Figure 6From: Security management based on trust determination in cognitive radio networks Cluster heads selection. Back to article page