Algorithm 5 RPL-based trust algorithm. |
-
1:
initialize variables:
-
2:
initialize all FCM variables
-
3:
initialize all MST parameters
-
4:
initialize all trust parameters
-
5:
function
-
6:
Call ← RPL topology()
-
7:
end function
-
8:
function
-
9:
Call ← Clustering()
-
10:
Clustering() ← FCM algorithm
-
11:
end function
-
12:
function
-
13:
Itinerary() ← dynamic itinerary planner algorithm
-
14:
Call ← Routing()
-
15:
Routing() ← MST algorithm
-
16:
Call ← mobileAgent()
-
17:
mobileAgent() ← MA generator
-
18:
Call ← Security()
-
19:
Security() ← Security key generator and assignment
-
20:
end function
-
21:
function
-
22:
Call ← Trust()
-
23:
Trust() ← trust SLF algorithm
-
24:
Trust propagation of malicious node isolation
-
25:
end function
|