Review Article
Recent Advancements in Intrusion Detection Systems for the Internet of Things
Table 5
Comparative analysis of IDSs implemented for CPSs.
| IDS | Implementation | Detection | Attacks | IoT |
| Mitchell and Chen [39] | Voting | Signature | Spoofing, Bad Data Injection | ✔ |
| Porras and Neumann [76] | Statistical Detection | Hybrid | N/A | ✘ |
| Shin et al. [40] | Hierarchical | Hybrid | Eavesdropping, DoS, Routing Misdirection | ✔ |
| Tsang and Kwong [33] | Machine Learning | Anomaly | DoS, Remote-to-Local, User-to-Root, Probing | ✔ |
|
|
Suited for IoT networks with some stations without energy limitations that can act as cluster heads. |