Fig. 18From: An active and verifiable trust evaluation approach for edge computingNumber of detection hops created by remaining energy (different r)Back to article page