Skip to main content
. 2020 Jun 2;22(6):e18938. doi: 10.2196/18938

Figure 8.

Figure 8

Simulation of data falsification by fraudulent access to the relay server. If an attacker successfully accesses the relay server fraudulently, the attacker can send falsified data to the blockchain. The falsified data from the hacked server will be detected by the integrity of the hashchain.