Document Type : Review paper


1 Department of Computer Engineering, Sari Branch, Islamic Azad University, Sari, Iran .

2 Department of Computer Engineering, Sari Branch, Islamic Azad University, Sari, Iran.


Background and Objectives: Wireless sensor networks (WSNs) are ad-hoc technologies that have various applications in different industries such as in healthcare systems, environment and military surveillance, manufacturing, and IoT context in general. Expanding the scope of sensor network applications has led researchers to develop solutions to provide sustainable communications and networks for distributed environments, as well as how to secure these methods with limited resources.
Methods: The lack of infrastructure space and the vulnerable nature of these networks make it difficult to design security models and algorithms for them. So, to run the sensor network in safe mode, any type of attack must be detected before any security breach is materialized. According to the importance of the network and also the nature of the sensor networks along with the critical challenge of energy consumption, solutions and defensive lines such as intrusion prevention and intrusion detection systems will be selected.
Results: This paper surveys subjectively the intrusion and anomaly detection system in WSNs to determine potentials and challenges for further processing. Therefore, designing an efficient and optimal intrusion detection solution applicable to wireless sensor networks, IoT, and other ad-hoc networks has been a major challenge that will help the researcher to design or choose the best approach for their future research.
Conclusion: This research also pave the way of interested researchers to find existing challenges and shortcomings for further processing.


Main Subjects

Open Access

This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this license, visit:


Publisher’s Note

JECEI Publisher remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.



Shahid Rajaee Teacher Training University


Journal of Electrical and Computer Engineering Innovations (JECEI) welcomes letters to the editor for the post-publication discussions and corrections which allows debate post publication on its site, through the Letters to Editor. Letters pertaining to manuscript published in JECEI should be sent to the editorial office of JECEI within three months of either online publication or before printed publication, except for critiques of original research. Following points are to be considering before sending the letters (comments) to the editor.

[1] Letters that include statements of statistics, facts, research, or theories should include appropriate references, although more than three are discouraged.

[2] Letters that are personal attacks on an author rather than thoughtful criticism of the author’s ideas will not be considered for publication.

[3] Letters can be no more than 300 words in length.

[4] Letter writers should include a statement at the beginning of the letter stating that it is being submitted either for publication or not.

[5] Anonymous letters will not be considered.

[6] Letter writers must include their city and state of residence or work.

[7] Letters will be edited for clarity and length.