Fig. 9From: An active and verifiable trust evaluation approach for edge computingTrust value of sink after 10 rounds of data transmissionBack to article page