Research Article

A Smart Trust Management Method to Detect On-Off Attacks in the Internet of Things

Figure 3

Expected range of trusted values.