Research Article

IOV Privacy Protection System Based on Double-Layered Chains

Algorithm 6

Information dissemination.
INPUT:  
OUTPUT:  
1: function
2:
3:
4:
5:
6:if   is valid  then
7:
8:
9:
10:else
11:return  
12:end if
13:if   is valid  then
14:if   is valid  then
15:A gets reward for TA
16:else
17:A gives loss to TA
18:end if
19:else
20:return  
21:end if
22: end function