vulnerable to various routing attacks due to their dynamic infrastructure, distinct computing
resources, and heterogeneity of mobile objects. The sinkhole and selective forwarding
attacks stand out among the most destructive ones for infrastructureless networks. Despite
the countermeasures introduced by legacy intrusion detection systems (IDS), the massive
IoT seeks novel solutions to address their unique requirements. This paper introduces De T …