Research Article

A Survey of How to Use Blockchain to Secure Internet of Things and the Stalker Attack

Algorithm 1

Stalker attack.
if  next block == victim  then
if  la > lh  then
publish attacker’s chain;
else
switch  ReadDecisionMatrix  do
case  wait  do
continue mining
end
case  adopt  do
restart attack
end
end
end
else
switch  ReadDecisionMatrix  do
case  wait  do
continue mining
end
case  adopt  do
restart attack
end
end
end