[17] |
2020 |
Leverages blockchain for secure and tamper-proof storage of trust information. |
Need for further validation and evaluation in real-world IoT scenarios. |
✓ |
✓ |
[60] |
2021 |
Uses data-driven approaches to detect and mitigate attacks. |
Need for practical implementation and evaluation in real-world IoT deployments. |
✓ |
✓ |
[61] |
2021 |
Explores security concerns in fog computing and potential solutions using blockchain. |
Lack of in-depth analysis and specific implementation details for blockchain solutions in fog computing. |
✓ |
✓ |
[62] |
2022 |
Explores the applications, benefits, and challenges of blockchain. |
Some security aspects discussed may become outdated over time. |
× |
× |
[63] |
2023 |
Analyzes the challenges and opportunities of integrating blockchain into trust-management systems. |
Fast-evolving nature of blockchain and IoT technologies may require frequent updates. |
✓ |
✓ |
[64] |
2022 |
Identifies the benefits, challenges, and potential applications of integrating blockchain with cloud computing. |
Findings may become outdated due to the rapidly evolving nature of blockchain technology. |
× |
× |
[65] |
2022 |
Presents an overview of blockchain-based security solutions for IoT. |
Lack of empirical evaluations and case studies to demonstrate the practical effectiveness of reviewed approaches. |
× |
× |