Figure 5From: Security management based on trust determination in cognitive radio networks The attenuation trend graph. Back to article page