Research Article
A Survey of How to Use Blockchain to Secure Internet of Things and the Stalker Attack
Table 1
Comparison between Blockchain systems.
| Blockchain | Bitcoin | Ethereum | Hyperledger | Ripple |
| Nature | Permissionless | Permissionless | Permissioned | Permissioned | Validation | PoW | Ethash PoW | PBFT | BFT customized (RPCA) | SHA-256 | Purpose | cryptocurrency | Smart contract | Chaincode | Cryptocurrency | Language | Stack based scripts | Internal code | Go, Java | C++ | Turing complete | Block processing time | 600 s | 15 s | Real time | Real time |
|
|