Review Article

Recent Advancements in Intrusion Detection Systems for the Internet of Things

Table 4

Comparative analysis of IDSs implemented for MANETs.

IDS Implementation Detection Attacks IoT

Albers et al. [28] Mobile Agent Signature DoS

Buchegger and Le Boudec [66] Reputation Signature Packet Dropping

Huang and Lee [67] Hierarchical Anomaly Routing, DoS

Kachirski and Guha [68] Hierarchical Anomaly Packet Dropping

Michiardi and Molva [23] Reputation Anomaly Node Selfishness

Patcha and Park [69] Game Theory Signature DoS

Puttini et al. [70] Statistical Detection Anomaly Routing Disruption

Rao and Kesidis [71] Statistical Detection Signature Routing Disruption

Shakshuki et al. [72] Machine Learning Signature Routing Disruption

Sterne et al. [73] Hierarchical Hybrid Packet Dropping, Node Capture

Sun et al. [74] Hierarchical Anomaly Routing Disruption

Zhang and Lee [75] Mobile Agent Anomaly DoS

Zhang et al. [18] Mobile Agent Anomaly Routing Misdirection, Packet Dropping

Suited for IoT networks with some stations without energy limitations that can act as cluster heads.