Securing the Network with Proof of Work