Table 7.
Comparative analysis of AI-SET versus Existing methods.
| Feature / metric | Cloud-based IDS | Centralized FL | Edge IDS | FL for privacy preservation | Context-aware access control in fog/edge | Blockchain with edge AI | AI-SET (Proposed) |
|---|---|---|---|---|---|---|---|
| Anomaly detection accuracy (%) | 88.4 | 89.7 | 90.8 | 90.2 | 89.5 | 91.1 | 94.3 |
| Privacy preservation | ✖ | Partial | ✖ | local FL | Partial (context-aware) | blockchain-based | with DP + HE |
| Model convergence (Rounds) | 50 + | 40 | 35 | 35 | N/A | 33 | 28 |
| Unauthorized access blocked (%) | N/A | N/A | 68 | N/A | 72 | 78 | 87 |
| Latency (ms) | > 500 | > 400 | 200 | 190 | 230 | 160 | < 150 |
| Bandwidth usage (MB) | 800 | 700 | 640 | 590 | 620 | 580 | 560 |
| Trust-based access control | ✖ | ✖ | ✖ | ✖ | Static policy | ✖ | Dynamic + ML |