Skip to main content
. 2020 Feb 18;20(4):1108. doi: 10.3390/s20041108
Algorithm 2 Algorithm for Trust Evaluation Phase
Input: The trustiness of the node k Tk
    The node u is who sends a query against suspicious node w
Output: Determine how to perform trust evaluation for suspicious node w
if there are no nodes around suspicious node w to perform the trust evaluation then
 gateway determine Gateway-assisted trust evaluation through physical inspection
else
if node w’s trustiness Tw is higher than 0.6 then
  gateway determine Gateway-independent trust evaluation through collaborative inspection
else
  gateway determine Gateway-assisted trust evaluation through logical inspection
end if
end if