| IDS | Implementation | Detection | Attacks | IoT |
| Abraham et al. [27] | Statistical Detection | Signature | DoS, Unauthorized Access | ✘ |
| Abraham et al. [32] | Statistical Detection | Signature | Probing, Unauthorized Access | ✘ |
| Agah et al. [50] | Game Theory | Signature | N/A | ✘ |
| Agah and Das [51] | Game Theory | Signature | DoS, Selective Forwarding | ✘ |
| Bao et al. [30] | Reputation | Signature | Jamming, Sybil, DoS, Sinkhole | ✔ |
| Boubiche and Bilami [26] | Cross Layer | Signature | Sinkhole, Spoofing, Battery Exhaustion | ✔ |
| Chen et al. [44] | Hierarchical | Signature | Spoofing, Sinkhole | ✔ |
| Da Silva et al. [35] | Distributed and Collaborative | Signature | Repetition, Packet Delay, Wormhole, Packet, Alteration, Blackhole, Selective Forwarding | ✔ |
| Deng et al. [52] | Machine Learning | Anomaly | Blackhole | ✘ |
| Doumit and Agrawal [53] | Statistical Detection | Anomaly | N/A | ✔ |
| Eik Loo et al. [37] | Hierarchical | Anomaly | Periodic Route Error, Sinkhole | ✔ |
| Guerroumi et al. [54] | Hierarchical | Signature | Sinkhole | ✔ |
| Ioannis et al. [55] | Distributed and Collaborative | Signature | Selective Forwarding, Blackhole | ✔ |
| Jadidoleslamy [56] | Hierarchical | Signature | N/A | ✔ |
| Khan and Loo [57] | Cross Layer | Signature | Hello Flooding | ✔ |
| Krontiris et al. [58] | Distributed and Collaborative | Signature | Selective Forwarding | ✔ |
| Maleh et al. [36] | Machine Learning | Hybrid | Blackhole, Wormhole, Hello Flooding, Selective Forwarding | ✔ |
| Mamun and Kabir [59] | Hierarchical | Hybrid | N/A | ✔ |
| Ngai et al. [60] | Statistical Detection | Anomaly | Sinkhole | ✔ |
| Onat and Miri [61] | Statistical Detection | Anomaly | Hello Flooding | ✔ |
| Onat and Miri [25] | Statistical Detection | Signature | Resource Depletion | ✘ |
| Rajasegarar et al. [62] | Hierarchical | Anomaly | N/A | ✔ |
| Sedjelmaci and Feham [63] | Machine Learning | Hybrid | Routing Disruption | ✔ |
| Shamshirband et al. [29] | Game Theory | Anomaly | Distributed DoS | ✔ |
| Shin et al. [40] | Hierarchical | Signature | Selective Forwarding | ✔ |
| Strikos [64] | Hierarchical | Signature | DoS, Routing Disruption | ✔ |
| Wang et al. [65] | Reputation | Signature | Selective Forwarding | ✔ |
|
|