|
S. No. | Authors | Advantages of the work | Limitations of work |
|
1 | Kumar and Sukumar (2018) [10] | Proposed a novel scalar point multiplication | ECC method cannot handle the DoS assaults |
|
2 | Yau et al. (2018) [11] | Provided a review of smart devices in heterogeneous environments and analysed the energy consumption of IoT devices | It did not address the major challenging issues |
|
3 | Wang et al. (2017) [12] | Analysed the development from smart grid to EI | It did not address the security of electrical systems and correspondence systems |
|
4 | Zhou et al. (2016) [13] | Analysed IoE (Internet of Energy) with the business perspective | It did not address various aspects like behavioural, security, and administrative issues |
|
5 | Kamalinejad et al. (2015) [14] | Reviewed on productive WEH and life-time of WEH-empowered IoT gadgets | It only outlined how to empower WEH for IoT frameworks but no proposed solutions were given |
|
6 | Kaur and Sood (2015) [15] | Defined three layers Detecting and control Data handling and presentation | Calculation of accelerating the calculation time is not enough for energy design |
|
7 | Moness et al. (2015) [16] | A review for cutting edge layers was exhibited | It did not address the social impact |
|
8 | Tao et al. (2014) [17] | A new ESER assessment was analysed | Lack of design, development, and use of ESER |
|
9 | Nieminen et al. (2014) [18] | Technique to connect bluetooth LE devices with the IoT | It did not focus on smart devices administration and their improvement |
|
10 | Shrouf et al. (2014) [19] | Focused on energy administration; in addition to this, it also addressed how to enhance energy | It does not focus on recovery of information |
|
11 | Cao and Yang (2013) [20] | Focuses on energy “web” issues | It does not address the upcoming problems like energy production, consumption, and sharing |
|
12 | Krenge et al. (2013) [21] | Introduced energy name service (ENS) inside the IoE | But it did not address how ENS prohibits security issues and how the objects are recognized |
|
13 | Kelly et al. (2013) [22] | Proposed techniques to check easiness universal detecting framework | It does not focus on the next network technologies including IPv6 |
|