Research Article
A Survey of How to Use Blockchain to Secure Internet of Things and the Stalker Attack
if next block == victim then | if la > lh then | publish attacker’s chain; | else | switch ReadDecisionMatrix do | case wait do | continue mining | end | case adopt do | restart attack | end | end | end | else | switch ReadDecisionMatrix do | case wait do | continue mining | end | case adopt do | restart attack | end | end | end |
|