Skip to main content
. 2022 Jun 16;22(12):4539. doi: 10.3390/s22124539
Algorithm 5 RPL-based trust algorithm.
  • 1:

    initialize variables:

  • 2:

    initialize all FCM variables

  • 3:

    initialize all MST parameters

  • 4:

    initialize all trust parameters

  • 5:

    function

  • 6:

        Call ← RPL topology()

  • 7:

    end function

  • 8:

    function

  • 9:

        Call ← Clustering()

  • 10:

        Clustering() ← FCM algorithm

  • 11:

    end function

  • 12:

    function

  • 13:

        Itinerary() ← dynamic itinerary planner algorithm

  • 14:

        Call ← Routing()

  • 15:

        Routing() ← MST algorithm

  • 16:

        Call ← mobileAgent()

  • 17:

        mobileAgent() ← MA generator

  • 18:

        Call ← Security()

  • 19:

        Security() ← Security key generator and assignment

  • 20:

    end function

  • 21:

    function

  • 22:

        Call ← Trust()

  • 23:

        Trust() ← trust SLF algorithm

  • 24:

        Trust propagation of malicious node isolation

  • 25:

    end function