Fig. 6From: An active and verifiable trust evaluation approach for edge computingChange of trust value if verification is successfulBack to article page