Table 1 Summary of the literature review.
From: A two-phase spatiotemporal chaos-based protocol for data integrity in IoT
Ref | Year | Methodology | Limitations |
|---|---|---|---|
2018 | Linear chaotic map for pseudo-random permutation of data | Limited key space, low efficiency against differential and brute-force attacks10 | |
2019 | Digital signature with ZSS format to reduce computational overhead | Requires Trusted Third Party (TPA) system for initialization | |
2022 | Blockchain-based Threat Intelligence Integrity Audit (TIIA) with double chain structure | High implementation cost, complex auditing | |
2021 | Distributed edge computing with blockchain for real-time data integrity | High computational complexity, significant overhead | |
2021 | Hierarchical framework for fast and secure data integrity verification | Not specified | |
2021 | Data integrity checking with original data recovery for maritime IoT | Focused on a specific application domain | |
2022 | Elliptical Curve Digital Signature (ECDS) for public-key cryptography | Relies on centralized SDN architecture | |
2021 | Blockchain for tamper-proof data and low verification cost | Not specified | |
2020 | Secure channels for data transmission in wireless mesh networks | Focused on data transmission security, not general data integrity | |
2022 | Blockchain-of-Blockchains (BoBs) for interoperable data integrity in smart cities | Increased complexity compared to single blockchain | |
2020 | Blockchain with advanced cryptography (Lifted EC-ElGamal cryptosystem) for privacy-preserving data integrity | Complex cryptographic techniques | |
2020 | Online data integrity monitoring method for digital sensors | Focused on sensor data integrity, not general IoT data | |
2023 | Trusted Consortium Blockchain (TCB) for big data integrity in smart manufacturing | Requires consortium formation and management |