|
Algorithm 2 Algorithm for Trust Evaluation Phase |
|
Input: The trustiness of the node k
|
| The node u is who sends a query against suspicious node w
|
|
Output: Determine how to perform trust evaluation for suspicious node w
|
|
if there are no nodes around suspicious node w to perform the trust evaluation then
|
| gateway determine Gateway-assisted trust evaluation through physical inspection |
|
else
|
| if node w’s trustiness is higher than 0.6 then
|
| gateway determine Gateway-independent trust evaluation through collaborative inspection |
| else
|
| gateway determine Gateway-assisted trust evaluation through logical inspection |
| end if
|
|
end if
|