Research Article

Detectable, Traceable, and Manageable Blockchain Technologies BHE: An Attack Scheme against Bitcoin P2P Network

Figure 2

Describe the execution flow of a BHE attack, which consists of 3 steps and is able to control the peering decision of the victim node.