“…In a similar effort, most of the IDS strategies employed efficient feature selection and optimization techniques to bolster the accuracy of the IDS models. Such feature engineering approaches include HHO and SCA [72], ECSO [83], Deep GB-RBM [26], SMO [31], RSL [30], IG [27,96], FS and BE [27], HOA [31], RF and XGBoost [54], F-PSO [92] and SEA and AE [34]. Equally, to enhance the security and preserve-privacy of IoT data, different techniques have been utilized, such as cryptocurrency and blockchain [30,44,49,52,69,78,84,94,99], cryptography-MGO and DHPEA [78], PUFs(ECDSA) [94], homomorphic encryption [51], routing/two-fish symmetry key [85], authentication [68], access control [36], DP [51,52,82].…”