Figure 7From: Security management based on trust determination in cognitive radio networks The change of trust value under the three kinds of attack. Back to article page