Figure 2From: Security management based on trust determination in cognitive radio networks The flow graph of scheme. Back to article page