Skip to main content

Advances, Systems and Applications

Table 1 Survey on the existing literature works

From: An artificial intelligence lightweight blockchain security model for security and privacy in IIoT systems

Methods

Description

Pros & Cons

Fuzzy Keyword Search [2]

It aims to retrieve the EMR based on the fuzzy keyword search securely.

Lack of reliability, and computational burden.

Machine learning based IDS [7]

Here, a lightweight IDS framework is developed for protecting Edge IIoT systems from intrusions.

Efficient in data handling, easy to understand, and high time consumption.

Shamir’s threshold cryptography [8]

A blockchain-based cryptographic model is implemented to assure the data privacy in IIoT systems.

Ineffective decision making, high time for encryption and decryption.

KH-DLNN [24]

It uses the optimization integrated deep learning model for categorising the attacking events to ensure security.

Reduced time consumption for classification and slow convergence.

GA- SVM [25]

It predicts the intrusions according to the features of the dataset provided by GA.

Not suitable for large-scale applications, overfitting, and overlapping.