Research Article

A Survey of How to Use Blockchain to Secure Internet of Things and the Stalker Attack

Table 1

Comparison between Blockchain systems.

BlockchainBitcoinEthereumHyperledgerRipple

NaturePermissionlessPermissionlessPermissionedPermissioned
ValidationPoWEthash PoWPBFTBFT customized (RPCA)
SHA-256
PurposecryptocurrencySmart contractChaincodeCryptocurrency
LanguageStack based scriptsInternal codeGo, JavaC++
Turing complete
Block processing time600 s15 sReal timeReal time