Table 3 Comparison of the threat actors and some of the attack scenarios and corresponding examples.

From: Adapting blockchain’s proof-of-work mechanism for multiple traveling salesmen problem optimization

Threat actor

Threat scenario

Example

Malicious miners

51% Attack22

Malicious miners set controls over 50% of the blockchain's computational power, threatening transaction integrity

External attackers

Double-spending23

In a decentralized mTSP environment, external attackers try to utilize the same cryptocurrency multiple times

Denial of service (DoS) and distributed DoS24

Attackers overload the system with requests, preventing genuine users from accessing it

Sybil attacks25

Attackers create multiple Sybil nodes or identities to control the network and disrupt consensus

Eclipse attacks26

Attackers separate a node from the network in order to influence its routing choices or deny it access to certain information