Research Article

A Survey of How to Use Blockchain to Secure Internet of Things and the Stalker Attack

Table 3

Decision matrix.

lh
1234567891011

la1“w”, “w””, “a”---------
2“w”, “w”“w”, “w””, “a”--------
3“w”, “w”“w”, “w”“w”, “w””, “a”-------
4“w”, “w”“w”, “w”“w”, “w”“w”, “w””, “a”------
5“w”, “w”“w”, “w”“w”, “w”“w”, “w”“w”, “w””, “a”-----
6“w”, “w”“w”, “w”“w”, “w”“w”, “w”“w”, “w”“w”, “w””, “a”----
7“w”, “w”“w”, “w”“w”, “w”“w”, “w”“w”, “w”“w”, “w”“w”, “w””, “a”---
8“w”, “w”“w”, “w”“w”, “w”“w”, “w”“w”, “w”“w”, “w”“w”, “w”“w”, “w””, “a”--
9“w”, “w”“w”, “w”“w”, “w”“w”, “w”“w”, “w”“w”, “w”“w”, “w”“w”, “w”“w”, “a””, “a”-
10“a”, “w”“a”, “w”“a”, “w”“a”, “w”“a”, “w”“a”, “w”“a”, “w”“a”, “w”“a”, “w”“w”, “w””, “a”
11---------“a”, “a”“w”, “w”

The rows correspond to the length, la, of the adversary’s chain and the columns correspond to the length, lh, of the honest network’s chain. The two values in each table entry correspond to the forks, first the attacker and second the honest one. w and a denote the wait and adopt actions, respectively.