Fig. 5From: Ensuring security in edge computing through effective blockchain node detectionResults of parameters analysisBack to article page