Research Article
A Hybrid Opportunistic IoT Secure Routing Strategy Based on Node Intimacy and Trust Value
(i) | Input: , | (ii) | Output: | (1) | While message do | (2) | | (3) | Get | (4) | | (5) | | (6) | | (7) | , | (8) | For do | (8) | If then | (9) | | (10) | Else | (11) | | (12) | End If | (13) | End For | (13) | End While |
|