From: A blockchain-based smart home gateway architecture for preventing data forgery
Research work | Security architecture | Methodology | Research gap | Proposed approach |
---|---|---|---|---|
Sivaraman et al. [22] | Centralized | Manage and verify the certified devices using the Internet Service Provider | Does not provide security to internal internet environment due to lack of user’s data for analysis | Employ blockchain to manage and verify the certified devices |
Copos et al. [23] | Centralized | Check the flow of confidential data using Wireshark for devices | Provide a software specific solution | Does not use any software like Wireshark |
Lee et al. [24] | Centralized | Manages firmware updates of embedded devices using blockchain | Does not provide security solution to a small smart home wherein small number of embedded devices are connected to each other | Provide a scalable solution using blockchain |
Bull et al. [25] | Centralized | Employ centralized control and configuration using SDN to provide flexible and secure communication | Can be result in the problem of a single point of failure | Support a decentralized solution using blockchain |