Table 1 Summary of existing studies.

From: AI-driven intrusion detection and lightweight authentication framework for secure and efficient medical sensor networks

Ref.

Components of security framework

AI-based intrusion detection

TM

ECC

TC

TF

TP

TA

TU

RE

RTP

Technique / Algorithm used

Key findings

Strengths

Weaknesses

13

x

x

x

x

x

x

CNN-IDS with static rule-based trust

Improved anomaly detection; 91% Acc

Effective IDS; low FP

No adaptive trust; higher latency

29

x

x

x

x

LSTM + Bayesian TMS

Dynamic trust updates; 92% Acc

Resilient to insider threats

Moderate CPU use; complex update cycle

30

x

x

x

x

x

Hybrid RNN-TMS model

Better recall in dynamic nodes

Fast adaptation to new threats

No ECC support; high energy use

14

x

x

x

x

x

Blockchain + Reputation Trust

Secure trust ledger; 90% Acc

Tamper-Proof; decentralized

High Computation; latency overhead

31

x

x

x

x

CNN-IDS + ECC auth

93% Acc; low overhead

Low-cost crypto integration

No trust management module

15

x

x

x

x

ECC + TMS integration

94% Acc; high reliability

Balanced efficiency

Lacks IDS adaptability

32

x

x

x

x

x

Autoencoder anomaly detection

Detects zero-day attacks

High sensitivity

High false positives

33

x

x

x

x

CNN + ECC framework

92% Acc; secure channel

Lightweight; fast auth

Limited scalability

34

x

x

x

x

x

x

Reputation-based trust model

Dynamic reputation updates

Low computation cost

No IDS/ECC support

35

x

x

x

Federated DL IDS

94% Acc; privacy preserved

Scalable; data-local

Communication overhead