Skip to main content
. 2021 Sep 26;21(19):6432. doi: 10.3390/s21196432

Table 1.

Comparison of Intrusion Detection Systems (IDSs) properties.

Survey Area Survey
Content
Design Focused Domain Attacks ML/DL Methods Type of
Experiment
Reference
IoT Vision: IoT
application
six-layer IoT architecture IoT architecture - - [4] 2014
IDS in IoT IDS in IoT - IDS ML Statistical analysis [7] 2018
Five research questions IDS - - [8] 2019
IDS - IDS - - [9] 2018
IoT
architecture
IoT security
IoT-IDS architecture IDS - - [6] 2018
IoT Security-Based Data
Analysis
IoT security Five-layer IoT architecture IoT Security ML - [11] 2020
IoT
Architectures and Applications
IoT
architectures
IoT taxonomy Five-layer
architecture
- - - [3] 2017
IoT-Based Info of Things - IoT architecture - - - [2] 2013
IoT Architecture IoT survey taxonomy IoT architecture,
Protocols and
security Privacy
- - - [13] 2020
Attacks Attacks - RPL and 6LoWPAN in IoT - - [5] 2015
NIDS for IoT NIDS IoT threats classification Three-layer
architecture, IoT threats NIDS
ML Statistical analysis [10] 2019
ML/DL Methods for IoT Security ML/DL in IoT
IoT threats
IoTsys and threats
ML/DL taxonomy
IoT security
Six-layer IoT
architecture
ML/DL - [12] 2020