Fig. 5From: Efficient trust management with Bayesian-Evidence theorem to secure public key infrastructure-based mobile ad hoc networksHexagonal cluster constructionBack to article page