Figure 1From: A security authentication method based on trust evaluation in VANETs Distribution of security degree. Back to article page