Table 1 Summary of the literature review.

From: A two-phase spatiotemporal chaos-based protocol for data integrity in IoT

Ref

Year

Methodology

Limitations

6

2018

Linear chaotic map for pseudo-random permutation of data

Limited key space, low efficiency against differential and brute-force attacks10

11

2019

Digital signature with ZSS format to reduce computational overhead

Requires Trusted Third Party (TPA) system for initialization

12

2022

Blockchain-based Threat Intelligence Integrity Audit (TIIA) with double chain structure

High implementation cost, complex auditing

13

2021

Distributed edge computing with blockchain for real-time data integrity

High computational complexity, significant overhead

14

2021

Hierarchical framework for fast and secure data integrity verification

Not specified

15

2021

Data integrity checking with original data recovery for maritime IoT

Focused on a specific application domain

16

2022

Elliptical Curve Digital Signature (ECDS) for public-key cryptography

Relies on centralized SDN architecture

17

2021

Blockchain for tamper-proof data and low verification cost

Not specified

18

2020

Secure channels for data transmission in wireless mesh networks

Focused on data transmission security, not general data integrity

19

2022

Blockchain-of-Blockchains (BoBs) for interoperable data integrity in smart cities

Increased complexity compared to single blockchain

20

2020

Blockchain with advanced cryptography (Lifted EC-ElGamal cryptosystem) for privacy-preserving data integrity

Complex cryptographic techniques

21

2020

Online data integrity monitoring method for digital sensors

Focused on sensor data integrity, not general IoT data

22

2023

Trusted Consortium Blockchain (TCB) for big data integrity in smart manufacturing

Requires consortium formation and management