Research Article
UIV-TSP: A Blockchain-Enabled Antileakage Sharing Protection Scheme for Undisclosed IIoT Vulnerabilities
Table 2
Comparison of data leak prevention scheme.
| Scheme | Data leakage preventing | Transmission confidentiality | Continuous logs tampering |
| UIV-TSP | Yes | Yes | Yes | CROT | No | No | No | ADS | No | Yes | No | R-ADS | No | Yes | No | E-ADS | No | Yes | No |
|
|