Research Article

A Survey of How to Use Blockchain to Secure Internet of Things and the Stalker Attack

Figure 13

Attacker stale blocks.