“…Sedjelmaci et al [92] introduce an anomaly detection approach that tries to minimize [78] Machine Learning Anomaly DoS, Hello Flood, Sybil, Sinkhole attacks Arrington et al [79] Statistical Detection Anomaly N/A Arshad et al [80] Distributed and Collaborative Anomaly Routing and application specific attacks Azmoodeh et al [81] Machine Learning Anomaly Junk code insertion attacks Cervantes et al [82] Reputation Anomaly Sinkhole Attacks Fu et al [83] Statistical Detection Anomaly Bad Data Injection, DoS Kasinathan et al [84] Distributed and Collaborative Rule DoS Khan and Herrmann [43] Reputation Rule Selective Forwarding, Sinkhole, Version Number Khan et al [85] Reputation Rule Self Promoting, Bad Mouthing, Ballot Stuffing La et al [86] Game Theory Rule N/A Li et al [87] Machine Learning Anomaly Probing, DoS Liu et al [88] Distributed and Collaborative Rule N/A Liu and Wu [89] Statistical Detection Anomaly N/A Liu et al [90] Machine Learning Anomaly N/A Raza et al [91] Distributed and Collaborative Hybrid Spoofing, Sinkhole, Selective Forwarding Sedjelmaci et al [92] Game Theory Anomaly DoS Summerville et al [93] Statistical Detection Anomaly Wormhole, Bad Data Injection, User-to-Root Xiao et al [94] Machine Learning Anomaly Identity based, Malwares, Offloading attacks Yang et al [95] Machine Learning Anomaly Packet dropping, hole attacks, eavesdropping the energy consumption. In particular, game theory is used to find out whether the signature of a new attack is expected to occur.…”