I would also recommend you to have some background knowledge about behavioral profiling approaches in general and the use of machine learning algorithms in particular to detect and classifiy such events (intrusions).
in the appendix you have a short bibliography. After reviewing these sources, you'll see where your "knowledge gaps" are.
Best regards and much success
Anatol Badach
IoT Security – Literature for an overview of research topics
Jorge Granjal, Edmundo Monteiro, Jorge Sá Silva: „Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues“, IEEE Communications Surveys & Tutorials, Vol. 17(3), Jul 2015; DOI: 10.1109/COMST.2015.2388550
M. A. Ferrag, L. A. Maglaras, H. Janicke , J. Jiang: „Authentication Protocols for Internet of Things: A Comprehensive Survey“, arXiv, Dec 2016
https://arxiv.org/abs/1612.07206
Rodrigo Roman, Javier Lopez, Masahiro Mambo: „Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges“; arXiv:1602.00484v2, Nov 2016; DOI: 10.1016/j.future.2016.11.009
https://arxiv.org/abs/1602.00484
Shancang Li, Li Da Xu, Imed Romdhani (Contributor): Securing the Internet of Things, 2017 Elsevier Inc.; ISBN: 978-0-12-804458-2
Xiruo Liu, Meiyuan Zhao, Sugang Li, Feixiong Zhang, Wade Trappe: „A Security Framework for the Internet of Things in the Future Internet Architecture“; Future Internet, Vol. 9(3), 2017; DOI: 10.3390/fi9030027
https://www.mdpi.com/1999-5903/9/3/27
B. B. Zarpelão, R. S. Miani, C. T. Kawakani and S. C. de Alvarenga: A Survey of Intrusion Detection in Internet of Things, Journal of Network and Computer Applications, Vol. 84, Apr 2017; DOI: 10.1016/j.jnca.2017.02.009
Pooja, Dr. R. K. Chauhan: Review on Security Attacks and Countermeasures in Wireless Sensor Networks, International Journal of Advanced Research in Computer Science, Vol. 8(5), May-Jun 2017
Chao Lin, et al.: „Security and Privacy for the Internet of Drones: Challenges and Solutions“; IEEE Communications Magazine, Vol. 56(1), Jan 2018; DOI: 10.1109/MCOM.2017.1700390
Francesco Restuccia, Salvatore D’Oro, Tommaso Melodia: Securing the Internet of Things in the Age of Machine Learning and Software-defined Networking, IEEE Internet of Things Journal (Early Access ), Jun 2018; DOI: 10.1109/JIOT.2018.2846040
https://arxiv.org/abs/1803.05022
Djamel Eddine Kouicem, Abdelmadjid Bouabdallah , Hicham Lakhlef: „Internet of things security: A top-down survey“; Computer Networks, Vol. 141, Aug 2018; DOI: 10.1016/j.comnet.2018.03.012
Shui Yu, Guojun Wang, Xiting Liu, Jianwei Niu: „Security and Privacy in the Age of the Smart Internet of Things: An Overview from a Networking Perspective“; IEEE Communications Magazine, Vol. 56(9), Sep 2018; DOI: 10.1109/MCOM.2018.1701204
You are working in one of the very interesting topics in security.
Security in my understanding is a domain requiring varied niche skills in prescribed minimum amount.
In that you are telling you are into IOT adding much more skill requirements.
1)Coming to security primarily systems knowledge specially in Linux/OS is a mandate.
2)There are two ways at looking at it. If you are working in systems side or application security related to IDS/IPS.
3)IOT Security is a convergent technology requiring working knowledge of Penetration Testing/Hacking, Basic Cryptography Stack and Algorithms is am must.
4)IOT Stack if you are working you need to or expected to know basics of understanding data and storing and mainly securing the same.
5)Hence as part of Data Analysis - Machine learning applications to security/IDS is to be understood since in IDS you would need to analyses logs, find the anomalies, as part of storage and end users Cloud becomes essential from point of view of IOT.
6)If you are in IOT Space even IDS like Snort could be configured in Raspberry Pi primarily an on chip computing device speaking with internet.
7)Application side required you to be skilled in Web Stack and newer Mean Stack like Node.js, Javascript/Jquery to build IOT Apps and integrate to cloud taking into account of all security aspects like you can even developed a dashboard or Web GUI with analytics and alerting mechanisms for ans IDS.
Some good blend of hardware and software skills if you have you can scale up your research work or projects.