Research Article
Secure and DoS-Resilient Fragment Authentication in CCN-Based Vehicular Networks
Algorithm 1
Proposed hash tree construction.
(1) , , | (2) while do | (3) | (4) | (5) if and then | (6) : redundancy rate of IDA | (7) Encode into fragments by | performing . | (8) else | (9) | (10) Split into fragments . | (11) if then | (12) | (13) | (14) else | (15) | (16) | (17) |
|