Fig. 5
From: Enhancing secure IoT data sharing through dynamic Q-learning and blockchain at the edge

Attack model in the BDEQ scenario (Scenario 2), demonstrating decentralized defense layers using DS-PSPNs, blockchain verification, and trust-aware selection. This figure was created by authors using Microsoft Visio, Version 2412 (Build 18,324.20194). The software is available at: https://www.microsoft.com/en-us/microsoft-365/visio/flowchart-software.