“…There is still some weakness in the existing approaches such as security resilience, connection probability and scalability. [131], MAPE [126], Linear SVM [128], IoT Malware Detection [127], ELSA [130], Hybrid Spyware Detection [129], BLOWFISH, PRESENT, HEIGHT, AES, 3DES, RSA, ECC, DSA, DH [233], [40], K-Anonymity Technique [135], BUDDIES [136], LSR [146], Lightweight RSS-Based Scheme [148], Privacy-Preserving Scheme [147], Game Theory [152], [153], [234], CHA-IDS [140], TCGA [145], INTI [143], Sensor Scheduling Technique [120], Mobile Agent-Based IDS [150], Determeministic Detection [156], Jammer Localization, Detection and Mitigation [157]- [159], [182], [189], [190] and Tamper Detection [160].…”