Skip to main content
. 2024 Sep 23;10:e2280. doi: 10.7717/peerj-cs.2280

Algorithm 1. Security validation contract.

Input: αiand,γi
Where αiPublicKeys and γiFederatedChallenge
Output: Legitimate or Not legitimate
Step 1: Verify the legitimacy of client node
Step 2: Send puzzle to the federated client
Step 3: Receive the puzzle output
Step 3.1: Compute SHA256(Puzzle)
Step 3.2: β= SHA256(Puzzle)
Step 4: Validation of β from blockchain
Step 4.1: Validation is successful access grant