Fig. 4
From: Enhancing secure IoT data sharing through dynamic Q-learning and blockchain at the edge

Attack model in Scenario 1 (Centralized scenario).
From: Enhancing secure IoT data sharing through dynamic Q-learning and blockchain at the edge

Attack model in Scenario 1 (Centralized scenario).