Table 1 Comparative analysis of blockchain and RL-enhanced IIoT data sharing frameworks.
From: Enhancing secure IoT data sharing through dynamic Q-learning and blockchain at the edge
Reference | Blockchain-Based | ML/RL | Dynamic Node Selection | Smart Contract Access Control | IIoT/Edge Suitability |
|---|---|---|---|---|---|
Kaur et al.4 | No | Yes | No | No | Yes |
Makhdoom et al.5 | Yes | No | No | No | Yes |
Aljumah6 | Yes | No | No | No | Yes |
Yang et al. (EdgeShare)9 | Yes | No | No | Yes | Yes |
Androulaki et al.17 | Yes | No | No | No | No |
Wang et al.18 | No | No | No | No | Yes |
Wood (Ethereum)19 | Yes | No | No | No | No |
Benet & Greco (Filecoin)20 | Yes | No | No | No | No |
Mollah et al.21 | Yes | No | No | Yes | Yes |
ChainSplitter22 | Yes | No | No | No | Yes |
LayerChain23 | Yes | No | No | No | Yes |
El-Hindi et al.24 | Yes | No | No | No | No |
BGP-LSChain25 | Yes | No | No | Yes | No |
Ababio et al.26 | Yes | Yes | No | No | Yes |
IoV-6G + + 27 | Yes | No | No | No | Yes |
IoEPM + 28 | Yes | No | No | No | Yes |
Kumar et al.29 | Yes | No | No | No | Yes |
Yes | No | No | No | Yes | |
Kumar et al.32 | Yes | No | No | No | Yes |
Liu et al.33 | Yes | Yes | Yes | No | Yes |
Lu et al.34 | Yes | Yes | No | No | Yes |
Abou El Huda et al.35 | Yes | Yes | No | No | Yes |
SecureShare 36 | Yes | No | No | No | No |