Figure 4From: Security management based on trust determination in cognitive radio networks The variation of an honest user’s trust values. Back to article page