Research Article

A Novel Trust Model Based on Node Recovery Technique for WSN

Figure 8

Comparison of the trust value of malicious nodes and normal nodes under a varying number of interactions: (a) TMBNRT, (b) RFSN, and (c) BTMS.
(a)
(b)
(c)