Figure 2From: Exploiting and defending trust models in cooperative spectrum sensing Illustration of attack model. Back to article page