Skip to main content

Advances, Systems and Applications

Table 5 Change of node 2 trust value in Case 2

From: An active and verifiable trust evaluation approach for edge computing

n

φ = 10%

φ = 10%

φ = 15%

0

0.5

0.8

0.8

1

0.45

0.78

0.77

2

0.395

0.758

0.7355

3

0.3345

0.7338

0.6958

4

0.2680

0.7072

0.6502

5

0.1947

0.6778

0.5977

6

0.1142

0.6457

0.5374

7

0.0256

0.6103

0.4680

8

–

0.5713

0.3882

9

–

0.5284

0.2964

10

–

0.4813

0.1909