Fig. 5From: Providing trusted data for industrial wireless sensor networksDirect trust and indirect trust in sensor networksBack to article page