Fig. 5From: A trusted de-swinging k-anonymity scheme for location privacy protectionThe reputation value tendecy of malicious nodes compare with [26] and [30]Back to article page