| Algorithm 3. Pseudo code for CON authentication |
|
INPUT: Number of nodes, Target security level each node 1 iterate (node size increases): 2 set target security levels for all nodes 3 // each group of target levels has 4 // the same number of nodes of the ones of DAM4SNC’s) 5 while (until all nodes reach the target security level and transmit data): 6 randomly choose N (nodes to be authenticated) 7 Tn = Tn + 1 8 if Tn == target_level: 9 transfer datan OUTPUT: Latency |