Table 4: Suitability of IT-based solutions for their use in INs.

Name Ref. OSI layer IN interoperability Self-security

Beehive [23] 7 Low Medium
Bumgardner and Marek [24] 3, 4 Medium Medium
Camacho et al. [17] 3, 4, 7 Medium Unknown
Dromard et al. [25] 3, 4 Medium Medium
Giura and Wang [27] 3, 4, 7 Medium Medium
Gupta and Kulariya [28] 3, 4, 7 Medium Medium
Gonçalves et al. [29] 3, 4, 7 Low Medium
Hashdoop [31] Packet captures Dependent on implementation Medium
Marchal et al. [35] 3, 4, 7 Medium Medium
MATATABI [36] 3, 4, 7 Medium Medium
Rathore et al. [37] 3, 4 Medium Medium
Ratner and Kelly [38] Packet captures Medium Medium
Therdphapiyanak and Piromsopa [39] 3, 4, 7 Medium Medium
TADOOP [40] 3, 4 Medium Medium
Wang et al. [41] 3, 4 Medium Medium
Xu et al. [42] 7 Medium Medium