We provide a taxonomy of the existing approaches for BSW protocols.
Security and performance requirements are identified.
Comparative analysis of BSW protocols in terms of security and performance requirements.
Identified future trends and open issues in the BSW protocols.