Research Article
Research on a Shared Bicycle Deposit Management System Based on Blockchain Technology
Algorithm 5
Identify malicious paths.
(1) | READ: merkleRoot’ | (2) | if merkleRoot= merkleRoot’ then | (3) | Transactions are all legitimate | (4) | else | (5) | A selective transaction dropping attack has happened | (6) | end if |
|