Review Article

Recent Advancements in Intrusion Detection Systems for the Internet of Things

Table 5

Comparative analysis of IDSs implemented for CPSs.

IDS Implementation Detection Attacks IoT

Mitchell and Chen [39] Voting Signature Spoofing, Bad Data Injection

Porras and Neumann [76] Statistical Detection Hybrid N/A

Shin et al. [40] Hierarchical Hybrid Eavesdropping, DoS, Routing Misdirection

Tsang and Kwong [33] Machine Learning Anomaly DoS, Remote-to-Local, User-to-Root, Probing

Suited for IoT networks with some stations without energy limitations that can act as cluster heads.