Research Article

A Survey of How to Use Blockchain to Secure Internet of Things and the Stalker Attack

Figure 9

Stalker miner strategy. A is attacker, H is the honest nodes, and V is the victim.