Fig. 3From: Trusted and secure clustering in mobile pervasive environmentMalicious node detection in Cluster formationBack to article page