Table 1 Comparative Analysis of Blockchain-Based Security Frameworks.

From: Resilient security architecture for smart buildings using DLT powered encryption

Author & Year

Proposed Study

Methodology/Parameters

Key Results

Strengths

Weaknesses

Padma and Ramaiah (2024)9

SecPrivPreserve framework for blockchain platform security across different frameworks

\(\bullet\) Password-based authentication

\(\bullet\) Advanced encryption algorithms

\(\bullet\) Cryptographic hashing

\(\bullet\) Response time: 34s

\(\bullet\) Computational overhead: 94s

\(\bullet\) Encryption time: 0\(\bullet\)87s

\(\bullet\) Multi-layered security approach

\(\bullet\) Framework agnostic design

\(\bullet\) Reasonable encryption performance

\(\bullet\) High computational overhead (94s)

\(\bullet\) Slow response time

\(\bullet\) Limited scalability metrics

Mishra and Chaurasiya (2024)12

Blockchain-based distributed network for smart cities security

\(\bullet\) Hybrid deep learning algorithm

\(\bullet\) Long Short Term Memory (LSTM)

\(\bullet\) Support Vector Machines (SVM)

\(\bullet\) Accuracy: 97%

\(\bullet\) Specificity: 98%

\(\bullet\) Excellent accuracy metrics

\(\bullet\) Hybrid ML approach

\(\bullet\) Smart city focus

\(\bullet\) No throughput/latency metrics

\(\bullet\) Limited energy analysis

\(\bullet\) Scalability concerns

Sisi and Souri (2024)20

Energy-aware mobile crowd sensing with blockchain technology analysis

\(\bullet\) Applied optimization algorithms

\(\bullet\) Multi-factor evaluation framework

\(\bullet\) Diverse environment testing

\(\bullet\) Private blockchain: 35%

\(\bullet\) Public blockchain: 33%

\(\bullet\) Consortium: 24%

\(\bullet\) Hybrid: 8%

\(\bullet\) Comprehensive blockchain analysis

\(\bullet\) Energy-aware design

\(\bullet\) Mobile integration

\(\bullet\) Distribution rather than performance

\(\bullet\) Limited quantitative metrics

\(\bullet\) No baseline comparison

Padma and Ramaiah (2024)19

Trust-based consensus mechanism for reducing network overhead and energy consumption

\(\bullet\) Grey Wolf Optimization (GWO)

\(\bullet\) Proof of Work (PoW) enhancement

\(\bullet\) Proof of Stake (PoS) integration

\(\bullet\) Throughput increase: 12.5%

\(\bullet\) Mining delay reduction: 19.5%

\(\bullet\) Energy usage reduction: 18.3%

\(\bullet\) Optimization-based consensus

\(\bullet\) Significant energy savings

\(\bullet\) Improved mining efficiency

\(\bullet\) Moderate improvements

\(\bullet\) Complex hybrid mechanism

\(\bullet\) Limited real-world validation