Fig. 3From: Ensuring security in edge computing through effective blockchain node detectionDegree distribution of all/illicit nodesBack to article page