Review Article
Text Data Security and Privacy in the Internet of Things: Threats, Challenges, and Future Directions
Table 2
Robustness analysis against attacks
| Sr. No | Authors | Insertion | Deletion | Reordering | Reformatting | Copy and paste | Retyping |
| 1 | Al-Nofaie et al. [89] | ✓ | ✓ | | ✓ | ✓ | | 2 | Rizzo et al. [90] | | | ✓ | ✓ | ✓ | | 3 | Alotaibi et al. [75] | ✓ | | | ✓ | ✓ | | 4 | Ahvanooey et al. [29] | ✓ | | ✓ | ✓ | ✓ | ✓ | 5 | Alotaibi et al. [91] | ✓ | | | ✓ | ✓ | | 6 | Ahvanooey et al. [31] | ✓ | | ✓ | ✓ | ✓ | | 7 | Mir. [82] | | ✓ | | | | ✓ | 8 | Por et al. [36] | ✓ | | | ✓ | ✓ | | 9 | Chou et al. [92] | ✓ | | | ✓ | ✓ | | 10 | Umair et al. [7] | ✓ | | ✓ | ✓ | ✓ | ✓ | 11 | Alginahi et al. [35] | ✓ | ✓ | | ✓ | ✓ | | 12 | Gutub et al. [78] | ✓ | | | ✓ | ✓ | | 13 | Lee et al. [93] | ✓ | | ✓ | ✓ | ✓ | | 14 | Bender et al. [94] | ✓ | | | ✓ | ✓ | | 15 | Lu et al. [95] | | ✓ | | ✓ | ✓ | ✓ | 16 | Mali et al. [24] | ✓ | | | ✓ | ✓ | ✓ | 17 | Halvani et al. [96] | ✓ | | ✓ | ✓ | ✓ | ✓ | 18 | Kim et al. [66] | | ✓ | | ✓ | ✓ | ✓ | 19 | Meral et al. [97] | | ✓ | ✓ | ✓ | ✓ | ✓ | 20 | Topkara et al. [98] | ✓ | | | ✓ | ✓ | ✓ |
|
|