Research Article
Detectable, Traceable, and Manageable Blockchain Technologies BHE: An Attack Scheme against Bitcoin P2P Network
Figure 2
Describe the execution flow of a BHE attack, which consists of 3 steps and is able to control the peering decision of the victim node.