Research Article

Construction of Trusted Routing Based on Trust Computation

Figure 9

On-off attack.