Skip to main content
. 2022 Sep 30;22(19):7433. doi: 10.3390/s22197433

Table 10.

Comparative analysis of IoT security schemes.

Author Year Objective Technique Used Type of Data Framework Pros Cons
Guo et al. [214] 2017 Solve complexity due to dynamic data PKI Big data Big data left Single sign-on ID exposed, Fake certificate after changing RSU
Li et al. [215] 2019 Remove certificate storage dependency PKI Vehicle data - Certificate-less vulnerable to resist attack
Kerrache et al. [218] 2019 To ensure trust among drivers Chaotic map and Social Network Social profile TACASHI Honesty factor Dependent on external factor
Meshram et al. [221] 2021 To secure smart city Chaotic map Smart city - Lightweight Need to enhance security
Al et al. [219] 2021 Reduce communication and key management overhead CRSA Throughput gain - Minimizes collision and Improved throughput High storage, Keys of vehicles can be exposed
Hwang et al. [223] 2020 To enable safe channel for sharing medical data CP-ABE Medical data - Safeguard issue of key abuse Leakage of PHI file
Han et al. [222] 2021 Algorithm to build frequent item sets CP-ABE Attributes - Improved speed Limited to same attribute set
Huang et al. [224] 2019 To safeguard against unauthorized entity ECG PHR file - Lightweight Need to be anonymous
Hahn et al. [228] 2019 Countermeasure against MAC-based flaws MAC Health data - Less verification time Server impersonation
Siddiqi et al. [227] 2020 To build feasible and secure IoMT communication MAC Medical data IMDfence Less energy consumption Need to ensure anonymity
Wazid et al. [229] 2019 Secure wireless communication ECC Surrounding information AKM-IoV Dynamic node addition Does not resist DoS attack
Wu et al. [230] 2020 Reduce the verification delay and achieve fast message verification ECC Batch message - Batch verification Need focus on security
Thumbur et al. [231] 2021 Avoid complex certificate management problem and key escrow problem ECC Signature Aggregate Signature Low verification time and storage at RSU DoS attack
Zhang et al. [232] 2020 Secure communication with limited bandwidth ECC Signature - Random number to avoid side-channel attack Need RSU and TA secure communication
Ghahramani et al. [233] 2020 Support roaming users in global mobility network ECC Mobile users data - Added deep learning to verify biometric High storage and communication cost
Xie et al. [235] 2021 To protect wireless sensor networks in smart city ECC Wireless sensor - Simple Smart card stolen attack
Xia et al. [237] 2021 To secure environment of smart grid ECC Smart meter - Completed in two steps Smart meter capture attack
Chen et al. [238] 2021 To get data from edge nodes ECC Edge utility nodes - XOR and Hashed computation Did not consider the whole network
Srinivas et al. [239] 2021 Secure big data collection in smart transportation ECC Vehicle data - Security Computational, communication cost
Sharma et al. [243] 2021 Correctness of data exchange Supervised machine learning Location and movement - Detect attack and countermeasure Limited to position based attack
Pascale et al. [244] 2021 Detection of a possible cyber-attack Machine learning Parameters as RPM - Accuracy Not focused on data transmission
Pradeep et al. [245] 2022 Secure smart city applications CHAP PPP Operational data of city - Simple calculations System verification is absent
Wang et al. [246] 2018 Physical and external security PUF Vehicle data NOTSA OBU with segregated applications Need secure area in OBU
Yanambaka et al. [250] 2019 To develop secure IoMT system PUF Health data PMSec Simple and lightweight ML attack, MITM attack
Alladi et al. [247] 2021 Verification of ECU firmware PUF and ECC Firmware and software - Physical safety Insider can identify secret key
Aman et al. [248] 2021 Resist physical attacks and reduce overhead with secure communication PUF Network traffic - Low authentication packets and overhead CRP updates can expose system
Alladi et al. [249] 2021 Sensitive information transfer and resist node capture/tampering attack PUF Traffic information SecAuthUAV Low energy in device and low storage in server Could server impersonation and ID expose
Badar et al. [251] 2021 Securing smart grid PUF Line flaw or breakage - Computational cost is low Communication cost is high
Tanveer et al. [252] 2021 To make reliable smart grids PUF and ECC Power usages ARAP-SG Computational cost is less Unnecessary storage and computation
Jiang et al. [254] 2019 Application of blockchain in IoV Blockchain Big data - Showed IoV using Blockchain Security will be in future work
Liu et al. [255] 2019 Reduce transaction confirmation delay and clod-start of new users Blockchain (PoW) Traffic information - Pricing strategy Not suitable for high resource adversary
Yin et al. [256] 2020 Reduce processing time with gainig profit Blockchain Mobile crowdsensing - Time-window based urgent task Reactive security
Yang et al. [257] 2019 Trust management in vehicular network Blockchain (PoW and PoS) Traffic - Credible neighbor rating Reply attack, MITM attack etc, overhead
Gao et al. [258] 2020 Effective network management Blockchain Vehicular data SDN Avoid frequent handover and relieve pressure No focus on data transmission trust
Xu et al. [259] 2021 Energy efficiency and encounter external invasion Blockchain Vehicular data - Suitable for high amount of data basic security
Javaid et al. [260] 2020 Trust establishment Blockchain (dPoW) and PUF Traffic - No physical and side-channel attack Can expose response
Vivekanandan et al. [261] 2021 Secure device to device communication in smart city Blockchain and ECC Devices data BIDAPSCA5G Location incorporation Eavesdropping attack
Wang et al. [262] 2022 To build a reliable communication channel for healthcare Blockchain (PoW) and PUF Health information - Low cost Storage cost