Table 5 Comparison of Cryptographic Schemes and Their Suitability for Real-Time AD-MLA Deployment on Jetson TX2.

From: Sustainable cyber-physical VANETs with AI-driven anomaly detection and energy-efficient multi-criteria routing using machine learning algorithms

Cryptographic scheme

Security level

Avg. Encryption + Verification Time (Jetson TX2)

Memory usage (MB)

Power usage (W)

Implementation complexity

Suitability for real-time AD-MLA

AES-256 + SHA-256 (Used in AD-MLA)

128–256-bit security

15–20 ms/transaction

≈ 10–20 MB

5–6 W

Low

Excellent

Elliptic Curve Cryptography (ECC-256)

128-bit equivalent

45–65 ms/transaction

30–50 MB

7–8 W

Medium

Good

Lattice-based PQC (e.g., NTRU, Kyber)

256-bit post-quantum

90–130 ms/transaction

60–80 MB

8–9 W

High

Fair

Homomorphic Encryption (Paillier / BFV)

 > 256-bit semantic

 > 300 ms/transaction

150–300 MB

 > 10 W

Very High

Poor