Fig. 17From: An active and verifiable trust evaluation approach for edge computingNumber of detection hops that created by the remaining energy(r = 50)Back to article page