Algorithm 1. Security validation contract.
Input: |
Where and |
Output: Legitimate or Not legitimate |
Step 1: Verify the legitimacy of client node |
Step 2: Send puzzle to the federated client |
Step 3: Receive the puzzle output |
Step 3.1: Compute SHA256(Puzzle) |
Step 3.2: SHA256(Puzzle) |
Step 4: Validation of β from blockchain |
Step 4.1: Validation is successful access grant |