Fig. 4From: Trusted and secure clustering in mobile pervasive environmentTrusted cluster securityBack to article page