In the network model, we will introduce several entities existing in the system. In the threat model, we will introduce the threat attacks existing in the blockchain based Internet of things environment, mainly the collusion behaviors between nodes. Design of RVC mechanism This section presents ...