Fig. 8From: An active and verifiable trust evaluation approach for edge computingChange of trust value if verification is randomBack to article page