Return to Article Details Isolating malicious nodes in the Internet of Things through a Trust-Based Mechanism Download Download PDF