Skip to main content
. 2024 Mar 25;24(7):2098. doi: 10.3390/s24072098

Figure 3.

Figure 3

Nodes path selection through most trusted nodes.