“…They are mainly concentrated on the security of the three primary assets; HIoT, IdM, and BC. Furthermore, they can be classified based on the standard type (functional or technical), where functional standards are mainly a description of the basics in technical standards [ 97 ], such as [ 56 ], which is a standard that describes the basics of the authentication mechanisms in [ 57 ]. It is found from the literature that there are IoT, medical, and IdM system standards and regulations available, which are proposed by international organizations, such as NIST and ISO, in [ 30 , 34 , 35 , 36 , 38 , 44 , 47 , 48 , 49 , 50 , 52 , 55 , 56 , 57 ]; however, when it comes to BC, there is a lack of national and international BC regulations and standards [ 98 ].…”