Research Article

A Survey of How to Use Blockchain to Secure Internet of Things and the Stalker Attack

Table 4

Comparative of stale blocks.
(a) Attacker hash power 20%

Target
Hash power
TargetHonest
MinedStale %MinedStale %

5%9288,30%145290,62%
10%193157,50%1333161,20%
15%300216,96%1268171,34%
20%383236,06%1160191,64%
25%488326,62%1056201,89%
30%585315,34%984232,34%

(b) Attacker hash power 40%

Target
Hash power
TargetHonest
MinedStale %MinedStale %

5%963839,63%108315214,04%
10%1956935,54%99614314,36%
15%2879533,14%87815117,20%
20%39412130,61%78213116,75%
25%48213628,20%67511517,04%
30%57215226,58%5709516,67%