Advances, Systems and Applications
Methods | Description | Pros & Cons |
---|---|---|
Fuzzy Keyword Search [2] | It aims to retrieve the EMR based on the fuzzy keyword search securely. | Lack of reliability, and computational burden. |
Machine learning based IDS [7] | Here, a lightweight IDS framework is developed for protecting Edge IIoT systems from intrusions. | Efficient in data handling, easy to understand, and high time consumption. |
Shamir’s threshold cryptography [8] | A blockchain-based cryptographic model is implemented to assure the data privacy in IIoT systems. | Ineffective decision making, high time for encryption and decryption. |
KH-DLNN [24] | It uses the optimization integrated deep learning model for categorising the attacking events to ensure security. | Reduced time consumption for classification and slow convergence. |
GA- SVM [25] | It predicts the intrusions according to the features of the dataset provided by GA. | Not suitable for large-scale applications, overfitting, and overlapping. |