Home Mathematics Enhancing IoT network security: a literature review of intrusion detection systems and their adaptability to emerging threats
Article Open Access

Enhancing IoT network security: a literature review of intrusion detection systems and their adaptability to emerging threats

  • Bara Fteiha , Huma Zia EMAIL logo , Mai Zeyadeh , Raneem Abu Hazeem , Heba Obaidat and Rawan Ghannam
Published/Copyright: December 4, 2025
Become an author with De Gruyter Brill

Abstract

With the continuous evolution of smart environments powered by Internet of Things (IoT) networks and smart devices, there becomes a crucial need to address and ensure privacy and security. Intrusion Detection Systems (IDSs) that are specially designed for use in IoT networks play a vital role in strengthening the security posture of an IoT network and system by safeguarding and preventing attacks against smart environments. This research paper presents a comparative study of IDSs for IoT networks, with a focus on signature-based, anomaly-based, and specification-based IDS detection methods while highlighting the significance of IDSs in protecting IoT networks and smart environments, which have become recent targets for attackers due to their integration with modern and advanced technologies and their involvement with large volumes of data. The study investigates the mentioned IDS methods covering the strengths and weaknesses of each method in safeguarding smart environments and networks. This paper dives into the characteristics that make IDS decision-making more effective primarily in terms of security, considering privacy and performance. The findings of this study contribute to the hardening of IoT network security by offering recommendations for IDS selection for enhancing IoT overall security, specifically through the adoption of adaptive-based IDSs.

1 Introduction

In recent years, the widespread integration of IoT devices has assisted in substantial changes across various domains of our daily lives, encompassing domains as diverse as smart residences and industrial automation. However, the escalating intercommunication among IoT devices has amplified their vulnerability to cyber threats, underscoring the criticality of intrusion detection as a means to ensure the security and dependability of IoT networks [1]. This research paper aims to present a comprehensive examination of IDS meticulously tailored for IoT networks, emphasizing three distinct categories of IDS methodologies: signature-based, anomaly-based, and specification-based detection methods. Through an evaluation of the strengths and limitations inherent in each method, this study aims to provide valuable insights regarding their practical implementation and their potential to significantly enhance the security of IoT devices. This research carries significant importance in the domain of IoT security as it directly addresses a pressing need in the field.

This literature review’s primary objective is to investigate the effectiveness and limitations of the mentioned IDS methods in detecting and mitigating various types of IoT networks. With the exponential growth of IoT devices, the demand for robust intrusion detection systems becomes increasingly crucial [2]. By conducting a comprehensive analysis on signature-based, anomaly-based, and specification-based IDS specifically designed for IoT networks as shown in Tables (15), this study aims to provide valuable guidance to researchers, practitioners, and organizations. This comprehensive review will allow decision-makers to take proper action regarding selecting, implementing, and developing intrusion detection mechanisms that are specifically customized for IoT networks. In the realm of IoT networks, IDS assumes a pivotal role as the primary line of defense against security breaches and unauthorized access attempts [3]. However, IDS for IoT networks face unique challenges distinct from those encountered by traditional network IDS due to the heterogeneous nature of IoT devices, resource constraints within IoT environments, and the extensive scale of IoT deployments [4]. IDSs are purposefully engineered to monitor real-time network traffic, device behavior, and communication patterns, to swiftly identify any anomalous or malicious activities that may endanger the integrity of IoT networks. By promptly detecting and issuing alerts for potential intrusions, IDS for IoT networks fulfill a critical role in preventing data breaches, unauthorized device control, and potential disruptions to IoT infrastructure as shown in Figure 1. Additionally, these systems yield invaluable insights into emerging attack patterns and vulnerabilities, empowering organizations to continuously enhance their security measures and adopt proactive defense strategies to keep pace with the ever-evolving landscape of IoT security. This paper offers valuable contributions by classifying IDSs into five types, using consistent evaluation criteria, and presenting detailed comparative tables. It also highlights system-specific limitations through gap analysis and includes recent literature up to 2025, making it a timely and practical resource for IoT security research.

Figure 1: 
IDS contribution to the IoT industry.
Figure 1:

IDS contribution to the IoT industry.

2 Literature review

2.1 IoT devices

Nowadays with all the technological advancements, there is a widespread in the use of IoT devices all over the world. At the outset, the term IoT describes machines and devices that use the Internet to operate, gather, and share data. Without human-to-human or human-to-computer interaction, objects in the IoT can exchange data. Besides, the IoT devices can interact with their surroundings, relaying data to other devices or centralized servers, and enabling remote monitoring and control [5]. IoT applications range from day-to-day activities to industrial machines. Moreover, Industries may achieve greater efficiency, automation, and better decision-making by utilizing IoT capabilities. Enabling smarter functioning and greater user control improves the intelligence of our life tasks while also making them easier and simpler [6].

IoT facilitates real-time data extraction and allows users to review and retrieve how their systems are currently operating and help enterprises undergo a digital transformation [7]. The IoT is an expansion of SCADA (Supervisory Control and Data Acquisition) systems [8]. IoT systems are made up of sensors, processors, and communication hardware that enable the sharing of system data. The sensor gathers data, then either analyzes it locally or sends it to a cloud over the internet for sharing and analysis. Depending on the system’s goals, these devices can also control other devices in addition to providing data. The majority of IoT systems do not need human involvement in any of their activities, although users may still access data, modify programs, and change instructions. The three stages of the process that take place in IoT systems are data collection, data transfer, and data analysis. Sensors, antennae, or microcontrollers are just a few examples of IoT devices that are employed in the first step of this process.

The second stage resides in the IoT hub (internet cloud) where data transfer occurs, while the user interface or analytics application stage represents the last stage [7]. An example of an IoT ecosystem is RFID (Radio-Frequency Identification) tags and smart home systems [9]. The third and final stage entails analyzing the collected data and formulating reports, with the possibility of taking action if prompt interference through actuators was one of the IoT system’s features [10].

Businesses are utilizing IoT technology more frequently to enhance productivity, efficiency, and decision-making. IoT offers real-time business insights by offering information on the operation and performance levels of the company. Adopting IoT in businesses also helps them provide better customer service, save time and money, make wiser decisions, and increase profitability. Manufacturing, transportation, agriculture, and home automation are areas in which IoT is widely employed in [7]. Similar to all newly adopted technologies, the IoT has advantages and disadvantages. Looking at the benefits, IoT offers real-time data accessibility at any time or location, making systems more convenient and simple to use. Additionally, this technology offers improved communication among the system’s connected devices. Additionally, IoT system automation makes it possible to obtain services and goods of a higher caliber, which increases client satisfaction.

However, there are significant drawbacks to adopting IoT, including the fact that the likelihood of a system hack increases with the number of devices in the system. This even makes the system more complex, making it difficult to analyze data and operate additional equipment. Moreover, another concern IoT introduces is that defects and intrusions with one of the connected devices will affect the network as a whole. Additionally, using devices made by different manufacturers may make it difficult for the devices to couple and communicate with one another [7]. Furthermore, due to the potential gathering and transmission of sensitive data, security and privacy considerations are crucial and necessitate strong protections to reduce risks of intrusion.

2.2 IoT network and communication

Network and communication technologies are crucial elements of IoT systems for devices to connect and share data. The development of dependable, secure, and scalable IoT systems that can successfully gather, transmit, and analyze data for numerous applications requires a solid understanding of the IoT network and communication components. To begin with, different network technologies, such as Wi-Fi, cellular networks (3G, 4G, and 5G), Bluetooth, Zigbee, Z-Wave, LoRaWAN, and NB-IoT, can be used to link IoT devices to the internet. The choice of network technology is influenced by several variables, including deployment needs, data transmission rate, range, and power consumption. Moreover, depending on the IoT deployment, multiple communication protocols could be deployed by IoT devices to share data and fulfill the system requirements [11].

The protocols MQTT (Message Queuing Telemetry Transport), CoAP (Constrained Application Protocol), HTTP (Hypertext Transfer Protocol), and WebSocket are among the popular IoT communication protocols secured by [12]. By defining the guidelines and formats for data transfer, these protocols guarantee interoperability and effective communication between devices and IoT systems. Adding to that, IoT gateways serve as mediators between devices and the cloud, offering protocol translation and data management. IoT data can be processed, stored, and analyzed via cloud services. Furthermore, considering that IoT network security is a major threat due to the numerous linked devices and potential weaknesses. Data and equipment need to be protected from unwanted access and cyberattacks through security mechanisms like authentication, encryption, access control, and firmware updates. Moreover, these security countermeasures work together to provide a network system that allows safe connectivity and communication throughout the IoT ecosystem. IoT devices can be remotely upgraded via OTA updates without manual assistance, keeping the systems secure and functional [13].

As for the commonly known network architecture, mesh networks are frequently used in IoT applications where devices connect with one another to establish a network without depending on a centralized infrastructure. Devices in a mesh network can send and receive data, relaying it to other devices nearby. This decentralized strategy broadens the coverage area and increases reliability, yet causes the whole system to be more vulnerable [14].

Furthermore, edge computing is essential in IoT networks for boosting productivity and cutting latency. In contrast to delivering data to the cloud, edge computing includes processing and analyzing data closer to the source (at the network’s edge). Edge computing makes real-time decision-making possible while reducing the volume of data carried across the network. IoT networks must support a very large number of devices, ranging from a few to millions. Effectively managing the growing number of devices and data traffic requires scalability, this can be achieved through cloud computing where data management, processing, and analysis occur on an online platform. Regardless of the underlying technologies or protocols, interoperability makes sure that devices from different manufacturers and platforms may interact and cooperate in an effortless manner [15].

2.3 IoT architecture

In the IoT dimension, networks usually follow a three-layer architecture consisting of the perception layer, the network layer, and the application layer. While each layer serves its purpose by utilizing various technologies and features and generating a large scale of data continuously, new challenges and unique security issues are posed and introduced. In this section, we provide an overview of the Three-layer IoT architecture and associated threats in each layer [16]. Figure 2 shows the three-layer architecture.

  1. Perception Layer: The perception layer also called the physical layer, serves as the lowest layer in the IoT architecture model and is considered the main working of IoT. In this layer, data and information is collected through sensing devices. This includes the use of physical devices such as sensors, actuators RFID tags, and embedded devices that collect data from the surroundings. Edge devices are also utilized in this layer such as actuators which communicate with their surroundings. Triggers may also be used by these sensing devices such as the detection of special patterns and the identification of other smart devices in the environment [16]. Threats in this layer include:

    1. Eavesdropping: is the unauthorized real-time interception and monitoring of private communications between sensing devices or smart devices. Attackers may eavesdrop on wireless transmissions as well, where RF signals and Wi-Fi communications will be captured so the attacker can extract sensitive data to obtain insights on the IoT device functionality. Captured data by the attacker may include sensor readings, special patterns, credentials, user activities, and many other valuable data that may be of use to an attacker for more sophisticated exploits [17].

    2. Node Capture: refers to when an attacker obtains physical access and control of an IoT device which is one of the most damaging threats at the perception layer. For instance, an attacker may gain complete control of a gateway node where all communication may be leaked. When an attacker obtains control over a node, the attacker will be able to modify its functionality or configurations and tamper with data or simply disclose data that is meant to be private [17].

    3. Fake and Malicious Nodes: involves a scenario where an attacker inserts a node into the system which then generates and transmits fake data disrupting the transmission of genuine data in the network. This happens due to the consumption of valuable energy resources belonging to real nodes by the fraudulent node potentially causing network destruction [18].

  2. Network Layer: Due to the wide network infrastructure of IoT devices, there becomes a necessity for the distribution of the data collected at the perception layer which is the responsibility of the network layer. This layer binds and connects smart IoT devices enabling sensor data and facilitating communication processing between network devices, servers, and IoT devices. In this layer, network components are utilized as per requirements such as protocols, gateways, and access points [16]. The threats at this layer include:

    1. Denial of Service (DoS): this attack aims to prevent legitimate users from accessing devices or other resources and disrupting the operation of IoT networks by flooding targeted IoT devices, overwhelming network resources, and rendering them unavailable. Attackers flood resources with traffic exhausting the bandwidth and capacity of the network. In return, IoT devices become unresponsive and fail to serve real users [19].

    2. Man in the Middle (MiTM): involves attackers intercepting and altering the communication in an IoT network. The attackers work on positioning themselves between the communicating parties allowing the attacker to obtain unauthorized disclosure of data in transit and enabling him to modify the data for malicious purposes [19].

    3. Storage Attacks: data collected from the perception layer along with user-related information may be stored either on storage devices or the cloud, which may be targeted by an attacker. The attacker is then able to tamper with the user’s data. This attack compromises the confidentiality and integrity of data being stored as an attacker can access, manipulate, and extract valuable information [18].

  3. Application Layer: is the level at which the user communicates with application-specific services. This layer enables the analysis of collected data and the decision-making process to deliver IoT functionality. Users in this layer interact with provided software resources such as a mobile application user interface where the user can obtain control of IoT devices. It is easier to understand this layer in the context of smart houses [16]. This layer has several threats. Some are mentioned below:

    1. Cross-Site Scripting (XSS): involves the attacker injecting malicious codes into a trusted site which may be accessed by users or even IoT devices. When a user interacts with the infected site, the injected scripts will execute, allowing attackers to access sensitive and private data or perform malicious actions [20].

    2. Data Loss Due to Mass Data: The application layer in IoT networks deals with a large number of devices and thus deals with the storage and processing of a large volume of data from IoT devices which can cause data loss leading to severe consequences [21].

    3. Malicious Code Attacks: This refers to the presence of malicious code within the software which aims at causing harm to the system. These attacks are unfortunately not always detected by anti-virus tools. The malicious code may be inactive waiting for a trigger event or can be self-activated [18].

Figure 2: 
Three-layers IoT architecture.
Figure 2:

Three-layers IoT architecture.

2.4 IDS

Exploring IoT architecture layers and their associated threats highlights the need to emphasize IDSs and their importance. IDSs are a very important element of network security infrastructure, where they detect and address unauthorized access, normal behavior, and suspicious behavior, therefore, detecting potential security breaches. However, IDS is there to complement other security measures such as firewalls, antivirus, and encryption. On its own, the IDS will not be enough to protect the network security infrastructure. IDS acts as an extra layer of protection against cyber attacks on the network [22]. Additionally, IDS serves a crucial purpose in swiftly detecting and notifying network administrators or security personnel about potentially detrimental or questionable activities that may pose a threat to the confidentiality, integrity, or availability of network resources. By continuously analyzing network traffic and system logs, IDS possesses the ability to identify irregularities, patterns, or deviations that could indicate unauthorized endeavors to breach security, malware encroachments, or various forms of security breaches [23]. Furthermore, IDS fulfills critical roles within network security, encompassing various essential functions [24]:

  1. Detection of Threats: quickly identify possible security risks, IDS attentively and continuously monitor network traffic, system logs, and other relevant data sources.

  2. Enabling Forensic Analysis: IDS plays a key role in producing numerous logs and records of security events, which are essential for assisting post-incident investigations. These detailed records are incredibly valuable because they provide precious information that may be used to determine the root causes, extent, and effects of security breaches.

  3. Supporting Compliance and Auditing: by methodically tracking and recording security-related occurrences, IDS actively assists corporate compliance activities. IDS assists in meeting legal duties and abiding with industry-specific rules by offering thorough audit logs and reporting on security occurrences.

  4. Conducting Vulnerability Assessments: Some IDS can incorporate vulnerability scanning functions, enabling them to find flaws like gaps, improper configurations, or out-of-date software versions that may be vulnerable to exploitation by intruders [25].

IDS plays an important role in protecting IoT networks. IDS monitors and safeguards the devices, protocols, and communications inside the ecosystem since they were created expressly for IoT configurations. Lightweight and effective IDS solutions are crucial for overcoming obstacles like resource limitations and complexity imposed by various devices and protocols. IDS goes beyond threat detection in IoT networks. They swiftly notify network administrators or security teams, allowing for quick investigation and security problem remediation. By doing this, harm done to IoT devices and the network infrastructure is reduced. IDS also enforces security regulations and access controls to guarantee that only authorized parties may access the network. IDS interfaces with other security tools like firewalls, encrypting software, and device management platforms seamlessly, creating a robust and effective security architecture [26]. There are various conventional types of IDS designed for IoT devices, each employing unique methods to detect attacks. Some of these types include [26]:

  1. Signature-based IDS: In this type of IDS a database of signatures and patterns for well-known attacks is facilitated. The IDS will then compare the traffic of the network with this database, and raise an alarm when it does match to alert the security administrators.

  2. Anomaly-based IDS: In this type the network traffic will be compared to the normal behavior model that the device will conduct in several ways, raising an alarm when facing something abnormal.

  3. Specification-based IDS: also known as Rule-based IDS depends on predefined specifications, rules, and thresholds. The IDS will compare the traffic to the predefined rules and raise an alarm when it finds something that does not match the rules.

  4. Network-based IDS: examines network traffic and observes communication patterns to identify potentially malicious activities. This IDS can detect unauthorized access efforts, unusual data flows, and abnormal network behavior.

  5. Host-based IDS: operates on the system level, constantly observing and evaluating single IoT devices for activity and events occurring related to the devices. For HIDS, the user behavior, system logs, and changes in file integrity data are monitored for signs of any malicious activities.

Five types of IDS systems are going to be examined in this work: Signature, Anomaly, Specification, Hybrid, and Adaptive. The investigation will tackle devices from each classification, contrast them using concrete factors, and analyze their performance. The reason for investigating these different IDS types is to understand the strengths and vulnerabilities in protecting the IoT network.

3 Relevant systems literature

3.1 Signature-based intrusion detection method

This approach relies on the identification of malicious patterns in network activity by comparing them with attack signatures that are stored within an internal database. The way the approach works is by triggering an alert when an attack signature matches a signature in the database. This technique provides the ability to rapidly identify known attacks and provide effective detection and prevention of attack exploitation. While this approach effectively functions in identifying known attacks, it may pose many challenges in IoT networks due to the constant discoveries and new exploits in IoT where it becomes hardly feasible to detect new attacks whose signatures are not yet stored in the internal database used for intrusion detection. In addition, different variants of attacks stored in the database may also remain undetected using this approach [27]. Moreover, this method is deemed to be inefficient when it comes to zero-day vulnerabilities, considering that a zero-day threat will not be part of the predefined signatures in the system database. Additionally, signature-based IDSs in IoT networks demand high costs due to limited resources such as memory required to store attack signatures in the internal database, computational resources and processing ability required for the algorithms that are utilized for checking signatures and detecting intrusions, and energy constraints [27], [28]. Thus, to develop a robust signature-based IDS for IoT networks, careful consideration of the device resource limitations must be present.

  1. Approaches utilizing Signature-based IDS

    1. Dynamic coding mechanism for signature-based IDS in IP-USN

A research conducted by Amin et al. [29] showcased a dynamic coding mechanism for distributed signature-based IDS in IP-based Ubiquitous Sensor Networks (IP-USN). The proposed approach involves sending signatures of varying lengths to relative bloom filters where the output of a bloom filter consists of a bit array containing signature codes. As incoming packets are received and processed, the patterns stored in bloom filters shown in Figure 3 will be used to check if the packets are malicious based. The sensor node will then halt any packet being processed and trigger an alarm when a match is found, and the corresponding signature code is then sent to the sink for verification.

Figure 3: 
Generation of signature-code for the signatures with same length.
Figure 3:

Generation of signature-code for the signatures with same length.

The proposed approach was then assessed using a widely recognized IDS for IP networks called Snort Signatureset. With 13,339 signature strings available in Snort version 2.8 and the limited program availability in IP-USN, the collection of signatures provided by Snort can be considered the upper limit for the number of signatures in IP-USN. With a false positive rate of 0.024, this method utilizes only 13 KB of storage devoted to Snort Signatureset, while traditional methods usually require 252 KB. This method achieved an employment of 13,339 signatures with no collisions, low false alarms, high detection accuracy, low memory and energy consumption rates, and a lightweight design. Nonetheless, this IDS implementation does not regulate unnecessary real-time network transactions and usually produces limitations due to memory consumption for attack signature storage and difficulty in detecting a diverse range of attacks as predefined attack signatures are a prerequisite [30].

  1. DEMO IDS framework

This study evaluates the DEMO IDS framework designed for use in IoT networks that utilize 6LoWPAN technology. The goal of this framework is to detect Denial-of-Service (DoS) attacks which when implemented, disrupt communication in 6LoWPAN networks. The experimental setup for this study included IDS probes, a PenTest system, and various software components. The general architecture is presented in Figure 4. The probes will be used to capture network packets and forward them to the IDS for analysis. To capture and send packets, the probes will utilize a virtual interface and the Scapy packet manipulation program. The PenTest system in this approach is used for the simulation of attacks and to test the proposed framework’s effectiveness by employing Scapy probes for attack initiation where the flooding would occur to implement a DoS attack on 6LoWPAN nodes. For the detection of attacks, the framework makes use of Suricata which is an IDS engine crafted for traditional networks. Due to its lack of adaptation to the 6LoWPAN protocol, it was necessary to implement additional decoders to allow incoming packet inspection where specific rules were added for the detection of attacks including DoS attacks that involve flooding [31].

Figure 4: 
DoS protection architecture.
Figure 4:

DoS protection architecture.

The IDS was also integrated with Prelude which is an event monitoring system that enhanced the IDS’s capabilities by minimizing false positives. The experiment included forwarding alerts to Prelude from attacks detected by Suricata. The alerts were presented to the end-user using the web interface for Prelude named Prewikka demonstrated in Figure 5. The results of the experiment validate the effectiveness and stability of the proposed IDS framework by demonstrating the correct detection of flooding attacks and triggering alerts accordingly [31].

  1. Lightweight Signature-Based IDS

Figure 5: 
Alerts displayed in Prewikka [31].
Figure 5:

Alerts displayed in Prewikka [31].

Sheikh et al. propose a lightweight signature-based IDS for IoT environments using a sequence inspired by DNA patterns. The system was designed to convert labeled data into signatures that mimic nucleotides and match them to traffic patterns based on relative frequency. The IDS was tested on 10,000 samples and produced only 9 false positives, demonstrating high accuracy and efficiency. Its four-layer architecture currently only supports offline detection on resource-constrained devices, and is yet to be deployed in real-time [32].

  1. Signature-Based IDS in Wireless 6G IoT Networks

Farooq et al. suggested a system that used a structured database of known harmful patterns, including hash-based, string-matching, and AI-enhanced approaches, to present a signature-based intrusion detection method for 6G IoT networks. The system guarantees reliable and efficient threat identification by including detection methods such as hybrid models, trie-based structures, and Bloom filters. For low-power, resource-constrained situations, it facilitates safe, incremental signature updates and real-time alarm production. On benchmark datasets, the system achieves 98.9 % accuracy, showing that it is highly successful at identifying known threats with minimal false positives. It provides a scalable and reliable solution for safeguarding next-generation wireless networks, and its lightweight design allows for real-time deployment in 6G-enabled IoT scenarios [33]. A summary of the reviewed signature-based intrusion detection is illustrated in Table 1.

Table 1:

Summarized comparison of signature-based IDS approaches.

IDS techniques Signature-based IDS DEMO IDS Lightweight signature-based IDS Signature-based IDS in 6G IoT networks
Main idea Pattern matching using bloom filters and signature codes. Detects flooding attacks using Suricata and GUI monitoring. Uses DNA-inspired signatures for real-time detection. Combines hash, string, AI-based methods with trie and Bloom filters for 6G IoT.
Advantages Accurate, low false positives, lightweight, low resource use. Real-time GUI, reduced false positives, flexible rule-based detection. High accuracy (9 false positives in 10,000), scalable, efficient. 98.9 % accuracy, real-time alarms, scalable, lightweight.
Disadvantages Not real-time, limited to known attacks, possible congestion. Limited against unknown attacks, privacy not addressed. No zero-day detection, depends on labeled data. Cannot detect unknown threats, needs updated signatures, privacy not discussed.

3.2 Anomaly-based intrusion detection method

The anomaly-based intrusion detection method is used to recognize any doubtful or untrusted activities that may occur in the system or even in the network. To elaborate, this security technique functions by considering the normal behaviors as a reference point and then it constantly observes for any abnormal behaviors in comparison to the initially created reference point. If any detection of abnormal actions occurs, an alert will be sent to the managers to inform them that there is something abnormal, such as having unfamiliar network traffic or illegal access, to perform the required corrective actions. This detection technique is unique in its effectiveness in identifying new, anonymous attacks. Furthermore, this security technique uses a variety of parameters to be investigated to be able to recognize anomalies. These metrics include the traffic of the network, the behaviors of users, and the usage of the resource. Besides, careful tuning is necessary to decrease false positives by precisely setting the reference point (normal behavior). This gives the method an advantage of being potentially able to detect zero-day vulnerabilities. However, this potential security advantage is highly affected by false positives [34]. To resolve the weaknesses of this method, hybrid methods are proposed where anomaly-based intrusion detection is combined with signature-based detection.

  1. Sagacious IDS in Sensor Network

Ahmed et al.’s creative project created an ML-based intrusion IDS for wireless sensor networks (WSNs) with the goal of detecting the four main DoS attack types which are TDMA, Flooding, Blackhole, and Grayhole. The study assesses the effectiveness of five classification algorithms, including KNN, Naïve Bayes, Logistic Regression, SVM, and ANN, using a large dataset created via the LEACH methodology. After testing the models in binary and multiclass classification situations, ANN and KNN proved to be the most successful, with accuracy rates of 98 % and 97 %, respectively. The study demonstrates that ANN and KNN are resilient to varying dataset sizes and uses SMOTE to solve the issue of class imbalance [35].

  1. Anomaly-based IDS for IoT Application

In order to detect abnormalities in IoT settings, Bhavsar et al. introduced PCC-CNN, a lightweight and effective intrusion detection system that combines convolutional neural networks (CNN) with feature selection based on Pearson Correlation Coefficient. The authors utilized NSL-KDD, CICIDS2017, and IOTID20 benchmark datasets to evaluate the model’s binary and multiclass classification capabilities. The study contrasted PCC-CNN’s performance with that of conventional ML models, such as SVM, LDA, KNN, CART, and logistic regression. The findings demonstrate that PCC-CNN outperformed the majority of conventional models, especially in binary classification, with a constant high accuracy of 99.89 % and minimal false alarm rates. In order to show that the PCC-CNN technique is reliable and appropriate for real-time IoT security applications, the study also discusses issues including class imbalance, feature redundancy, and overfitting. However, authors noted that multiclass classification remains more complex due to imbalanced datasets and increased computational demands [36].

  1. Anomaly-based DL IDS

A study by Sharma et al. addressed class imbalance by presenting a deep learning-based IDS for IoT networks. This system uses a Deep Neural Network (DNN) in conjunction with a filter-based feature selection strategy to identify various attack types using the UNSW-NB15 dataset. The authors increased accuracy from 84 % to 91 % by creating synthetic examples for minority groups using Generative Adversarial Networks (GANs). The model maintains high performance while reducing complexity and training time by eliminating strongly correlated elements. Because of this, the system ensures high performance for real-time detection in IoT situations with limited resources [37]. A summary of the reviewed anomaly-based intrusion detection is illustrated in Table 2.

Table 2:

Summarized comparison of anomaly-based IDS approaches.

IDS Techniques Sagacious IDS PCC-CNN IDS Anomaly-based DL IDS
Main idea ML-based detection of DoS attacks using classifiers (ANN, KNN). CNN with PCC-based feature selection for lightweight anomaly detection. DNN with GAN-enhanced training for IoT intrusion detection.
Advantages 98 % accuracy, handles class imbalance, resilient to dataset size, detects zero-day attacks. 99.89 % accuracy, low false alarms, outperforms traditional models, detects zero-day attacks. 91 % with GANs, reduced complexity, real-time capable, detects zero-day attacks.
Disadvantages Needs large labeled data, tuning-dependent, computationally intensive. Multiclass complexity, higher training cost. Possible noise from GANs, resource-intensive training.

3.3 Specification-based IDS

To further comprehend the operation, the paper explains the working mechanism of specifications-based IDSs. Particularly, the process starts with the security department stating certain rules that the IDS would use to recognize any possible intrusion. These rules cover the range of protocols, types of encryption, types of packets, and number of packet fragments among others. The intention for such rules is to set a limit of behavior that the IDS would not learn and would allow it to determine all other activities that are outside the learning scope. If the IDS recognizes any activity that is not in line with the ordinary or set scheme, it generates an indicator suggesting that something unusual has happened. This indicator is then sent to the systems administrator for further action.

Further, the rules may also specify details addressing issues of system load, together with the capture of DoS attacks including all other attacks. In any of these situations, the IDS is set to trend and perform the loading of the relevant side, and the loads are set within an expectation range. If the load of the system exceeds that expectation range, then it is a signal that a DoS attack is being undertaken. In response to this situation, the IDS undertakes two actions; it alerts the administrator and takes steps to thwart or prevent the attack [26]. Additionally, the Specification-based IDS is a type of customizable type of IDS whereby the organization is allowed to have its own rules around its system. Thus, it uses certain rules or guidelines set for the multiclass networks to identify possible attacks on it. Nevertheless, the creation of precise and effective specifications acceptable for specification-based IDSs is strictly dependent on the degree of knowledge possessed by the network administrator. It is very important to get the specifications right. Otherwise, security may be compromised because of over or under threat detection, which leads to false positives or false negatives, respectively [30]. Specification-based IDSs do have the ability to detect zero-day vulnerabilities, but the extent of this ability is extensively dependent on the network administrator’s experience and the sophistication of the zero-day threat.

  1. Specification-Based IDS for RPL Network

A research paper by Le et al. [38] introduced a specification-based IDS for identifying topological assaults in RPL-based networks. It presents an Extended Finite State Machine (EFSM) that represents valid RPL behavior through the analysis of simulation traces using a semi-automated profiling approach. Through node activity monitoring in a cluster-based intrusion detection system, the generated specification is utilized to identify protocol rule breaches. According to simulation findings, the system’s scalability in extensive IoT contexts is supported by its high detection accuracy, low false positive rate of 6.3 %, and minimal overhead. The approach does have major drawbacks, though identifying some attacks such as Local Repair and DIS, takes longer monitoring periods to collect enough evidence, and false positive rates rise over time as compromised nodes affect their neighbors. The system is presently only able to detect topology-based assaults, not performance-related threats, and faces challenges with data reporting synchronization, which might result in misclassification.

  1. Specification-based Automotive IDS using CAN.

Olufowobi et al. presented a specification-based IDS tailored for modern automotive in-vehicle networks. SAIDuCANT utilizes real-time schedulability analysis to model expected Controller Area Network (CAN) message timings and detect anomalies that indicate intrusions, such as message injection or spoofing attacks. The system infers message timing parameters, including periods, jitters, and response times from normal CAN traffic without prior knowledge, forming a behavioral specification against which runtime activity is compared. Experimental evaluation was conducted using both real CAN logs from passenger vehicles and an open-source dataset comprising various attack scenarios. The results demonstrate that SAIDuCANT achieves a high accuracy of approximately 99 % on normal and synthetic data, low Time To Detection (TTD) often between 0 and 10 ms, and minimal False Positives Before Attack (FPBA), typically 0–1, which underscores its suitability for real-time applications. Additionally, F1 scores consistently exceeded 0.88 in attack scenarios, outperforming traditional interval and frequency-based IDS methods. These results highlight SAIDuCANT’s strong balance of detection performance and efficiency, suggesting it could be employed in a service-oriented architecture as shown in Figure 6. However, the system currently struggles with handling aperiodic messages and multiple-period messages under a single ID [39].

  1. SH-IDS

Figure 6: 
Service oriented architecture for IoT.
Figure 6:

Service oriented architecture for IoT.

Babu et al. introduced a Specification Heuristics-Based IDS called SH-IDS, which is designed to operate in constrained IoT environments. The novelty of this system in comparison to conventional IDSs lies in employing a light distributed approach. This approach is based on specification heuristics obtained through n-gram patterns in a network’s transaction record, which allows local detection at the device level. The system was evaluated through UNSW-NB15 dataset and showed superiority against TLA-IDS with an accuracy rate of 91.77 %. Despite the innovative approach used by SH-IDS, the system has not yet fully leveraged the potential of n-gram attributes, which will be utilized in future research [40]. A summary of the reviewed specification-based intrusion detection is illustrated in Table 3.

Table 3:

Summarized comparison of specification-based IDS techniques.

IDS techniques Spec.-based IDS for RPL Spec.-based IDS for CAN SH-IDS
Main idea Detects RPL attacks using EFSM derived from normal behavior traces. Detects CAN anomalies by modeling message timing without prior specs. Uses n-gram heuristics for local anomaly detection.
Advantages High accuracy, low false positives (6.3 %), scalable, low overhead. 99 % accuracy, fast detection (0–10 ms), minimal false alerts. Lightweight, localized, 91.77 % detection rate.
Disadvantages Slower for some attacks, rising false positives, limited to topology threats. Struggles with aperiodic/multi-period messages. Limited scalability data, depends on heuristics.

3.4 Hybrid IDS

The recent research endeavors attempted to eliminate some of the limitations introduced by conventional IDS methods by proposing a hybrid IDS approach. Depending on the context and application, this approach often combines two or more neural network models, while it could also combine two or more IDS detection methods in the form of layers. For instance, an IDS could be designed with a layer of signature-based IDS and a layer of anomaly-based IDS. This approach is better equipped with zero-day attack detection than a signature-only IDS, this is due to anomaly-based IDS being part of the Hybrid system.

  1. Anomaly/Signature-Based IDS

In order to enhance network security, Shaikh and Gupta suggested an enhanced IDS that blends anomaly-based and signature-based detection. The system employed DL using ResNet50 for anomaly detection, which achieves 97.25 % accuracy, and Decision Tree methods for signature detection, which achieve 96.96 % accuracy. By combining the outcomes of the two approaches, the hybrid model successfully identified both known and unknown assaults, achieving a final detection accuracy of 98.98 %. Real-world network breaches may be detected with more precision and efficiency thanks to this integrated technique [41].

  1. Hybrid IDS for IoT

Smys et al. presented a hybrid IDS for IoT networks that combines CNN and Long Short-Term Memory (LSTM) models. This approach enhances detection accuracy by efficiently extracting features and learning temporal patterns in network data. Experimental validation using the UNSW NB15 dataset showed that the proposed system demonstrates a higher accuracy of 98.6 %, faster detection time, and a lower misclassification rate in comparison to conventional RNN models [42]. A similar approach with extensive testing was employed by Altunay et al., testing showed that the system achieved a 92.9 % accuracy for multi-class classification on the UNSW-NB15 dataset and 99.8 % on the more complex X-IIoTID dataset [43]. Both proposed systems face a limitation due to their reliance on a single dataset that is not synthetic enough to provide data verifying its employability in real-world.

  1. Hybrid IDS for IoT Layers

In contrast to many models that only concentrate on one layer, an increasing interest is being focused on methods to identify assaults on all three layers of the IoT architecture. Khan et al. suggested a hybrid DL-based IDS for IoT networks that blends Gated Recurrent Units (GRU) with Recurrent Neural Networks (RNN). The system was trained and assessed using the ToN-IoT dataset, which contains detailed data for every layer of the IoT architecture. The experimental findings showed high performance, with 98 % accuracy on application layer datasets and 99 % accuracy on network traffic datasets. In multilayer IoT systems, results demonstrate how well the hybrid RNN-GRU model can recognize a variety of attacks. Despite the success of this system, it is still highly dependent on the ToN-IoT dataset, which does not include a comprehensive landscape of real-world attacks [44]. A summary of the reviewed Hybrid-based intrusion detection is shown in Table 4.

Table 4:

Summarized comparison of hybrid IDS approaches.

IDS techniques Anomaly/signature-based IDS Hybrid IDS for IoT Hybrid IDS for IoT layers
Main idea Combines ResNet50 and Decision Tree for anomaly and signature detection. Uses CNN and LSTM to extract spatial and temporal features. Uses GRU-RNN to detect attacks across IoT layers.
Advantages Detects known and unknown attacks; 98.98 % accuracy. 98.6 % accuracy on UNSW-NB15; 99.8 % on X-IIoTID. 98 % accuracy (application layer); 99 % (network layer).
Disadvantages High complexity; potential overhead. Requires high-quality data; resource-intensive. Integration challenges; limited by resources.

3.5 Adaptive IDS

The latest scope of research concentrates on a more dynamic IDS method, often referred to as Adaptive IDS. Adaptive IDSs are designed with the main building block of DL that allows the system to learn and adjust itself to the threats being faced by the IoT network, regardless of the attack’s degree of familiarity. This makes Adaptive IDSs a suitable candidate for IoT networks, considering their dynamic and heterogeneous nature. Real-time learning and reactivity to emerging threats make adaptive IDSs the most effective options for identifying zero-day vulnerabilities. Hybrid IDSs enhance static systems, but adaptive IDSs go one step further by altering their parameters to reflect the dynamic threat environment.

  1. Adaptive IDS for IoT Networks

Aravamudhan et al. used Fast R–CNN with Gradient Boost Regression (GBR) to provide an adaptive intrusion detection model designed for IoT scenarios. The authors use Principal Component Analysis (PCA) and Singular Value Decomposition (SVD) to improve detection accuracy and decrease data dimensionality. Adaptability in changing network settings, sluggish detection speed, and false positives are some of the major issues this combo tackles. The NIDS V.10 2017 dataset is used to train and assess the model, which achieved a high accuracy of 99.5 %. The precision, recall, and F1-score are all stated to be 98.75 %. These results show that the suggested technique is successful in reliably identifying both binary classifications (normal/abnormal) and multiclass intrusions, such as DoS, DDoS, R2L, U2R, and Probe in IoT networks, outperforming various existing IDS models by a wide margin. Although the system performs as desired on imbalanced datasets, the system still lacks rigorous real-time testing. [45].

  1. Adaptive IDS for IoT Smart Home

Sallay presented a brand-new, device-aware IDS architecture that uses edge computing and software-defined networking (SDN) to achieve low-latency detection. Based on the traffic characteristics of classified IoT devices, the system dynamically assigns optimum machine learning models (ML), including several Extreme Learning Machine (ELM) versions. Both detection accuracy and system responsiveness are improved by this customized model selection. With the lowest latency of 1.44 s and excellent accuracy, precision, recall, and F1 scores of 99 %, Regularized ELM distinguished itself from the other benchmarked models and proved its applicability in real-time, resource-constrained settings. Benchmarking against the extensive CICIoT2023 dataset validated the architecture’s efficacy, but the system is yet to be demonstrated in real-time homes on a large scale while preserving minimal processing cost [46].

  1. Adaptive IDS Autoencoder-FNN for IoT

Shirley implemented a novel adaptive IDS model that combines a Feedforward Neural Network (FNN) for classification with an Autoencoder (AE) for unsupervised feature extraction. This dual-stage architecture, known as AE-FNN, combines DL’s ability to recognize intricate patterns with effective classification to overcome the shortcomings of conventional signature-based and standalone anomaly-based systems. The authors point out that earlier methods, such as ensemble models and CNN-LSTM hybrids, sometimes lacked scalability or real-time application, particularly on edge devices. Their methodology is notable for addressing class imbalance, a common problem in IDS datasets, by employing a two-stage data balancing technique that uses SMOTE and random under-sampling. The CICIoT2023 dataset shows exceptional results in empirical evaluation, with 99.55 % binary classification accuracy and 90.91 % multiclass classification accuracy. In terms of accuracy, recall, and ROC-AUC metrics, these findings far outperform many current methods, but the system is limited by overfitting on imbalanced datasets and the lack of interpretability typical of complex neural networks [47]. A summary of the reviewed adaptive-based intrusion detection can be viewed in Table 5.

Table 5:

Summarized comparison of adaptive IDS techniques.

IDS Techniques Adaptive IDS for IoT Networks Adaptive IDS for Smart Home Autoencoder-FNN IDS
Main idea Fast R–CNN + GBR with PCA/SVD for adaptive detection. Edge/SDN-based model assignment using ELM variants. Autoencoder for feature extraction + FNN for classification.
Advantages 99.5 % accuracy; detects binary and multiclass attacks. 99 % accuracy; low latency (1.44s); scalable. 99.55 % binary, 90.91 % multiclass accuracy; handles imbalance.
Disadvantages Slower detection; complex architecture. Needs accurate profiling; overhead from model management. Higher complexity; DL resource demands.

4 Findings and discussion

4.1 Dynamic coding mechanism for signature-based IDS in IP-USN

  1. Advantages

    1. Utilization of bloom filters and signature codes allows effective and accurate detection of attacks by pattern matching in incoming packets.

    2. Low rate of false positives, high detection accuracy, low memory and energy consumption, and lightweight design.

    3. Utilization of Snort Signature set provides a robust foundation for assessing effectiveness.

  2. Disadvantages

    1. Not implemented in real-time, limiting timely detection and triggering of alarms.

    2. May lead to increased network congestion and resource consumption (Res Cons) due to unnecessary transmissions.

    3. Limited to detection of predefined attack signatures only.

  3. Characterization

    1. Functionality: Strengthens IP-USN security through a distributed IDS using signature-based detection; reduces the likelihood of successful intrusions.

    2. Privacy: Privacy concerns are not directly addressed.

    3. Performance: Low false alarm rate, high detection accuracy, efficient memory and energy usage. Not real-time; unnecessary transmissions may impact performance.

4.2 DEMO IDS framework

  1. Advantages

    1. Effective in detecting flooding attacks and triggering alerts.

    2. Integration with Prelude enhances capabilities and reduces false positives.

    3. Use of rules and decoders allows detection of various attacks through packet inspection.

    4. Real-time monitoring and visualization via GUI.

  2. Disadvantages

    1. Suricata engine is not designed for 6LoWPAN and requires additional decoders.

    2. Signature-based detection has limitations in detecting unknown attacks or variants.

    3. Does not address zero-day attacks in IoT networks.

  3. Characterization

    1. Functionality: Detects known attacks, especially DoS flooding, but is limited against variants and unknown attacks.

    2. Privacy: Does not address privacy protection in IoT networks.

    3. Performance: Demonstrates stability and scalability; performance may vary with traffic volume and complexity.

4.3 Lightweight signature-based IDS

  1. Advantages

    1. Converts labeled data into DNA-inspired signatures for effective pattern matching.

    2. Achieved high accuracy with only 9 false positives in 10,000 samples.

    3. Four-layer architecture supports real-time detection on resource-constrained devices.

    4. Improved scalability and performance compared to traditional misuse detection systems.

  2. Disadvantages

    1. Relies on labeled data for generating signatures.

    2. Cannot accommodate zero-day or previously unseen attacks.

  3. Characterization

    1. Functionality: Detects known attack patterns efficiently using DNA-inspired signature encoding.

    2. Privacy: Privacy concerns are addressed to an extent.

    3. Performance: High accuracy, real-time capability, and minimal false positives; suitable for low-resource IoT environments.

4.4 Signature-based IDS in wireless 6G IoT networks

  1. Advantages

    1. Utilizes a structured database with hash-based, string-matching, and AI-enhanced approaches.

    2. Integrates hybrid models, trie-based structures, and Bloom filters for efficient threat detection.

    3. Enables real-time alarms and safe, incremental signature updates for low-power environments.

    4. Achieves 98.9 % accuracy with minimal false positives on benchmark datasets.

    5. Lightweight and scalable, suitable for real-time deployment in 6G-enabled IoT networks.

  2. Disadvantages

    1. Limited to known threats; unable to detect zero-day attacks.

    2. Requires frequent signature updates to maintain effectiveness.

  3. Characterization

    1. Functionality: Combines traditional and AI-enhanced methods for accurate, real-time detection of known attacks.

    2. Privacy: Not explicitly discussed.

    3. Performance: Delivers high accuracy, low false positives, and efficient operation on constrained devices.

4.5 Sagacious IDS in sensor network

  1. Advantages

    1. Detects multiple DoS attacks (TDMA, Flooding, Blackhole, Grayhole) using ML.

    2. ANN and KNN achieve high accuracy (98 % and 97 % respectively).

    3. Resilient to varying dataset sizes.

    4. Uses SMOTE to address class imbalance.

    5. Capable of detecting zero-day attacks due to anomaly-based nature.

  2. Disadvantages

    1. Requires large and labeled datasets for effective training.

    2. May involve higher computational cost.

    3. Effectiveness depends on algorithm tuning and feature selection.

  3. Characterization

    1. Functionality: ML-based anomaly detection targeting multiple DoS attacks in WSNs with high model accuracy; detects unknown threats.

    2. Privacy: Privacy concerns are addressed as part of secure anomaly monitoring.

    3. Performance: High detection rates with ANN and KNN; robust across dataset variations; computationally intensive.

4.6 Anomaly-based IDS for IoT applications

  1. Advantages

    1. Combines CNN with PCC for lightweight anomaly detection.

    2. Evaluated on NSL-KDD, CICIDS2017, and IOTID20 datasets.

    3. Achieves high accuracy (99.89 %) in binary classification with minimal false alarms.

    4. Outperforms conventional ML models.

    5. Addresses class imbalance, feature redundancy, and overfitting.

    6. Suitable for real-time IoT security applications.

    7. Capable of detecting zero-day attacks through anomaly-based design.

  2. Disadvantages

    1. Multiclass classification is more complex due to imbalanced datasets.

    2. Higher computational demands for deep learning model training.

  3. Characterization

    1. Functionality: Efficient anomaly-based detection using deep learning with high accuracy; capable of identifying unknown threats.

    2. Privacy: Not explicitly discussed, but enhanced through proactive anomaly detection.

    3. Performance: High accuracy and low false alarms in binary classification; more resource-intensive for multiclass scenarios.

4.7 Anomaly-based DL IDS

  1. Advantages

    1. Uses a DNN with filter-based feature selection for IoT intrusion detection.

    2. Employs the UNSW-NB15 dataset for evaluation.

    3. Applies GANs to generate synthetic samples, improving accuracy from 84 % to 91 %.

    4. Reduces complexity and training time by removing strongly correlated features.

    5. Suitable for real-time detection in resource-constrained IoT environments.

    6. Capable of detecting zero-day attacks due to anomaly-based architecture.

  2. Disadvantages

    1. Requires synthetic data generation, which may introduce noise or instability.

    2. Deep learning models may still demand notable computational resources.

  3. Characterization

    1. Functionality: Detects diverse attacks using deep learning, enhanced by GAN-based class balancing.

    2. Privacy: Indirectly supported through robust anomaly detection mechanisms.

    3. Performance: Improved accuracy (91 %), optimized for real-time and low-resource environments; potential overhead from training.

4.8 Specification-based IDS for RPL topology attacks

  1. Advantages

    1. Uses EFSM to model valid RPL behavior from simulation traces.

    2. Achieves high detection accuracy with only 6.3 % overhead.

    3. Works well in large IoT networks using a cluster-based design.

  2. Disadvantages

    1. Needs longer monitoring to detect some attacks like Local Repair and DIS.

    2. False positives increase over time as neighbors are affected.

    3. Cannot detect performance-related attacks.

    4. Synchronization issues may cause misclassification.

  3. Characterization

    1. Privacy: Focuses on behavior monitoring; privacy not addressed.

    2. Security: Detects rule violations using protocol-specific rules.

    3. Performance: Low overhead and high accuracy, but slower for some threats.

4.9 Specification-based IDS SAIDuCANT

  1. Advantages

    1. High detection accuracy exceeding 99 % on normal CAN traffic.

    2. Fast response with TTD between 0 and 10 ms.

    3. Very low false positives before attacks (FPBA of 0 or 1).

    4. Strong performance with F1 scores above 0.88.

  2. Disadvantages

    1. Limited detection of aperiodic and mixed-period messages.

    2. Requires retraining after ECU or software updates.

    3. Accuracy depends on precise timing parameter estimation.

  3. Characterization

    1. Privacy: Not directly addressed.

    2. Security: Effectively detects spoofing and injection attacks.

    3. Performance: High accuracy, low latency, and minimal false positives.

4.10 SH-IDS

  1. Advantages

    1. Designed for constrained IoT environments with a lightweight distributed approach.

    2. Uses specification heuristics via n-gram patterns for local device-level detection.

    3. Outperformed TLA-IDS with an accuracy of 91.77 % on the UNSW-NB15 dataset.

  2. Disadvantages

    1. Limited information on scalability across large-scale IoT networks.

    2. Detection may depend on the accuracy of n-gram-based heuristic specification.

  3. Characterization

    1. Privacy: Not explicitly discussed.

    2. Security: Enables localized detection using specification-based heuristics; focuses on lightweight secure monitoring at the device level.

    3. Performance: Demonstrates solid accuracy with reduced overhead, evaluated using the UNSW-NB15 dataset.

4.11 Anomaly/Signature-based IDS

  1. Advantages

    1. Combines anomaly-based and signature-based detection for improved coverage.

    2. Uses ResNet50 for anomaly detection with 97.25 % accuracy.

    3. Uses Decision Tree for signature detection with 96.96 % accuracy.

    4. Combined model achieves 98.98 % detection accuracy.

    5. Capable of identifying both known and unknown attacks.

  2. Disadvantages

    1. Increased model complexity due to hybrid integration.

    2. Potential computational overhead in real-time scenarios.

  3. Characterization

    1. Functionality: Enhances detection precision by integrating anomaly and signature methods.

    2. Privacy: Not explicitly addressed.

    3. Performance: High accuracy (98.98 %); suitable for detecting real-world network breaches.

4.12 Hybrid IDS for IoT

  1. Advantages

    1. Combines CNN and LSTM to extract spatial and temporal features.

    2. Achieves 98.6 % accuracy on UNSW-NB15 dataset.

    3. Faster detection time and lower misclassification compared to conventional RNNs.

    4. Altunay et al.’s model achieves 92.9 % on UNSW-NB15 and 99.8 % on X-IIoTID dataset.

  2. Disadvantages

    1. Performance depends on the quality and volume of training data.

    2. DL models may require significant computational resources.

  3. Characterization

    1. Functionality: Learns complex patterns in IoT traffic using deep learning.

    2. Privacy: Not directly discussed.

    3. Performance: High detection accuracy and reduced misclassification; validated on multiple datasets.

4.13 Hybrid IDS for IoT layers

  1. Advantages

    1. Targets all three IoT layers (perception, network, application).

    2. Uses hybrid GRU-RNN model trained on ToN-IoT dataset.

    3. Achieves 98 % accuracy on application layer and 99 % on network traffic data.

    4. Effectively detects a variety of intrusion types in multilayer systems.

  2. Disadvantages

    1. May face integration challenges across heterogeneous IoT layers.

    2. Resource constraints can affect real-time deployment.

  3. Characterization

    1. Functionality: Detects attacks across multiple IoT layers using GRU-RNN.

    2. Privacy: Not explicitly addressed.

    3. Performance: High layer-specific accuracy; adaptable for complex IoT architectures.

4.14 Adaptive IDS for IoT Networks

  1. Advantages

    1. Uses Fast R–CNN with GBR for adaptive detection.

    2. Applies PCA and SVD for dimensionality reduction and improved accuracy.

    3. Achieves 99.5 % accuracy; precision, recall, and F1-score at 98.75 %.

    4. Effective for both binary and multiclass intrusion detection.

    5. Detects attacks such as DoS, DDoS, R2L, U2R, and Probe.

  2. Disadvantages

    1. Slow detection speed and false positives remain challenges.

    2. Complexity may limit real-time scalability in constrained environments.

  3. Characterization

    1. Functionality: Adaptive DL IDS trained on NIDS V.10 2017; detects a wide range of intrusions.

    2. Privacy: Not explicitly addressed.

    3. Performance: High detection accuracy and balanced classification performance.

4.15 Adaptive IDS for IoT smart home

  1. Advantages

    1. Device-aware architecture using edge computing and SDN.

    2. Dynamically assigns optimal ML models based on device traffic.

    3. Regularized ELM achieves 99 % accuracy, precision, recall, and F1-score.

    4. Lowest latency at 1.44 s.

    5. Validated on CICIoT2023 dataset; scalable and efficient.

  2. Disadvantages

    1. Model complexity may introduce management overhead.

    2. Reliant on accurate device profiling and traffic classification.

  3. Characterization

    1. Functionality: Dynamic model selection enables real-time detection in smart homes.

    2. Privacy: lacks results through scalable testing.

    3. Performance: Low latency, high accuracy, and scalability in resource-limited settings.

4.16 Adaptive IDS Autoencoder-FNN for IoT

  1. Advantages

    1. Combines Autoencoder for feature extraction and FNN for classification.

    2. Handles class imbalance with SMOTE and random under-sampling.

    3. 99.55 % binary and 90.91 % multiclass accuracy on CICIoT2023 dataset.

    4. Suitable for resource-constrained environments.

    5. Outperforms many existing models in accuracy, recall, and ROC-AUC.

  2. Disadvantages

    1. Dual-stage architecture increases system complexity.

    2. Real-time performance may be affected by deep learning resource demands.

  3. Characterization

    1. Functionality: Two-stage adaptive model for high-performance intrusion detection.

    2. Privacy: Not explicitly discussed.

    3. Performance: High classification metrics; designed for practical IoT deployment.

4.17 A comparison of IDS techniques in the IoT environment

Various IDS solutions have been presented in the area of IoT security to handle the particular problems introduced by IoT environments. Table 6 compares the relevant literature discussed in the previous sections. Main metrics such as detection accuracy, false positive rate, resource consumption, real-time capabilities, scalability, adaptability, and resilience are used to assess these systems.

Table 6:

Comparison of IDS techniques.

Approach Det. Acc FP Rate Resource Real-time Scalable Flexible Robust
Dynamic coding mechanism × × × ×
DEMO IDS framework × × × ×
Lightweight signature-based IDS × × × ×
Signature-based IDS in wireless 6G × ×
Sagacious IDS in sensor network × × ×
Anomaly-based IDS for IoT application ×
Anomaly-based DL IDS × ×
Spec.-based IDS for RPL × × × ×
Spec.-based IDS for CAN × × ×
Specification heuristics-based IDS (SH-IDS) × × × × ×
Anomaly/Signature-Based IDS × × ×
Hybrid IDS for IoT × ×
Hybrid IDS for IoT layers × ×
Adaptive IDS for IoT networks × ×
Adaptive IDS for smart home ×
Adaptive IDS Autoencoder-FNN × ×

The comparison emphasizes the advantages and disadvantages of each strategy, assisting stakeholders in making educated decisions about the implementation of IDS in IoT systems. Given the dynamic nature of IoT environments and applications, it is evident that there is not a single IDS variant that offers a universal optimal solution. The choice of the optimal IDS relevant to the IoT application depends on the type of application, available resources, and threat profile. Considering that, the empirical results do not explicitly claim one approach is more optimal than the other, while adaptive-based IDS do not have the highest accuracy, they possess the ability to learn and enhance over time. Additionally, it is important to note that zero-day threats can be mitigated through applying hybrid IDS and adaptive methods only, rather than individual methods. It is also evident that the confidentiality and privacy of collected data are not addressed in most systems, which is a crucial aspect of assessing a system’s employability.

Based on this analysis, it is clear that, by striking a balance between detection accuracy and resilience to zero-day threats, hybrid and adaptive IDS provide the most reliable security in dynamic IoT environments. IDSs based on specifications and signatures are lightweight and efficient against known threats, but they are not flexible. Without careful calibration, anomaly-based IDSs run the danger of producing a large number of false positives. By combining techniques, hybrid approaches get over individual limits, while adaptive IDS improve performance even more through self-learning. However, data availability and computing limitations must be taken into account while deploying Hybrid and adaptive IDS. Context-driven, scalable, and in line with the resource profile and threat environment of the intended IoT system are therefore necessary for an effective IDS deployment.

5 Conclusions

The research explores different intrusion detection methods, including signature-based, anomaly-based, specification-based, hybrid-based, and adaptive-based. Signature-based detection compares network activity with predefined attack signatures but faces challenges in IoT networks due to new attacks and limited resources. Anomaly-based detection identifies abnormal behaviors but requires tuning to minimize false positives. Specification-based detection uses predefined rules, requiring expertise and proper configuration. Hybrid-based detection utilizes a combination of conventional IDSs to eliminate common limitations, but the approach is still not dynamic enough to accommodate IoT networks. Lastly, adaptive-based detection, which is suggested as the savior to IoT networks, due to its high learning capabilities, dynamic nature, and zero-day threat detection capabilities. The research discusses specific approaches within each method. Each method has strengths and limitations, these trade-offs shall be carefully evaluated to identify the optimal IDS based on context. Due to its superiority and dynamic nature, future research should focus on advanced and adaptive systems to address evolving threats in IoT networks. Several real-world obstacles exist to the adoption of adaptive IDS systems, including privacy, limited processing capacity of IoT nodes, diverse environments, and a scarcity of training datasets. These challenges can be eliminated by prioritizing collaborative threat intelligence sharing frameworks, edge computing integration, and lightweight models.


Corresponding author: Huma Zia, College of Engineering, Abu Dhabi University, 59911, Abu Dhabi, 1790, United Arab Emirates, E-mail: 

Funding source: Abu Dhabi University - Office of Research and Sponsored Programs

Award Identifier / Grant number: NA

  1. Funding Information: This work was supported by Abu Dhabi University’s Office of Research and Sponsored Programs, Abu Dhabi University, Abu Dhabi, United Arab Emirates.

  2. Author contributions: Conceptualization, M.Z., R.A., H.O., and R.G.; methodology, B.F. and R.G.; formal analysis, M.Z. and H.O.; investigation, R.A. and H.O.; writing – original draft preparation, B.F.; writing – review and editing, B.F. and H.Z.; visualization, B.F.; supervision, H.Z.; project administration, H.Z.; funding acquisition, H.Z.

  3. Conflict of interest: The authors state that there is no Conflict of Interest to declare.

  4. Ethical approval: The conducted Research is not related to either human or animal use.

  5. Data availability statement: Data sharing does not apply to this article as no datasets were generated or analyzed during the current study.

References

[1] U. Tariq, I. Ahmed, A. K. Bashir, and K. Shaukat, “A critical cybersecurity analysis and future research directions for the internet of things: A comprehensive review,” Sensors, vol. 23, no. 8, p. 4117, 2023, https://doi.org/10.3390/s23084117.Search in Google Scholar PubMed PubMed Central

[2] B. Kaur, S. Dadkhah, F. Shoeleh, E. C. P. Neto, P. Xiong, S. Iqbal, P. Lamontagne, S. Ray, and A. A. Ghorbani, “Internet of things (iot) security dataset evolution: Challenges and future directions,” Internet Things, vol. 22, p. 100780, 2023, https://doi.org/10.1016/j.iot.2023.100780.Search in Google Scholar

[3] M. Pradhan, C. K. Nayak, and S. K. Pradhan, “Intrusion detection system (ids) and their types,” in Network Security Attacks and Countermeasures, Pennsylvania, IGI Global, 2016, pp. 228–244.10.4018/978-1-4666-8761-5.ch009Search in Google Scholar

[4] M. Noaman, S. Khan, M. Faisal Abrar, S. Ali, A. Alvi, and M. A. Saleem, “Challenges in integration of heterogeneous internet of things,” Sci. Program., vol. 2022, no. 1, pp. 1–14, 2022. https://doi.org/10.1155/2022/8626882.Search in Google Scholar

[5] R. R. Madakam and S. Tripathi, “Internet of things (iot): A literature review.” J. Comput. Commun., vol. 3, no. 1, pp. 164–173, 2015.10.4236/jcc.2015.35021Search in Google Scholar

[6] S. Balaji, K. Nathani, and R. Santhakumar, “Iot technology, applications and challenges: A contemporary survey,” Wirel. Pers. Commun., vol. 108, no. 1, pp. 363–388, 2019, https://doi.org/10.1007/s11277-019-06407-w.Search in Google Scholar

[7] A. A. Laghari, H. Li, A. A. Khan, Y. Shoulin, S. Karim, and M. A. K. Khani, “Internet of Things (IoT) applications security trends and challenges,” Discover Internet of Things, vol. 4, no. 1, pp. 1–36, 2024. https://doi.org/10.1007/s43926-024-00090-5.Search in Google Scholar

[8] R. Hunzinger, “Scada fundamentals and applications in the iot,” in Internet of Things and Data Analytics Handbook, New Jersey, John Wiley & Sons, Ltd, 2017, pp. 283–293.10.1002/9781119173601.ch17Search in Google Scholar

[9] R. Mouha, “Internet of things (iot),” J. Data Anal. Inf. Process., vol. 9, pp. 77–101, 2021.10.4236/jdaip.2021.92006Search in Google Scholar

[10] R. Krishnamurthi, A. Kumar, D. Gopinathan, A. Nayyar, and B. Qureshi, “An overview of iot sensor data processing, fusion, and analysis techniques,” Sensors, vol. 20, no. 21, p. 6076, 2020, https://doi.org/10.3390/s20216076.Search in Google Scholar PubMed PubMed Central

[11] S. Al-Sarawi, M. Anbar, K. Alieyan, and M. Alzubaidi, “Internet of things (iot) communication protocols,” in 2017 8th International conference on information technology (ICIT), Amman, IEEE, 2017, pp. 685–690.10.1109/ICITECH.2017.8079928Search in Google Scholar

[12] D. Rani and N. S. Gill, “Review of various iot standards and communication protocols,” Int. J. Eng. Res. Technol., vol. 12, no. 5, pp. 647–657, 2019.Search in Google Scholar

[13] S. El Jaouhari and E. Bouvet, “Secure firmware over-the-air updates for iot: Survey, challenges, and discussions,” Internet of Things, vol. 18, p. 100508, 2022, https://doi.org/10.1016/j.iot.2022.100508.Search in Google Scholar

[14] A. Cilfone, L. Davoli, L. Belli, and G. Ferrari, “Wireless mesh networking: An iot-oriented perspective survey on relevant technologies,” Future Internet, vol. 11, no. 4, p. 99, 2019, https://doi.org/10.3390/fi11040099.Search in Google Scholar

[15] K. S. Mohamed, “Iot networking and communication layer,” in The Era of internet of things: towards a smart world, vol. 131, Cham, Springer, 2019, pp. 49–70.10.1007/978-3-030-18133-8_3Search in Google Scholar

[16] M. A. and S. T., “Internet of things: Architecture, security issues and countermeasures,” Int. J. Comput. Appl., vol. 125, no. 14, pp. 1–4, 2015. https://doi.org/10.5120/ijca2015906251.Search in Google Scholar

[17] H. A. Khattak, M. A. Shah, S. Khan, I. Ali, and M. Imran, “Perception layer security in internet of things,” Future Gener. Comp. Syst., vol. 100, pp. 144–164, 2019, https://doi.org/10.1016/j.future.2019.04.038.Search in Google Scholar

[18] M. Burhan, R. A. Rehman, B. Khan, and B.-S. Kim, “Iot elements, layered architectures and security issues: A comprehensive survey,” Sensors, vol. 18, no. 9, p. 2796, 2018, https://doi.org/10.3390/s18092796.Search in Google Scholar PubMed PubMed Central

[19] P. Varga, S. Plosz, G. Soos, and C. Hegedus, “Security threats and issues in automation iot,” in 2017 IEEE 13th International Workshop on Factory Communication Systems (WFCS), Trondheim, IEEE, 2017, pp. 1–6.10.1109/WFCS.2017.7991968Search in Google Scholar

[20] B. B. Gupta and P. Chaudhary, Cross-Site Scripting Attacks: Classification, Attack, and Countermeasures, Boca Raton, CRC Press, 2020.10.1201/9780429351327Search in Google Scholar

[21] S. N. Swamy, D. Jadhav, and N. Kulkarni, “Security threats in the application layer in iot applications,” in 2017 International Conference on i-SMAC (Iot in Social, Mobile, Analytics and Cloud)(i-SMAC), Palladam, IEEE, 2017, pp. 477–480.10.1109/I-SMAC.2017.8058395Search in Google Scholar

[22] A. Mahendiran, R. Appusamy, and K. S, “Intrusion detection and prevention system: Technologies and challenges,” Int. J. App. Eng. Res., vol. 10, no. 87, pp. 1–12, 2015.Search in Google Scholar

[23] R. Ganeshan, C. sekhar kolli, C. M. kumar, and T. Daniya, “A systematic review on anomaly based intrusion detection system,” IOP Conf. Ser.: Mater. Sci. Eng., vol. 981, no. 2, p. 022010, 2020, https://doi.org/10.1088/1757-899x/981/2/022010.Search in Google Scholar

[24] A. Khraisat, I. Gondal, P. Vamplew, and J. Kamruzzaman, “Survey of intrusion detection systems: Techniques, datasets and challenges,” Cybersecurity, vol. 2, no. 1, pp. 1–22, 2019, https://doi.org/10.1186/s42400-019-0038-7.Search in Google Scholar

[25] A. S. Ashoor and S. Gore, “Importance of intrusion detection system (ids),” Int. J. Sci. Eng. Res., vol. 2, no. 1, pp. 1–4, 2011.Search in Google Scholar

[26] M. F. Elrawy, A. I. Awad, and H. F. Hamed, “Intrusion detection systems for iot-based smart environments: A survey,” J. Cloud Comp., vol. 7, no. 1, pp. 1–20, 2018, https://doi.org/10.1186/s13677-018-0123-6.Search in Google Scholar

[27] A. Tabassum, A. Erbad, and M. Guizani, “A survey on Recent Approaches in Intrusion Detection system in Iots,” in 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC), Tangier, Morocco, IEEE, 2019, pp. 1190–1197. https://doi.org/10.1109/IWCMC.2019.8766455.Search in Google Scholar

[28] E. Gyamfi and A. Jurcut, “Intrusion detection in internet of things systems: A review on design approaches leveraging multi-access edge computing, machine learning, and datasets,” Sensors, vol. 22, no. 10, p. 3744, 2022, https://doi.org/10.3390/s22103744.Search in Google Scholar PubMed PubMed Central

[29] S. O. Amin, M. S. Siddiqui, C. S. Hong, and J. Choe, “A novel coding scheme to implement signature based ids in ip based sensor networks,” in 2009 IFIP/IEEE International Symposium on Integrated Network Management-Workshops, New York, IEEE, 2009, pp. 269–274.10.1109/INMW.2009.5195973Search in Google Scholar

[30] S. Hajiheidari, K. Wakil, M. Badri, and N. J. Navimipour, “Intrusion detection systems in the internet of things: A comprehensive investigation,” Computer Networks, vol. 160, pp. 165–191, 2019, https://doi.org/10.1016/j.comnet.2019.05.014.Search in Google Scholar

[31] P. Kasinathan, G. Costamagna, H. Khaleel, C. Pastrone, and M. A. Spirito, “An ids framework for internet of things empowered by 6lowpan,” in Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, New York, Association for Computing Machinery, 2013, pp. 1337–1340.10.1145/2508859.2512494Search in Google Scholar

[32] N. U. Sheikh, H. Rahman, S. Vikram, and H. AlQahtani, “A lightweight signature-based ids for iot environment,” arXiv preprint arXiv:1811.04582, 2018.Search in Google Scholar

[33] M. Farooq and M. H. Khan, “Signature-based intrusion detection system in wireless 6g iot networks,” J. Internet Things, vol. 4, no. 3, pp. 155–168, 2022, https://doi.org/10.32604/jiot.2022.039271.Search in Google Scholar

[34] V. Jyothsna and K. M. Prasad, “Anomaly-based intrusion detection system,” Comp. Netw. Sec., vol. 10, 2019. https://doi.org/10.5772/intechopen.82287.Search in Google Scholar

[35] S. Ashraf and T. Ahmed, “Sagacious intrusion detection strategy in sensor network,” in 2020 International Conference on UK-China Emerging Technologies (UCET), Glasgow, IEEE, 2020, pp. 1–4.10.1109/UCET51115.2020.9205412Search in Google Scholar

[36] M. Bhavsar, K. Roy, J. Kelly, and O. Olusola, “Anomaly-based intrusion detection system for iot application,” Discover Internet of things, vol. 3, no. 1, p. 5, 2023, https://doi.org/10.1007/s43926-023-00034-5.Search in Google Scholar

[37] B. Sharma, L. Sharma, C. Lal, and S. Roy, “Anomaly based network intrusion detection for iot attacks using deep learning technique,” Comp. Elect. Eng., vol. 107, p. 108626, 2023, https://doi.org/10.1016/j.compeleceng.2023.108626.Search in Google Scholar

[38] A. Le, J. Loo, K. K. Chai, and M. Aiash, “A specification-based ids for detecting attacks on rpl-based network topology,” Information, vol. 7, no. 2, p. 25, 2016, https://doi.org/10.3390/info7020025.Search in Google Scholar

[39] H. Olufowobi, C. Young, J. Zambreno, and G. Bloom, “Saiducant: Specification-based automotive intrusion detection using controller area network (can) timing,” IEEE Trans. Veh. Technol., vol. 69, no. 2, pp. 1484–1494, 2019, https://doi.org/10.1109/tvt.2019.2961344.Search in Google Scholar

[40] M. J. Babu and A. R. Reddy, “Sh-ids: Specification heuristics based intrusion detection system for iot networks,” Wirel. Pers. Commun., vol. 112, no. 3, pp. 2023–2045, 2020, https://doi.org/10.1007/s11277-020-07137-0.Search in Google Scholar

[41] A. Shaikh and P. Gupta, “Advanced signature-based intrusion detection system,” in Intelligent Communication Technologies and Virtual Mobile Networks: Proceedings of ICICV 2022, Singapore, Springer, 2022, pp. 305–321.10.1007/978-981-19-1844-5_24Search in Google Scholar

[42] S. Smys et al.., “Hybrid intrusion detection system for internet of things (iot),” J. ISMAC, vol. 2, no. 04, pp. 190–199, 2020, https://doi.org/10.36548/jismac.2020.4.002.Search in Google Scholar

[43] H. C. Altunay and Z. Albayrak, “A hybrid cnn+ lstm-based intrusion detection system for industrial iot networks,” Eng. Sci. Technol. Int. J., vol. 38, p. 101322, 2023, https://doi.org/10.1016/j.jestch.2022.101322.Search in Google Scholar

[44] N. W. Khan et al.., “A hybrid deep learning-based intrusion detection system for iot networks,” Math. Biosci. Eng., vol. 20, no. 8, pp. 13 491–13 520, 2023, https://doi.org/10.3934/mbe.2023602.Search in Google Scholar PubMed

[45] P. Aravamudhan, “A novel adaptive network intrusion detection system for internet of things,” PLoS One, vol. 18, no. 4, p. e0283725, 2023, https://doi.org/10.1371/journal.pone.0283725.Search in Google Scholar PubMed PubMed Central

[46] H. Sallay, “Designing an adaptive effective intrusion detection system for smart home iot,” Int. J. Adv. Comp. Sci. Appl. (IJACSA), vol. 15, no. 1, 2024, https://doi.org/10.14569/ijacsa.2024.0150194.Search in Google Scholar

[47] J. J. Shirley and M. Priya, “An adaptive intrusion detection system for evolving iot threats: An autoencoder-fnn fusion,” IEEE Access, vol. 13, pp. 4201–4217, 2025, https://doi.org/10.1109/access.2024.3525074.Search in Google Scholar

Received: 2025-02-05
Accepted: 2025-07-12
Published Online: 2025-12-04

© 2025 the author(s), published by De Gruyter, Berlin/Boston

This work is licensed under the Creative Commons Attribution 4.0 International License.

Articles in the same Issue

  1. Review Article
  2. Enhancing IoT network security: a literature review of intrusion detection systems and their adaptability to emerging threats
  3. Research Articles
  4. Intelligent data collection algorithm research for WSNs
  5. A novel behavioral health care dataset creation from multiple drug review datasets and drugs prescription using EDA
  6. Speech emotion recognition using long-term average spectrum
  7. PLASMA-Privacy-Preserved Lightweight and Secure Multi-level Authentication scheme for IoMT-based smart healthcare
  8. Basketball action recognition by fusing video recognition techniques with an SSD target detection algorithm
  9. Evaluating impact of different factors on electric vehicle charging demand
  10. An in-depth exploration of supervised and semi-supervised learning on face recognition
  11. The reform of the teaching mode of aesthetic education for university students based on digital media technology
  12. QCI-WSC: Estimation and prediction of QoS confidence interval for web service composition based on Bootstrap
  13. Line segment using displacement prior
  14. 3D reconstruction study of motion blur non-coded targets based on the iterative relaxation method
  15. Overcoming the cold-start challenge in recommender systems: A novel two-stage framework
  16. Optimization of multi-objective recognition based on video tracking technology
  17. An ADMM-based heuristic algorithm for optimization problems over nonconvex second-order cone
  18. A multiscale and dual-loss network for pulmonary nodule classification
  19. Artificial intelligence enabled microgrid power generation prediction
  20. Special Issue on AI based Techniques in Wireless Sensor Networks
  21. Blended teaching design of UMU interactive learning platform for cultivating students’ cultural literacy
  22. Special Issue on Informatics 2024
  23. Analysis of different IDS-based machine learning models for secure data transmission in IoT networks
  24. Using artificial intelligence tools for level of service classifications within the smart city concept
  25. Applying metaheuristic methods for staffing in railway depots
  26. Interacting with vector databases by means of domain-specific language
  27. Data analysis for efficient dynamic IoT task scheduling in a simulated edge cloud environment
  28. Analysis of the resilience of open source smart home platforms to DDoS attacks
  29. Comparison of various in-order iterator implementations in C++
Downloaded on 25.2.2026 from https://www.degruyterbrill.com/document/doi/10.1515/comp-2025-0046/html
Scroll to top button