Review Article
Recent Advancements in Intrusion Detection Systems for the Internet of Things
Table 4
Comparative analysis of IDSs implemented for MANETs.
| IDS | Implementation | Detection | Attacks | IoT |
| Albers et al. [28] | Mobile Agent | Signature | DoS | ✘ |
| Buchegger and Le Boudec [66] | Reputation | Signature | Packet Dropping | ✔ |
| Huang and Lee [67] | Hierarchical | Anomaly | Routing, DoS | ✔ |
| Kachirski and Guha [68] | Hierarchical | Anomaly | Packet Dropping | ✔ |
| Michiardi and Molva [23] | Reputation | Anomaly | Node Selfishness | ✔ |
| Patcha and Park [69] | Game Theory | Signature | DoS | ✔ |
| Puttini et al. [70] | Statistical Detection | Anomaly | Routing Disruption | ✘ |
| Rao and Kesidis [71] | Statistical Detection | Signature | Routing Disruption | ✘ |
| Shakshuki et al. [72] | Machine Learning | Signature | Routing Disruption | ✘ |
| Sterne et al. [73] | Hierarchical | Hybrid | Packet Dropping, Node Capture | ✔ |
| Sun et al. [74] | Hierarchical | Anomaly | Routing Disruption | ✘ |
| Zhang and Lee [75] | Mobile Agent | Anomaly | DoS | ✘ |
| Zhang et al. [18] | Mobile Agent | Anomaly | Routing Misdirection, Packet Dropping | ✘ |
|
|
Suited for IoT networks with some stations without energy limitations that can act as cluster heads. |