Research Article

Rogue Device Mitigation in the Internet of Things: A Blockchain-Based Access Control Approach

Figure 3

The probability of an adversary () trying to reach a breakeven point, i.e., mine an alternate and dishonest chain in a blockchain by competing against an honest chain that has the computing power of at least 51% of honest miners.