Research Article

Construction of Trusted Routing Based on Trust Computation

Figure 8

Badmouth attack.