Fig. 2From: An active and verifiable trust evaluation approach for edge computingThe network modelBack to article page