Fig. 16From: An active and verifiable trust evaluation approach for edge computingNumber of detection hops created by the remaining energy (different k1, k2)Back to article page