Fig. 10From: An active and verifiable trust evaluation approach for edge computingAverage trust value of trusted nodesBack to article page