Fig. 1From: Trusted and secure clustering in mobile pervasive environmentRanking of trust levelBack to article page