Research Article

Protecting Mobile Crowd Sensing against Sybil Attacks Using Cloud Based Trust Management System

Figure 3

Illustration of suspicious Sybil attack activities in a region.
(a)
(b)