Skip to main content
. 2022 Aug 16;22(16):6133. doi: 10.3390/s22166133
Algorithm 3 Device Isolation
Input:ProfDT,  DTn, CertDT, DTprvK, DTpubK, Security Vendor
  1. Begin:

  2. Revoke DTn:

  3.     for  (DT=1 to DTn) do

  4.        Encrypt DT Certificate

  5.       Encrypt CertDT with       DTprvK

  6.       DTn(DTprvK(CertDT)) → Blockchain

        Decrypt and Verify DT Certificate

  7.            if  DTn(DTpubK(CertDT)) = True

  8.                return DT authentication successful

  9.                   if DTn((CertDT)) = True             // Verify if DTn is compromised

  10.                       return revoke DTn((CertDT))

  11.                       DTn((CertDT)) → Blockchain // Record revoked Certificate in Blockchain

  12.                  else

  13.                       return DTn((CertDT)) is verified

  14.                  end if

  15.          else

  16.             return CertDT not found. Authentication failed

  17.          end if

  18.      end for

  19. End