Research Article
A Survey of How to Use Blockchain to Secure Internet of Things and the Stalker Attack
Table 4
Comparative of stale blocks.
(a) Attacker hash power 20% |
| Target Hash power | Target | Honest | Mined | Stale % | Mined | Stale % |
| 5% | 92 | 8 | 8,30% | 1452 | 9 | 0,62% | 10% | 193 | 15 | 7,50% | 1333 | 16 | 1,20% | 15% | 300 | 21 | 6,96% | 1268 | 17 | 1,34% | 20% | 383 | 23 | 6,06% | 1160 | 19 | 1,64% | 25% | 488 | 32 | 6,62% | 1056 | 20 | 1,89% | 30% | 585 | 31 | 5,34% | 984 | 23 | 2,34% |
|
|
(b) Attacker hash power 40% |
| Target Hash power | Target | Honest | Mined | Stale % | Mined | Stale % |
| 5% | 96 | 38 | 39,63% | 1083 | 152 | 14,04% | 10% | 195 | 69 | 35,54% | 996 | 143 | 14,36% | 15% | 287 | 95 | 33,14% | 878 | 151 | 17,20% | 20% | 394 | 121 | 30,61% | 782 | 131 | 16,75% | 25% | 482 | 136 | 28,20% | 675 | 115 | 17,04% | 30% | 572 | 152 | 26,58% | 570 | 95 | 16,67% |
|
|