“…The focus of this paper is on anomaly detection schemes. Recently, different types of anomaly detection schemes based on traffic prediction [ 15 ], statistical method [ 16 ], data mining [ 17 ], game theory [ 18 , 19 , 20 ], immune theory [ 21 ], or trust management [ 22 , 23 , 24 , 25 , 26 , 27 , 28 , 29 , 30 , 31 , 32 , 33 , 34 , 35 , 36 , 37 ], etc., have been proposed.…”