Fig. 7From: An active and verifiable trust evaluation approach for edge computingChange of trust value if verification failedBack to article page