Skip to main content
. 2020 Oct 22;20(21):5997. doi: 10.3390/s20215997
Algorithm A6. Attacks Isolation
1: input: node_id
2: input: attack_status
3: input: alert
4: if attack_status[node_id] == 0 then
5:   set alert: (legitimate node, node_id)
6: else
7: if attack_status[node_id] == 1 then
8: set alert: (malicious node, node_id)
9 End if
10: End if
11: End