Skip to main content
. 2022 Jan 12;22(2):579. doi: 10.3390/s22020579
Algorithm 3. Pseudo code for CON authentication
INPUT: Number of nodes, Target security level each node
1  iterate (node size increases):
2    set target security levels for all nodes
3    // each group of target levels has
4    // the same number of nodes of the ones of DAM4SNC’s)
5  while (until all nodes reach the target security level and transmit data):
6    randomly choose N (nodes to be authenticated)
7    Tn = Tn + 1
8    if Tn == target_level:
9     transfer datan
OUTPUT: Latency