Research Article

Protecting Mobile Crowd Sensing against Sybil Attacks Using Cloud Based Trust Management System

Figure 2

An example diagram of suspicious Sybil attack activity traffic volume.