Table 1.
Reference | Architecture/framework | Applied technology | Security | Lightweight encryption method |
---|---|---|---|---|
[16] | ✓ | Cloud | ✘ | ✘ |
[17] | ✓ | Cloud | ✘ | ✘ |
[18] | ✓ | Cloud | ✘ | ✘ |
[19] | ✓ | Cloud | ✘ | ✘ |
[20] | ✓ | IoT | ✓ | ✘ |
[21] | ✓ | IoT | ✘ | ✘ |
[22] | ✓ | IoT | ✘ | ✘ |
[23] | ✓ | IoT | ✘ | ✘ |
[24] | ✓ | IoT | ✘ | ✘ |
[25] | ✓ | IoT | ✘ | ✘ |
[26] | ✓ | IoT | ✘ | ✘ |
[27] | ✓ | IoT | ✘ | ✘ |
[29] | ✓ | Cloud-based IoT | ✘ | ✘ |
[28] | ✓ | Cloud-based IoT | ✘ | ✘ |
[31] | ✓ | Cloud-based IoT | ✓ | ✘ |
[30] | ✓ | Cloud-based IoT | ✓ | ✘ |
[32] | ✓ | Cloud-based IoT | ✘ | ✘ |
[9] | ✓ | Cloud-based IoT | ✘ | ✘ |
[7] | ✓ | Cloud-based IoT | ✓ | ✘ |
[36] | ✘ | Not mentioned | ✘ | ✘ |
[35] | ✘ | Not mentioned | ✘ | ✘ |
[34] | ✘ | Not mentioned | ✘ | ✘ |
[43] | ✘ | Not mentioned | ✘ | ✘ |
[38] | ✘ | Not mentioned | ✘ | ✘ |
[44] | ✘ | Not mentioned | ✘ | ✘ |
[37] | ✘ | Not mentioned | ✘ | ✘ |
[39] | ✘ | Not mentioned | ✘ | ✘ |
[8] | ✓ | Cloud-based IoT | ✘ | ✘ |
Our proposed model | ✓ | Cloud-based IoT | ✓ | ✓ |