Review Article
Recent Advancements in Intrusion Detection Systems for the Internet of Things
Table 2
IDS implementation schemes for IoT networks.
| Implementation Strategy | Energy Consumption | Processor Requirements in a Net With Powerful Nodes | Processor Requirements in a Net Without Powerful Nodes | Detection Accuracy | Implementation on Resource-constrained Nodes |
| Hierarchical | B | A | C | C | A |
| Distributed and Collaborative | D | B | B | C | C |
| Voting | A | A | A | D | A |
| Reputation | E | A | A | C | A |
| Cross Layer | F | F | F | A | D |
| Mobile Agent | E | E | E | C | F |
| Game Theory | E | E | E | B | F |
| Statistical Detection | E | B | F | B | F |
| Machine Learning | E | B | F | B | F |
|
|
The cluster head has a higher energy consumption that can be rated as E. |