Algorithm 1 Sensing layer algorithm for east–west interface trust evaluation |
-
Require: Set of SDN controllers , Probing frequency ,
Threshold trust value , Public key of blockchain node
Ensure: Encrypted trust dataset , Trust evaluation report
1: Initialize metric set , timestamp
2: for each controller do
3: Initialize local metric buffer
4: end for
5: while network is active do
6: for each controller do
7: Sample trust-critical parameters
8: Record timestamp
9: Append to
10: if anomaly detected in then
11: Increase probing frequency
12: else
13: Restore probing frequency
14: end if
15: Compress using CABAC:
16: Encrypt :
17: Generate integrity hash:
18: Create secure packet:
19: Send to blockchain verifier
20: end for
21: for each received at blockchain layer do
22: Decrypt using , validate hash
23: if then
24: Validate sender identity via smart contract SC
25: if identity ∈ registry and signature matches then
26: Approve trust record:
27: Send ACK to
28: else
29: Mark as malicious
30: Remove from network set C
31: end if
32: else
33: Reject data: Integrity violation
34: end if
35: end for
36: end while
37: return Final encrypted trust dataset and report
|