Fig. 5From: An active and verifiable trust evaluation approach for edge computingData transmission on the routing PathBack to article page