Research Article

A Survey of How to Use Blockchain to Secure Internet of Things and the Stalker Attack

Figure 11

Target’s stale blocks.