“…To ensure that these requirements are met, security and privacy issues can be done through secret keys in a dynamic process for each reading, which is destroyed when the users log off the systems [49] and remain active only while using the system, which ensures a greater sense of security for users. Other ways to provide security and privacy to users of the ECM system are the introduction of firewalls without compromising performance or increasing latency between layers [22,59,98] to maintain the computational capacity of control and security systems even with encrypted data [49,91,121], a constant cost reduction, and optimization of data encryption algorithms [22,76,78,122,123] to provide an efficient user authentication system [17] that makes it possible to identify illegal activities [13] to detect data mix or leak and virtual attacks [8,9,16,31,67,75,124,125] while still maintaining system integrity and security status [33,58].…”