Skip to main content
. 2019 Dec 12;19(24):5493. doi: 10.3390/s19245493
Algorithm 1 Whisper check at U.
  • 1:

    procedureWhisper-Check(WV)              ▹U received whisper WV from V

  • 2:

        Extract LV, IV, and dig(CV) from WV

  • 3:

        if IULV then                       ▹ Did V hear my whisper?

  • 4:

            if BU(IV)== then  ▹B is the WID-certificate binding set; No binding exists for V yet

  • 5:

               BU(IV)dig(CV)          ▹ Make one for V; CV is the link to BSM from V

  • 6:

               LULUIV             ▹ Store V’s whisper ID (WID) for rebroadcast

  • 7:

               

  • 8:

            else                             ▹ Binding exists for IV

  • 9:

               if BU(IV)==dig(CV) then                 ▹ Binding confirmed?

  • 10:

                   C(IV)++                               ▹ Credit up

  • 11:

               else                                   ▹ Conflict

  • 12:

                   return                              ▹ Ignore this whisper

  • 13:

               end if

  • 14:

            end if

  • 15:

        else

  • 16:

            return                       ▹ Ignore this unverifiable neighbor

  • 17:

        end if

  • 18:

    end procedure