Research Article

Construction of Trusted Routing Based on Trust Computation

Figure 7

Message alteration attacks.