{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,5]],"date-time":"2026-05-05T13:35:20Z","timestamp":1777988120926,"version":"3.51.4"},"reference-count":185,"publisher":"MDPI AG","issue":"8","license":[{"start":{"date-parts":[[2025,8,8]],"date-time":"2025-08-08T00:00:00Z","timestamp":1754611200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers"],"abstract":"<jats:p>The rapid expansion of the Metaverse presents complex security challenges, particularly in verifying virtual objects and avatars within immersive environments. Conventional authentication methods, such as passwords and biometrics, often prove inadequate in these dynamic environments, especially as essential infrastructures, such as smart grids, integrate with virtual platforms. Cybersecurity threats intensify as advanced attacks introduce fraudulent data, compromising system reliability and safety. Using the Electric Network Frequency (ENF), a naturally varying signal emitted from power grids, provides an innovative environmental fingerprint to authenticate digital twins and Metaverse entities in the smart grid. This paper provides a comprehensive survey of the ENF as an environmental fingerprint for enhancing Metaverse security, reviewing its characteristics, sensing methods, limitations, and applications in threat modeling and the CIA triad (Confidentiality, Integrity, and Availability), and presents a real-world case study to demonstrate its effectiveness in practical settings. By capturing the ENF as having a unique signature that is timestamped, this method strengthens security by directly correlating physical grid behavior and virtual interactions, effectively combating threats such as deepfake manipulations. Building upon recent developments in signal processing, this strategy reinforces the integrity of digital environments, delivering robust protection against evolving cyber\u2013physical risks and facilitating secure, scalable virtual infrastructures.<\/jats:p>","DOI":"10.3390\/computers14080321","type":"journal-article","created":{"date-parts":[[2025,8,8]],"date-time":"2025-08-08T09:56:42Z","timestamp":1754647002000},"page":"321","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Electric Network Frequency as Environmental Fingerprint for Metaverse Security: A Comprehensive Survey"],"prefix":"10.3390","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-9124-5633","authenticated-orcid":false,"given":"Mohsen","family":"Hatami","sequence":"first","affiliation":[{"name":"Department of Electrical and Computer Engineering, Binghamton University, Binghamton, NY 13902, USA"}]},{"given":"Lhamo","family":"Dorje","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Binghamton University, Binghamton, NY 13902, USA"}]},{"given":"Xiaohua","family":"Li","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Binghamton University, Binghamton, NY 13902, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1880-0586","authenticated-orcid":false,"given":"Yu","family":"Chen","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Binghamton University, Binghamton, NY 13902, USA"}]}],"member":"1968","published-online":{"date-parts":[[2025,8,8]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Hatami, M., Qu, Q., Chen, Y., Kholidy, H., Blasch, E., and Ardiles-Cruz, E. (2024). A Survey of the Real-Time Metaverse: Challenges and Opportunities. Future Internet, 16.","DOI":"10.20944\/preprints202409.0889.v1"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1109\/MCE.2022.3212570","article-title":"Integrating digital twin and advanced intelligent technologies to realize the metaverse","volume":"12","author":"Aloqaily","year":"2022","journal-title":"IEEE Consum. Electron. Mag."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"101241","DOI":"10.1109\/ACCESS.2023.3312181","article-title":"ENF based digital multimedia forensics: Survey, application, challenges and future work","volume":"11","author":"Ngharamike","year":"2023","journal-title":"IEEE Access"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Nagothu, D., Xu, R., Chen, Y., Blasch, E., and Aved, A. (2022). Deterring deepfake attacks with an electrical network frequency fingerprints approach. Future Internet, 14.","DOI":"10.3390\/fi14050125"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"136","DOI":"10.1016\/j.forsciint.2006.06.033","article-title":"Applications of ENF criterion in forensic audio, video, computer and telecommunication analysis","volume":"167","author":"Grigoras","year":"2007","journal-title":"Forensic Sci. Int."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"771","DOI":"10.3390\/smartcities5030040","article-title":"The metaverse as a virtual form of smart cities: Opportunities and challenges for environmental, economic, and social sustainability in urban futures","volume":"5","author":"Allam","year":"2022","journal-title":"Smart Cities"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Hatami, M., Qu, Q., Chen, Y., Mohammadi, J., Blasch, E., and Ardiles-Cruz, E. (2025). ANCHOR-Grid: Authenticating Smart Grid Digital Twins Using Real-World Anchors. Sensors, 25.","DOI":"10.3390\/s25102969"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"1417","DOI":"10.1109\/TIFS.2013.2272217","article-title":"\u201cSeeing\u201d ENF: Power-signature-based timestamp for digital multimedia via optical sensing and signal processing","volume":"8","author":"Garg","year":"2013","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"236","DOI":"10.1109\/TIFS.2020.3009579","article-title":"Detection of electric network frequency in audio recordings\u2013from theory to practical detectors","volume":"16","author":"Hua","year":"2020","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Saracoglu, D. (2023). Metaverse and New Cybersecurity Threats. Metaverse: Technologies, Opportunities and Threats, Springer.","DOI":"10.1007\/978-981-99-4641-9_7"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Pooyandeh, M., Han, K.J., and Sohn, I. (2022). Cybersecurity in the AI-Based metaverse: A survey. Appl. Sci., 12.","DOI":"10.3390\/app122412993"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"1008","DOI":"10.1109\/COMST.2024.3442475","article-title":"Artificial intelligence-based cybersecurity for the metaverse: Research challenges and opportunities","volume":"27","author":"Awadallah","year":"2024","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Ramaseri-Chandra, A.N., and Pothana, P. (2024, January 28\u201329). Cybersecurity threats in Virtual Reality Environments: A Literature Review. Proceedings of the 2024 Cyber Awareness and Research Symposium (CARS), Grand Forks, ND, USA.","DOI":"10.1109\/CARS61786.2024.10778838"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1109\/COMST.2022.3202047","article-title":"A survey on metaverse: Fundamentals, security, and privacy","volume":"25","author":"Wang","year":"2022","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"100977","DOI":"10.1016\/j.iot.2023.100977","article-title":"Metaverse-IDS: Deep learning-based intrusion detection system for Metaverse-IoT networks","volume":"24","author":"Gaber","year":"2023","journal-title":"Internet Things"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"2390","DOI":"10.1109\/TSG.2022.3218934","article-title":"Detection of microgrid cyberattacks using network and system management","volume":"14","author":"Karanfil","year":"2022","journal-title":"IEEE Trans. Smart Grid"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Aziz, R., Banerjee, S., Bouzefrane, S., and Le Vinh, T. (2023). Exploring homomorphic encryption and differential privacy techniques towards secure federated learning paradigm. Future Internet, 15.","DOI":"10.3390\/fi15090310"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Nagothu, D., Xu, R., Chen, Y., Blasch, E., and Ardiles-Cruz, E. (2023, January 28\u201331). Application of Electrical Network Frequency as an Entropy Generator in Distributed Systems. Proceedings of the NAECON 2023-IEEE National Aerospace and Electronics Conference, Dayton, OH, USA.","DOI":"10.1109\/NAECON58068.2023.10365792"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Assiri, M., and Humayun, M. (2023). A Blockchain-enabled framework for improving the software audit process. Appl. Sci., 13.","DOI":"10.3390\/app13063437"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"5103","DOI":"10.1007\/s11356-022-22454-6","article-title":"A new cross-domain prediction model of air pollutant concentration based on secure federated learning and optimized LSTM neural network","volume":"30","author":"Huang","year":"2023","journal-title":"Environ. Sci. Pollut. Res."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"4229","DOI":"10.1109\/TIFS.2023.3287132","article-title":"Analysis of ENF signal extraction from videos acquired by rolling shutters","volume":"18","author":"Choi","year":"2023","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Meydani, A., Shahinzadeh, H., Nafisi, H., and Gharehpetian, G.B. (2024, January 23\u201325). Synchrophasor Technology Applications and Optimal Placement of Micro-Phasor Measurement Unit (\u03bcPMU): Part II. Proceedings of the 2024 28th International Electrical Power Distribution Conference (EPDC), Zanjan, Iran.","DOI":"10.1109\/EPDC62178.2024.10571738"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Ye, J., and Jiang, Y. (2024). Data Integrity Verification for Edge Computing Environments. Symmetry, 16.","DOI":"10.3390\/sym16121648"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"3559","DOI":"10.1007\/s40747-022-00667-z","article-title":"Cyber-physical security for IoT networks: A comprehensive review on traditional, blockchain and artificial intelligence based key-security","volume":"8","author":"Attkan","year":"2022","journal-title":"Complex Intell. Syst."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1186\/s13634-022-00900-4","article-title":"Shallow and deep feature fusion for digital audio tampering detection","volume":"2022","author":"Wang","year":"2022","journal-title":"EURASIP J. Adv. Signal Process."},{"key":"ref_26","unstructured":"Zibaeirad, A., Koleini, F., Bi, S., Hou, T., and Wang, T. (2024). A comprehensive survey on the security of smart grid: Challenges, mitigations, and future research opportunities. arXiv."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Alsuwian, T., Shahid Butt, A., and Amin, A.A. (2022). Smart grid cyber security enhancement: Challenges and solutions\u2014A review. Sustainability, 14.","DOI":"10.3390\/su142114226"},{"key":"ref_28","first-page":"1","article-title":"Security and Privacy Challenges of AIGC in Metaverse: A Comprehensive Survey","volume":"57","author":"Zhang","year":"2025","journal-title":"ACM Comput. Surv."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"111938","DOI":"10.1016\/j.knosys.2024.111938","article-title":"ENFformer: Long-short term representation of electric network frequency for digital audio tampering detection","volume":"297","author":"Zeng","year":"2024","journal-title":"Knowl.-Based Syst."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Francis, E.G., and Sheeja, S. (2023). Chaotic Resilience: Enhancing IoT Security Through Dynamic Data Encryption. Proceedings of the International Symposium on Intelligent Informatics, Springer.","DOI":"10.1007\/978-981-97-2147-4_23"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Karantaidis, G., and Kotropoulos, C. (2021). An automated approach for electric network frequency estimation in static and non-static digital video recordings. J. Imaging, 7.","DOI":"10.3390\/jimaging7100202"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Bandyopadhyay, S., Singh, K., and Kumari, M.S. (2024, January 21\u201325). A Graph Fourier Transform Based Approach to Detect False Data Injection Attacks in Power Grid. Proceedings of the 2024 IEEE Power & Energy Society General Meeting (PESGM), Seattle, WA, USA.","DOI":"10.1109\/PESGM51994.2024.10761069"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"441","DOI":"10.1109\/OJIES.2024.3406226","article-title":"False data injection attack detection and mitigation using non-linear autoregressive exogenous input-based observers in distributed control for dc microgrid","volume":"5","author":"Taher","year":"2024","journal-title":"IEEE Open J. Ind. Electron. Soc."},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Wang, X., Li, S., and Rahman, M.A. (2024). A Comprehensive Survey on Enabling Techniques in Secure and Resilient Smart Grids. Electronics, 13.","DOI":"10.3390\/electronics13112177"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Abdelrahman, M.S., Kharchouf, I., Nguyen, T.L., and Mohammed, O.A. (2023). A Hybrid Physical Co-Simulation Smart Grid Testbed for Testing and Impact Analysis of Cyber-Attacks on Power Systems: Framework and Attack Scenarios. Energies, 16.","DOI":"10.3390\/en16237771"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"52922","DOI":"10.1109\/ACCESS.2022.3174259","article-title":"Smart grid security and privacy: From conventional to machine learning issues (threats and countermeasures)","volume":"10","author":"Mirzaee","year":"2022","journal-title":"IEEE Access"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"440","DOI":"10.1109\/JSYST.2020.3035323","article-title":"Distributed fast fault detection in DC microgrids","volume":"16","author":"Mola","year":"2020","journal-title":"IEEE Syst. J."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"14965","DOI":"10.1109\/JIOT.2023.3263909","article-title":"A survey on digital twins: Architecture, enabling technologies, security and privacy, and future prospects","volume":"10","author":"Wang","year":"2023","journal-title":"IEEE Internet Things J."},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Hossain, M.I., and Hasan, R. (2023, January 26\u201328). Threat model-based security analysis and mitigation strategies for a trustworthy metaverse. Proceedings of the 2023 IEEE International Conference on Metaverse Computing, Networking and Applications (MetaCom), Kyoto, Japan.","DOI":"10.1109\/MetaCom57706.2023.00021"},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Sun, B., Wu, Y., Yu, W., Thotakura, N.L., Liu, Q., Liu, Y., Liu, Y., Wang, W., and Gao, S. (2024, January 21\u201323). Development of Distribution-level Multi-domain Synchronized Measurements for FNET\/GridEye. Proceedings of the 2024 3rd International Conference on Energy Transition in the Mediterranean Area (SyNERGY MED), Limassol, Cyprus.","DOI":"10.1109\/SyNERGYMED62435.2024.10799284"},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"1129","DOI":"10.1109\/TSG.2023.3286401","article-title":"A survey of power system state estimation using multiple data sources: PMUs, SCADA, AMI, and beyond","volume":"15","author":"Cheng","year":"2023","journal-title":"IEEE Trans. Smart Grid"},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Azim, S.M., Feng, Z., Syed, M., and Burt, G. (November, January 31). High-fidelity validation with smart grid modelling complexity: Considerations on emerging solutions. Proceedings of the 2023 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), Glasgow, UK.","DOI":"10.1109\/SmartGridComm57358.2023.10333914"},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"1294","DOI":"10.1109\/COMST.2023.3251899","article-title":"Security of wide-area monitoring, protection, and control (WAMPAC) systems of the smart grid: A survey on challenges and opportunities","volume":"25","author":"Vahidi","year":"2023","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Ngharamike, E., Ang, L.M., Wang, M., and Seng, K.P. (2024, January 13\u201315). Analysis of the Impact of Light Sources on the Capturing and Extraction of ENF from Video Recordings. Proceedings of the 2024 9th International Conference on Communication, Image and Signal Processing (CCISP), Gold Coast, Australia.","DOI":"10.1109\/CCISP63826.2024.10765509"},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Ngharamike, E., Ang, L.M., Seng, K.P., and Wang, M. (2023). Exploiting the rolling shutter read-out time for ENF-based camera identification. Appl. Sci., 13.","DOI":"10.3390\/app13085039"},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Lykourinas, A., and Skodras, A. (2023, January 11\u201313). Video Surveillance Authentication: Real-Time ENF Signal Hiding at the Edge. Proceedings of the 2023 24th International Conference on Digital Signal Processing (DSP), Rhodes (Rodos), Greece.","DOI":"10.1109\/DSP58604.2023.10167961"},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"2598","DOI":"10.1109\/TIFS.2022.3185775","article-title":"Invisible geolocation signature extraction from a single image","volume":"17","author":"Choi","year":"2022","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"1121","DOI":"10.1016\/j.dcan.2023.01.009","article-title":"Factors affecting forensic electric network frequency matching\u2013A comprehensive study","volume":"10","author":"Hua","year":"2024","journal-title":"Digit. Commun. Netw."},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Hsu, H.P., Jiang, Z.R., Li, L.Y., Tsai, T.C., Hung, C.H., Chang, S.C., Wang, S.S., and Fang, S.H. (2023). Detection of audio tampering based on electric network frequency signal. Sensors, 23.","DOI":"10.3390\/s23167029"},{"key":"ref_50","first-page":"57","article-title":"DEMA: Decentralized electrical network frequency map for social media authentication","volume":"Volume 12542","author":"Nagothu","year":"2023","journal-title":"Proceedings of the Disruptive Technologies in Information Sciences VII"},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"9308","DOI":"10.1109\/ACCESS.2024.3354053","article-title":"Leveraging electric network frequency estimation for audio authentication","volume":"12","author":"Korgialas","year":"2024","journal-title":"IEEE Access"},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Asif, M., Aziz, Z., Bin Ahmad, M., Khalid, A., Waris, H.A., and Gilani, A. (2022). Blockchain-based authentication and trust management mechanism for smart cities. Sensors, 22.","DOI":"10.3390\/s22072604"},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"1963","DOI":"10.1109\/LSP.2022.3205563","article-title":"ENF based robust media time-stamping","volume":"29","author":"Vatansever","year":"2022","journal-title":"IEEE Signal Process. Lett."},{"key":"ref_54","doi-asserted-by":"crossref","unstructured":"Mirshekali, H., Santos, A.Q., and Shaker, H.R. (2023). A survey of time-series prediction for digitally enabled maintenance of electrical grids. Energies, 16.","DOI":"10.3390\/en16176332"},{"key":"ref_55","doi-asserted-by":"crossref","unstructured":"Lei, H., Wonghirundacha, A., Bukey, I., and Tsai, T. (2023, January 4\u201310). Audio Cross Verification Using Dual Alignment Likelihood Ratio Test. Proceedings of the ICASSP 2023-2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Rhodes Island, Greece.","DOI":"10.1109\/ICASSP49357.2023.10095059"},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"1171","DOI":"10.1109\/TSC.2025.3553711","article-title":"A Continuous Authentication Framework for Securing Metaverse Identities","volume":"18","author":"Han","year":"2025","journal-title":"IEEE Trans. Serv. Comput."},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"2559","DOI":"10.1109\/TSC.2022.3216539","article-title":"Detection of security and privacy attacks disrupting user immersive experience in virtual reality learning environments","volume":"16","author":"Valluripally","year":"2022","journal-title":"IEEE Trans. Serv. Comput."},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"40354","DOI":"10.1109\/ACCESS.2025.3546618","article-title":"Enhancing Data Privacy: A Comprehensive Survey of Privacy-Enabling Technologies","volume":"13","author":"Razi","year":"2025","journal-title":"IEEE Access"},{"key":"ref_59","doi-asserted-by":"crossref","unstructured":"Unsal, D.B., Ustun, T.S., Hussain, S.S., and Onen, A. (2021). Enhancing cybersecurity in smart grids: False data injection and its mitigation. Energies, 14.","DOI":"10.3390\/en14092657"},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"1238","DOI":"10.1109\/COMST.2023.3347172","article-title":"Metaverse communications, networking, security, and applications: Research issues, state-of-the-art, and future directions","volume":"26","author":"Ali","year":"2023","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_61","doi-asserted-by":"crossref","unstructured":"Fakhouri, H.N., Alhadidi, B., Omar, K., Makhadmeh, S.N., Hamad, F., and Halalsheh, N.Z. (2024, January 26\u201328). Ai-driven solutions for social engineering attacks: Detection, prevention, and response. Proceedings of the 2024 2nd International Conference on Cyber Resilience (ICCR), Dubai, United Arab Emirates.","DOI":"10.1109\/ICCR61006.2024.10533010"},{"key":"ref_62","doi-asserted-by":"crossref","first-page":"13919","DOI":"10.1109\/ACCESS.2025.3528960","article-title":"Advancing Passwordless Authentication: A Systematic Review of Methods, Challenges, and Future Directions for Secure User Identity","volume":"13","author":"Yusop","year":"2025","journal-title":"IEEE Access"},{"key":"ref_63","doi-asserted-by":"crossref","unstructured":"Sharma, A., Sharma, A., Raju, K.N., Keshta, I., and Guo, K. (IEEE Trans. Consum. Electron., 2025). Synergistic Integration of 5G-enabled Cloud Native Infrastructures With Advanced Technologies for Urban Safety Enhancement, IEEE Trans. Consum. Electron., Early Access.","DOI":"10.1109\/TCE.2025.3560133"},{"key":"ref_64","doi-asserted-by":"crossref","unstructured":"Amerini, I., Barni, M., Battiato, S., Bestagini, P., Boato, G., Bruni, V., Caldelli, R., De Natale, F., De Nicola, R., and Guarnera, L. (2025). Deepfake media forensics: Status and future challenges. J. Imaging, 11.","DOI":"10.3390\/jimaging11030073"},{"key":"ref_65","doi-asserted-by":"crossref","unstructured":"Enaya, A., Fernando, X., and Kashef, R. (2025). Survey of Blockchain-Based Applications for IoT. Appl. Sci., 15.","DOI":"10.3390\/app15084562"},{"key":"ref_66","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1186\/s40537-025-01099-5","article-title":"Adapting security and decentralized knowledge enhancement in federated learning using blockchain technology: Literature review","volume":"12","author":"Orabi","year":"2025","journal-title":"J. Big Data"},{"key":"ref_67","doi-asserted-by":"crossref","first-page":"82996","DOI":"10.1109\/ACCESS.2024.3411783","article-title":"A comprehensive review on secure biometric-based continuous authentication and user profiling","volume":"12","author":"Ayeswarya","year":"2024","journal-title":"IEEE Access"},{"key":"ref_68","doi-asserted-by":"crossref","first-page":"57143","DOI":"10.1109\/ACCESS.2022.3174679","article-title":"Zero trust architecture (zta): A comprehensive survey","volume":"10","author":"Syed","year":"2022","journal-title":"IEEE Access"},{"key":"ref_69","first-page":"e4","article-title":"Authenticating Video Feeds using Electric Network Frequency Estimation at the Edge","volume":"7","author":"Nagothu","year":"2021","journal-title":"EAI Endorsed Trans. Secur. Saf."},{"key":"ref_70","doi-asserted-by":"crossref","unstructured":"Ruiu, P., Nitti, M., Pilloni, V., Cadoni, M., Grosso, E., and Fadda, M. (2024). Metaverse & Human Digital Twin: Digital Identity, Biometrics, and Privacy in the Future Virtual Worlds. Multimodal Technol. Interact., 8.","DOI":"10.3390\/mti8060048"},{"key":"ref_71","doi-asserted-by":"crossref","first-page":"179010","DOI":"10.1109\/ACCESS.2024.3486552","article-title":"The Evolution of Biometric Authentication: A Deep Dive Into Multi-Modal Facial Recognition: A Review Case Study","volume":"12","author":"Kyeremeh","year":"2024","journal-title":"IEEE Access"},{"key":"ref_72","first-page":"100594","article-title":"Embracing the quantum frontier: Investigating quantum communication, cryptography, applications and future directions","volume":"2024","author":"Vasani","year":"2024","journal-title":"J. Ind. Inf. Integr."},{"key":"ref_73","doi-asserted-by":"crossref","first-page":"98944","DOI":"10.1109\/ACCESS.2022.3206457","article-title":"Design of secure mutual authentication scheme for metaverse environments using blockchain","volume":"10","author":"Ryu","year":"2022","journal-title":"IEEE Access"},{"key":"ref_74","doi-asserted-by":"crossref","first-page":"234","DOI":"10.26599\/BDMA.2022.9020047","article-title":"Security and privacy in metaverse: A comprehensive survey","volume":"6","author":"Huang","year":"2023","journal-title":"Big Data Min. Anal."},{"key":"ref_75","doi-asserted-by":"crossref","unstructured":"Ngharamike, E., Ang, L.M., Wang, M., and Seng, K.P. (2025). Intra-grid location estimation of smartphone videos using ENF extraction and an improved super-pixel technique. Sci. Rep., 15.","DOI":"10.1038\/s41598-025-89184-w"},{"key":"ref_76","doi-asserted-by":"crossref","unstructured":"Hajj-Ahmad, A., Wong, C.W., Choi, J., and Wu, M. (2022). Power signature for multimedia forensics. Multimedia Forensics, Springer.","DOI":"10.1007\/978-981-16-7621-5_10"},{"key":"ref_77","doi-asserted-by":"crossref","first-page":"1021","DOI":"10.1111\/1556-4029.15003","article-title":"Use of electric network frequency presence in video material for time estimation","volume":"67","author":"Frijters","year":"2022","journal-title":"J. Forensic Sci."},{"key":"ref_78","doi-asserted-by":"crossref","unstructured":"Zhao, H., Ye, Y., Shen, X., and Liu, L. (2024). 1D-CNN-based audio tampering detection using ENF signals. Sci. Rep., 14.","DOI":"10.1038\/s41598-024-60813-0"},{"key":"ref_79","first-page":"277","article-title":"Factors affecting ENF capture in audio","volume":"14","author":"Wong","year":"2018","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_80","doi-asserted-by":"crossref","first-page":"11166","DOI":"10.1109\/ACCESS.2017.2707060","article-title":"Source location identification of distribution-level electric network frequency signals at multiple geographic scales","volume":"5","author":"Yao","year":"2017","journal-title":"IEEE Access"},{"key":"ref_81","doi-asserted-by":"crossref","unstructured":"Sarkar, M., Chowdhury, D., Shahnaz, C., and Fattah, S.A. (2019). Application of electrical network frequency of digital recordings for location-stamp verification. Appl. Sci., 9.","DOI":"10.3390\/app9153135"},{"key":"ref_82","doi-asserted-by":"crossref","first-page":"1982168","DOI":"10.1155\/2019\/1982168","article-title":"Power grid estimation using electric network frequency signals","volume":"2019","author":"Bang","year":"2019","journal-title":"Secur. Commun. Netw."},{"key":"ref_83","unstructured":"Moysiadis, C., Karantaidis, G., and Kotropoulos, C. (2023). Electric network frequency optical sensing devices. arXiv."},{"key":"ref_84","doi-asserted-by":"crossref","unstructured":"Garg, R., Hajj-Ahmad, A., and Wu, M. (2013, January 26\u201331). Geo-location estimation from electrical network frequency signals. Proceedings of the 2013 IEEE International Conference on Acoustics, Speech and Signal Processing, Vancouver, BC, Canada.","DOI":"10.1109\/ICASSP.2013.6638180"},{"key":"ref_85","doi-asserted-by":"crossref","unstructured":"Cui, Y., Liu, Y., Fuhr, P., and Morales-Rodriguez, M. (2018, January 23\u201324). Exploiting spatial signatures of power ENF signal for measurement source authentication. Proceedings of the 2018 IEEE International Symposium on Technologies for Homeland Security (HST), Woburn, MA, USA.","DOI":"10.1109\/THS.2018.8574151"},{"key":"ref_86","doi-asserted-by":"crossref","first-page":"20640","DOI":"10.1109\/ACCESS.2017.2647921","article-title":"On practical issues of electric network frequency based audio forensics","volume":"5","author":"Hua","year":"2017","journal-title":"IEEE Access"},{"key":"ref_87","doi-asserted-by":"crossref","first-page":"4974","DOI":"10.1109\/TSG.2024.3370892","article-title":"Securing power system data in motion by timestamped digital text watermarking","volume":"15","author":"Roy","year":"2024","journal-title":"IEEE Trans. Smart Grid"},{"key":"ref_88","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1109\/MSP.2023.3275319","article-title":"Information Forensics and Security: A quarter-century-long journey","volume":"40","author":"Barni","year":"2023","journal-title":"IEEE Signal Process. Mag."},{"key":"ref_89","doi-asserted-by":"crossref","first-page":"248","DOI":"10.1109\/TIFS.2022.3220029","article-title":"The effect of inverse square law of light on ENF in videos exposed by rolling shutter","volume":"18","author":"Vatansever","year":"2022","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_90","doi-asserted-by":"crossref","unstructured":"Garg, R., Hajj-Ahmad, A., and Wu, M. (2021). Feasibility study on intra-grid location estimation using power ENF signals. arXiv.","DOI":"10.36227\/techrxiv.14516634"},{"key":"ref_91","unstructured":"Korgialas, C., Tsingalis, I., Tzolopoulos, G., and Kotropoulos, C. (2025). InterGridNet: An Electric Network Frequency Approach for Audio Source Location Classification Using Convolutional Neural Networks. arXiv."},{"key":"ref_92","doi-asserted-by":"crossref","first-page":"58302","DOI":"10.1109\/ACCESS.2025.3555753","article-title":"Metaverse Unbound: A Survey on Synergistic Integration Between Semantic Communication, 6G, and Edge Learning","volume":"13","author":"Aloudat","year":"2025","journal-title":"IEEE Access"},{"key":"ref_93","doi-asserted-by":"crossref","unstructured":"Long, Z., Wang, H., Dong, H., and El Saddik, A. (IEEE Trans. Comput. Soc. Syst., 2025). Adaptive Social Metaverse Streaming Based on Federated Multiagent Deep Reinforcement Learning, IEEE Trans. Comput. Soc. Syst., Early Access.","DOI":"10.1109\/TCSS.2025.3555419"},{"key":"ref_94","doi-asserted-by":"crossref","first-page":"5933","DOI":"10.1109\/OJCOMS.2024.3458088","article-title":"Federated learning: Challenges, SoTA, performance improvements and application domains","volume":"5","author":"Schoinas","year":"2024","journal-title":"IEEE Open J. Commun. Soc."},{"key":"ref_95","doi-asserted-by":"crossref","first-page":"21873","DOI":"10.1109\/JIOT.2023.3304790","article-title":"Federated learning for the healthcare metaverse: Concepts, applications, challenges, and future directions","volume":"10","author":"Bashir","year":"2023","journal-title":"IEEE Internet Things J."},{"key":"ref_96","doi-asserted-by":"crossref","unstructured":"Ababio, I.B., Bieniek, J., Rahouti, M., Hayajneh, T., Aledhari, M., Verma, D.C., and Chehri, A. (2025). A Blockchain-Assisted federated learning framework for secure and Self-Optimizing digital twins in industrial IoT. Future Internet, 17.","DOI":"10.3390\/fi17010013"},{"key":"ref_97","doi-asserted-by":"crossref","unstructured":"Chowdhury, M.M., Rifat, N., Ahsan, M., Latif, S., Gomes, R., and Rahman, M.S. (2023, January 18\u201320). Chatgpt: A threat against the cia triad of cyber security. Proceedings of the 2023 IEEE International Conference on Electro Information Technology (eIT), Romeoville, IL, USA.","DOI":"10.1109\/eIT57321.2023.10187355"},{"key":"ref_98","doi-asserted-by":"crossref","first-page":"749","DOI":"10.1016\/j.aej.2022.10.056","article-title":"A Confidentiality-based data Classification-as-a-Service (C2aaS) for cloud security","volume":"64","author":"Ali","year":"2023","journal-title":"Alex. Eng. J."},{"key":"ref_99","doi-asserted-by":"crossref","first-page":"5069","DOI":"10.1109\/TIFS.2023.3304124","article-title":"Practical algorithm substitution attacks on real-world public-key cryptosystems","volume":"18","author":"Jiang","year":"2023","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_100","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1007\/s10207-021-00543-w","article-title":"Public key versus symmetric key cryptography in client\u2013server authentication protocols","volume":"21","author":"Braeken","year":"2022","journal-title":"Int. J. Inf. Secur."},{"key":"ref_101","doi-asserted-by":"crossref","unstructured":"Hussien, Z.A., Abdulmalik, H.A., Hussain, M.A., Nyangaresi, V.O., Ma, J., Abduljabbar, Z.A., and Abduljaleel, I.Q. (2023). Lightweight integrity preserving scheme for secure data exchange in cloud-based IoT systems. Appl. Sci., 13.","DOI":"10.3390\/app13020691"},{"key":"ref_102","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1109\/IOTM.001.2300174","article-title":"Beyond reality: The pivotal role of generative ai in the metaverse","volume":"7","author":"Chamola","year":"2024","journal-title":"IEEE Internet Things Mag."},{"key":"ref_103","doi-asserted-by":"crossref","first-page":"36311","DOI":"10.1109\/ACCESS.2024.3374201","article-title":"Digital watermarking\u2013a meta-survey and techniques for fake news detection","volume":"12","author":"Malanowska","year":"2024","journal-title":"IEEE Access"},{"key":"ref_104","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1007\/s41651-023-00162-0","article-title":"A multilevel digital watermarking protocol for vector geographic data based on blockchain","volume":"7","author":"Ren","year":"2023","journal-title":"J. Geovisualization Spat. Anal."},{"key":"ref_105","doi-asserted-by":"crossref","first-page":"222","DOI":"10.1007\/s42979-022-01657-1","article-title":"A study on content tampering in multimedia watermarking","volume":"4","author":"Sahu","year":"2023","journal-title":"SN Comput. Sci."},{"key":"ref_106","doi-asserted-by":"crossref","unstructured":"Safitra, M.F., Lubis, M., and Fakhrurroja, H. (2023). Counterattacking cyber threats: A framework for the future of cybersecurity. Sustainability, 15.","DOI":"10.3390\/su151813369"},{"key":"ref_107","doi-asserted-by":"crossref","first-page":"109553","DOI":"10.1016\/j.comnet.2022.109553","article-title":"Distributed denial of service attack prediction: Challenges, open issues and opportunities","volume":"222","author":"Kantarci","year":"2023","journal-title":"Comput. Netw."},{"key":"ref_108","doi-asserted-by":"crossref","first-page":"101909","DOI":"10.1016\/j.tele.2022.101909","article-title":"Designing the metaverse: A study on inclusion, diversity, equity, accessibility and safety for digital immersive environments","volume":"75","author":"Zallio","year":"2022","journal-title":"Telemat. Inform."},{"key":"ref_109","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1016\/j.future.2023.01.017","article-title":"Metaverse intrusion detection of wormhole attacks based on a novel statistical mechanism","volume":"143","author":"Kuo","year":"2023","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_110","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1109\/COMST.2022.3205643","article-title":"Anomaly detection in blockchain networks: A comprehensive survey","volume":"25","author":"Hassan","year":"2022","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_111","doi-asserted-by":"crossref","first-page":"4134","DOI":"10.1109\/TPWRS.2022.3215915","article-title":"Security-constrained unit commitment considering locational frequency stability in low-inertia power grids","volume":"38","author":"Tuo","year":"2022","journal-title":"IEEE Trans. Power Syst."},{"key":"ref_112","doi-asserted-by":"crossref","first-page":"44662","DOI":"10.1109\/ACCESS.2025.3547433","article-title":"Cyber Attack Prediction: From Traditional Machine Learning to Generative Artificial Intelligence","volume":"13","author":"Ankalaki","year":"2025","journal-title":"IEEE Access"},{"key":"ref_113","doi-asserted-by":"crossref","first-page":"18757","DOI":"10.1109\/ACCESS.2022.3151186","article-title":"DeepFake Detection for Human Face Images and Videos: A Survey","volume":"10","author":"Malik","year":"2022","journal-title":"IEEE Access"},{"key":"ref_114","doi-asserted-by":"crossref","first-page":"25494","DOI":"10.1109\/ACCESS.2022.3154404","article-title":"Deepfake Detection: A Systematic Literature Review","volume":"10","author":"Murali","year":"2022","journal-title":"IEEE Access"},{"key":"ref_115","doi-asserted-by":"crossref","unstructured":"Khanjani, Z., Watson, G., and Janeja, V.P. (2023). Audio deepfakes: A survey. Front. Big Data, 5.","DOI":"10.3389\/fdata.2022.1001063"},{"key":"ref_116","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1186\/s42400-023-00200-w","article-title":"Study of smart grid cyber-security, examining architectures, communication networks, cyber-attacks, countermeasure techniques, and challenges","volume":"7","author":"Achaal","year":"2024","journal-title":"Cybersecurity"},{"key":"ref_117","doi-asserted-by":"crossref","first-page":"39638","DOI":"10.1109\/ACCESS.2022.3166146","article-title":"Electricity theft detection in smart grids based on deep neural network","volume":"10","author":"Lepolesa","year":"2022","journal-title":"IEEE Access"},{"key":"ref_118","doi-asserted-by":"crossref","unstructured":"Khan, A., and Malik, K.M. (2023, January 12\u201315). Spotnet: A spoofing-aware transformer network for effective synthetic speech detection. Proceedings of the 2nd ACM International Workshop on Multimedia AI Against Disinformation, Thessaloniki, Greece.","DOI":"10.1145\/3592572.3592841"},{"key":"ref_119","doi-asserted-by":"crossref","first-page":"4296","DOI":"10.1109\/TSP.2021.3093786","article-title":"Enhanced time-frequency representation and mode decomposition","volume":"69","author":"Zhang","year":"2021","journal-title":"IEEE Trans. Signal Process."},{"key":"ref_120","doi-asserted-by":"crossref","first-page":"110100","DOI":"10.1016\/j.forsciint.2019.110100","article-title":"Recording device identification by ENF harmonics power analysis","volume":"307","author":"Bykhovsky","year":"2020","journal-title":"Forensic Sci. Int."},{"key":"ref_121","doi-asserted-by":"crossref","unstructured":"Alsabbagh, W., Amogbonjaye, S., Urrego, D., and Langend\u00f6rfer, P. (2023, January 8\u201311). A stealthy false command injection attack on modbus based scada systems. Proceedings of the 2023 IEEE 20th Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA.","DOI":"10.1109\/CCNC51644.2023.10059804"},{"key":"ref_122","doi-asserted-by":"crossref","unstructured":"Alabdulatif, A. (2025). Blockchain-Based Privacy-Preserving Authentication and Access Control Model for E-Health Users. Information, 16.","DOI":"10.3390\/info16030219"},{"key":"ref_123","doi-asserted-by":"crossref","unstructured":"Rongali, A.S., Jagannayaki, K., Sarkar, P., Dhole, S.V., Kumar, C.M.S., and Matad, N.S. (2024, January 24\u201328). The intelligent optimization of AI\/ML framework to Detect Network Abnormalities via Time Series Analysis. Proceedings of the 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT), Kamand, India.","DOI":"10.1109\/ICCCNT61001.2024.10725899"},{"key":"ref_124","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1109\/MWC.004.2200381","article-title":"Decentralized P2P federated learning for privacy-preserving and resilient mobile robotic systems","volume":"30","author":"Zhou","year":"2023","journal-title":"IEEE Wirel. Commun."},{"key":"ref_125","doi-asserted-by":"crossref","unstructured":"Nambundo, J.M., de Souza Martins Gomes, O., de Souza, A.D., and Machado, R.C.S. (2025). Cybersecurity and Major Cyber Threats of Smart Meters: A Systematic Mapping Review. Energies, 18.","DOI":"10.20944\/preprints202502.1399.v1"},{"key":"ref_126","doi-asserted-by":"crossref","first-page":"1349","DOI":"10.1109\/TIFS.2022.3229595","article-title":"A game-theoretic method for defending against advanced persistent threats in cyber systems","volume":"18","author":"Zhang","year":"2022","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_127","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1109\/MTS.2023.3306540","article-title":"A review of techniques and policies on cybersecurity using artificial intelligence and reinforcement learning algorithms","volume":"42","author":"Fard","year":"2023","journal-title":"IEEE Technol. Soc. Mag."},{"key":"ref_128","doi-asserted-by":"crossref","unstructured":"Thilakavathy, P., Jayachitra, S., Aeron, A., Kumar, N., Ali, S.S., and Malathy, M. (2023, January 23\u201325). Investigating blockchain security mechanisms for tamper-proof data storage. Proceedings of the 2023 International Conference on Communication, Security and Artificial Intelligence (ICCSAI), Greater Noida, India.","DOI":"10.1109\/ICCSAI59793.2023.10421006"},{"key":"ref_129","doi-asserted-by":"crossref","first-page":"26258","DOI":"10.1109\/ACCESS.2023.3257029","article-title":"Blockchain meets metaverse and digital asset management: A comprehensive survey","volume":"11","author":"Truong","year":"2023","journal-title":"IEEE Access"},{"key":"ref_130","doi-asserted-by":"crossref","unstructured":"Guato Burgos, M.F., Morato, J., and Vizcaino Imaca\u00f1a, F.P. (2024). A review of smart grid anomaly detection approaches pertaining to artificial intelligence. Appl. Sci., 14.","DOI":"10.3390\/app14031194"},{"key":"ref_131","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1007\/s10462-024-10827-x","article-title":"Trustworthy cyber-physical power systems using AI: Dueling algorithms for PMU anomaly detection and cybersecurity","volume":"57","author":"Cali","year":"2024","journal-title":"Artif. Intell. Rev."},{"key":"ref_132","doi-asserted-by":"crossref","unstructured":"Ucar, A., Karakose, M., and K\u0131r\u0131m\u00e7a, N. (2024). Artificial intelligence for predictive maintenance applications: Key components, trustworthiness, and future trends. Appl. Sci., 14.","DOI":"10.3390\/app14020898"},{"key":"ref_133","doi-asserted-by":"crossref","first-page":"109470","DOI":"10.1109\/ACCESS.2024.3439363","article-title":"Enhancing autonomous system security and resilience with generative AI: A comprehensive survey","volume":"12","author":"Andreoni","year":"2024","journal-title":"IEEE Access"},{"key":"ref_134","doi-asserted-by":"crossref","unstructured":"Alijoyo, F.A., Kaur, C., Anjum, A., Vuyyuru, V.A., and Bala, B.K. (2024, January 9\u201310). Enhancing Cyber-Physical Systems Resilience: Adaptive Self-Healing Security Using Long Short-Term Memory Networks. Proceedings of the 2024 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI), Chennai, India.","DOI":"10.1109\/ACCAI61061.2024.10602467"},{"key":"ref_135","doi-asserted-by":"crossref","first-page":"103154","DOI":"10.1109\/ACCESS.2023.3317695","article-title":"Cyber attacks on power grids: Causes and propagation of cascading failures","volume":"11","author":"Rajkumar","year":"2023","journal-title":"IEEE Access"},{"key":"ref_136","doi-asserted-by":"crossref","first-page":"12939","DOI":"10.1007\/s10639-025-13326-w","article-title":"MetaHuman based phishing attacks in the metaverse realm: Awareness for cyber security education","volume":"30","author":"Manoharan","year":"2025","journal-title":"Educ. Inf. Technol."},{"key":"ref_137","doi-asserted-by":"crossref","first-page":"161329","DOI":"10.1109\/ACCESS.2024.3477714","article-title":"Trends in Smart Grid Cyber-Physical Security: Components, Threats and Solutions","volume":"12","author":"Manias","year":"2024","journal-title":"IEEE Access"},{"key":"ref_138","unstructured":"Zhao, J., Lu, B., Huang, L., Huang, M., and Huang, J. (2022, January 21\u201322). Digital audio tampering detection using ENF feature and LST-MInception net. Proceedings of the AIIPCC 2022; The Third International Conference on Artificial Intelligence, Information Processing and Cloud Computing, Online."},{"key":"ref_139","unstructured":"Nagothu, D. (2023). Lightweight Multimedia Authentication at the Edge Using Environmental Fingerprint, State University of New York at Binghamton."},{"key":"ref_140","doi-asserted-by":"crossref","first-page":"58869","DOI":"10.1109\/ACCESS.2022.3179517","article-title":"A review of wavelet analysis and its applications: Challenges and opportunities","volume":"10","author":"Guo","year":"2022","journal-title":"IEEE Access"},{"key":"ref_141","doi-asserted-by":"crossref","first-page":"68031","DOI":"10.1109\/ACCESS.2023.3284976","article-title":"Decentralized machine learning training: A survey on synchronization, consolidation, and topologies","volume":"11","author":"Khan","year":"2023","journal-title":"IEEE Access"},{"key":"ref_142","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/MSEC.2025.3560932","article-title":"Digital Forensics and Jurisdictional Challenges for the Industrial Internet of Things","volume":"23","author":"Baig","year":"2025","journal-title":"IEEE Secur. Priv."},{"key":"ref_143","doi-asserted-by":"crossref","first-page":"34953","DOI":"10.1109\/JIOT.2024.3450813","article-title":"A survey on extended reality, digital twins, and metaverse applications in power systems","volume":"11","author":"Menezes","year":"2024","journal-title":"IEEE Internet Things J."},{"key":"ref_144","doi-asserted-by":"crossref","unstructured":"Mozumder, M.A.I., Armand, T.P.T., Imtiyaj Uddin, S.M., Athar, A., Sumon, R.I., Hussain, A., and Kim, H.C. (2023). Metaverse for digital anti-aging healthcare: An overview of potential use cases based on artificial intelligence, blockchain, IoT technologies, its challenges, and future directions. Appl. Sci., 13.","DOI":"10.3390\/app13085127"},{"key":"ref_145","doi-asserted-by":"crossref","first-page":"103589","DOI":"10.1016\/j.rineng.2024.103589","article-title":"Predictive maintenance based on anomaly detection in photovoltaic system using SCADA data and machine learning","volume":"24","author":"Syamsuddin","year":"2024","journal-title":"Results Eng."},{"key":"ref_146","doi-asserted-by":"crossref","first-page":"3404","DOI":"10.1109\/TSG.2021.3051920","article-title":"Spoofing resilient state estimation for the power grid using an extended kalman filter","volume":"12","author":"Chauhan","year":"2021","journal-title":"IEEE Trans. Smart Grid"},{"key":"ref_147","doi-asserted-by":"crossref","first-page":"61494","DOI":"10.1109\/ACCESS.2022.3180349","article-title":"Frequency event detection and mitigation in power systems: A systematic literature review","volume":"10","author":"Farooq","year":"2022","journal-title":"IEEE Access"},{"key":"ref_148","doi-asserted-by":"crossref","first-page":"12529","DOI":"10.1109\/JIOT.2021.3137596","article-title":"A smart meter infrastructure for smart grid IoT applications","volume":"9","author":"Orlando","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"ref_149","doi-asserted-by":"crossref","first-page":"2014","DOI":"10.1016\/j.egyr.2024.08.027","article-title":"Metaverse-driven smart grid architecture","volume":"12","author":"Tightiz","year":"2024","journal-title":"Energy Rep."},{"key":"ref_150","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1109\/MITP.2022.3172653","article-title":"Defakepro: Decentralized deepfake attacks detection using enf authentication","volume":"24","author":"Nagothu","year":"2022","journal-title":"IT Prof."},{"key":"ref_151","doi-asserted-by":"crossref","unstructured":"Xu, R., Nagothu, D., and Chen, Y. (2021). Econledger: A proof-of-enf consensus based lightweight distributed ledger for iovt networks. Future Internet, 13.","DOI":"10.3390\/fi13100248"},{"key":"ref_152","doi-asserted-by":"crossref","first-page":"50645","DOI":"10.1007\/s11042-023-17630-w","article-title":"High capacity, secure audio watermarking technique integrating spread spectrum and linear predictive coding","volume":"83","author":"Korany","year":"2024","journal-title":"Multimed. Tools Appl."},{"key":"ref_153","doi-asserted-by":"crossref","first-page":"37006","DOI":"10.1109\/ACCESS.2025.3545152","article-title":"POLIPHONE: A dataset for smartphone model identification from audio recordings","volume":"13","author":"Salvi","year":"2025","journal-title":"IEEE Access"},{"key":"ref_154","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1109\/MPE.2024.3430888","article-title":"Enhancing synchrophasor reliability through network-based time synchronization: KEPCO\u2019s practical approach","volume":"23","author":"Kim","year":"2025","journal-title":"IEEE Power Energy Mag."},{"key":"ref_155","first-page":"1","article-title":"IoT Big Data provenance scheme using blockchain on Hadoop ecosystem","volume":"8","author":"Rashid","year":"2021","journal-title":"J. Big Data"},{"key":"ref_156","doi-asserted-by":"crossref","unstructured":"Qian, C., Liu, X., Ripley, C., Qian, M., Liang, F., and Yu, W. (2022). Digital twin\u2014Cyber replica of physical things: Architecture, applications and future research directions. Future Internet, 14.","DOI":"10.3390\/fi14020064"},{"key":"ref_157","doi-asserted-by":"crossref","first-page":"1424","DOI":"10.1109\/TNSE.2023.3322942","article-title":"Synchronizability and Synchronization Rate of AC Microgrids: A Topological Perspective","volume":"11","author":"Yu","year":"2023","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"key":"ref_158","doi-asserted-by":"crossref","first-page":"7043","DOI":"10.1109\/TWC.2023.3337058","article-title":"Bayesian inference-assisted machine learning for near real-time jamming detection and classification in 5g new radio (nr)","volume":"23","author":"Jere","year":"2023","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_159","doi-asserted-by":"crossref","unstructured":"Ragothaman, K., Wang, Y., Rimal, B., and Lawrence, M. (2023). Access control for IoT: A survey of existing research, dynamic policies and future directions. Sensors, 23.","DOI":"10.3390\/s23041805"},{"key":"ref_160","doi-asserted-by":"crossref","unstructured":"Van Calck, L., Pacheco, A., Strobel, V., Dorigo, M., and Reina, A. (2023). A blockchain-based information market to incentivise cooperation in swarms of self-interested robots. Sci. Rep., 13.","DOI":"10.1038\/s41598-023-46238-1"},{"key":"ref_161","doi-asserted-by":"crossref","first-page":"39798","DOI":"10.1109\/ACCESS.2021.3064350","article-title":"Information security monitoring and management method based on big data in the internet of things environment","volume":"9","author":"Liang","year":"2021","journal-title":"IEEE Access"},{"key":"ref_162","doi-asserted-by":"crossref","unstructured":"Sun, W., and Qiu, L. (2024, January 14\u201318). Visual Timing For Sound Source Depth Estimation in the Wild. Proceedings of the 2024 IEEE\/RSJ International Conference on Intelligent Robots and Systems (IROS), Abu Dhabi, United Arab Emirates.","DOI":"10.1109\/IROS58592.2024.10802318"},{"key":"ref_163","doi-asserted-by":"crossref","first-page":"505","DOI":"10.1002\/9781394191529.ch19","article-title":"Anomaly Detection and Mitigation in Cyber-Physical Power Systems Based on Hybrid Deep Learning and Attack Graphs","volume":"Volume 1","author":"Presekal","year":"2025","journal-title":"Smart Cyber-Physical Power Systems, Volume 1: Fundamental Concepts, Challenges, and Solutions"},{"key":"ref_164","unstructured":"Poredi, N., Nagothu, D., and Chen, Y. AUSOME: Authenticating social media images using frequency analysis. Proceedings of the Disruptive Technologies in Information Sciences VII, SPIE."},{"key":"ref_165","doi-asserted-by":"crossref","unstructured":"Irmak, E., Kabalci, E., and Kabalci, Y. (2023). Digital transformation of microgrids: A review of design, operation, optimization, and cybersecurity. Energies, 16.","DOI":"10.3390\/en16124590"},{"key":"ref_166","doi-asserted-by":"crossref","first-page":"4206615","DOI":"10.1109\/TGRS.2024.3402390","article-title":"Cross-spectral analysis of SAR altimetry waveform tails","volume":"62","author":"Kleinherenbrink","year":"2024","journal-title":"IEEE Trans. Geosci. Remote Sens."},{"key":"ref_167","doi-asserted-by":"crossref","unstructured":"Negi, P., Pathani, A., Bhatt, B.C., Swami, S., Singh, R., Gehlot, A., Thakur, A.K., Gupta, L.R., Priyadarshi, N., and Twala, B. (2024). Integration of Industry 4.0 Technologies in Fire and Safety Management. Fire, 7.","DOI":"10.3390\/fire7100335"},{"key":"ref_168","doi-asserted-by":"crossref","first-page":"343","DOI":"10.3390\/signals5020018","article-title":"Eeg data analysis techniques for precision removal and enhanced alzheimer\u2019s diagnosis: Focusing on fuzzy and intuitionistic fuzzy logic techniques","volume":"5","author":"Versaci","year":"2024","journal-title":"Signals"},{"key":"ref_169","doi-asserted-by":"crossref","first-page":"94543","DOI":"10.1109\/ACCESS.2024.3425272","article-title":"Review of challenges and research opportunities for control of transmission grids","volume":"12","author":"Gui","year":"2024","journal-title":"IEEE Access"},{"key":"ref_170","doi-asserted-by":"crossref","unstructured":"Li, C. (2024). A Survey on Complexity Measures for Pseudo-Random Sequences. Cryptography, 8.","DOI":"10.3390\/cryptography8020025"},{"key":"ref_171","doi-asserted-by":"crossref","unstructured":"Zhou, J., Fu, W., Hu, W., Sun, Z., He, T., and Zhang, Z. (2024). Challenges and Advances in Analyzing TLS 1.3-Encrypted Traffic: A Comprehensive Survey. Electronics, 13.","DOI":"10.3390\/electronics13204000"},{"key":"ref_172","doi-asserted-by":"crossref","first-page":"1520","DOI":"10.3390\/encyclopedia4040099","article-title":"Zero Trust Cybersecurity: Procedures and Considerations in Context","volume":"4","author":"Lund","year":"2024","journal-title":"Encyclopedia"},{"key":"ref_173","doi-asserted-by":"crossref","unstructured":"Cao, Y., Liu, W., Qin, L., Liu, B., Chen, S., Ye, J., Xia, X., and Wang, C. (2022). Entropy sources based on silicon chips: True random number generator and physical unclonable function. Entropy, 24.","DOI":"10.3390\/e24111566"},{"key":"ref_174","doi-asserted-by":"crossref","first-page":"19623","DOI":"10.1109\/JSEN.2021.3091768","article-title":"REO: A reliable and energy efficient optimization algorithm for Beacon-enabled 802.15. 4\u2013based wireless body area networks","volume":"21","author":"Alimorad","year":"2021","journal-title":"IEEE Sens. J."},{"key":"ref_175","doi-asserted-by":"crossref","unstructured":"Numair, M., Aboushady, A.A., Arra\u00f1o-Vargas, F., Farrag, M.E., and Elyan, E. (2023). Fault detection and localisation in lv distribution networks using a smart meter data-driven digital twin. Energies, 16.","DOI":"10.3390\/en16237850"},{"key":"ref_176","doi-asserted-by":"crossref","first-page":"11307","DOI":"10.1109\/ACCESS.2023.3241014","article-title":"Transient dynamics and propagation of voltage and frequency fluctuations in transmission grids","volume":"11","author":"Nnoli","year":"2023","journal-title":"IEEE Access"},{"key":"ref_177","doi-asserted-by":"crossref","first-page":"113891","DOI":"10.1016\/j.engstruct.2022.113891","article-title":"A three-stage automated modal identification framework for bridge parameters based on frequency uncertainty and density clustering","volume":"255","author":"He","year":"2022","journal-title":"Eng. Struct."},{"key":"ref_178","doi-asserted-by":"crossref","first-page":"197488","DOI":"10.1109\/ACCESS.2024.3514576","article-title":"When Holographic Communication Meets Metaverse: Applications, Challenges and Future Trends","volume":"12","author":"Shvetsov","year":"2024","journal-title":"IEEE Access"},{"key":"ref_179","doi-asserted-by":"crossref","first-page":"101359","DOI":"10.1016\/j.segan.2024.101359","article-title":"Quantifying power system frequency quality and extracting typical patterns within short time scales below one hour","volume":"38","author":"Mohammadi","year":"2024","journal-title":"Sustain. Energy Grids Netw."},{"key":"ref_180","doi-asserted-by":"crossref","first-page":"6809","DOI":"10.1109\/TPAMI.2024.3386813","article-title":"\u201cSeeing\u201d ENF from Neuromorphic Events: Modeling and Robust Estimation","volume":"46","author":"Xu","year":"2024","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"ref_181","doi-asserted-by":"crossref","first-page":"271","DOI":"10.1016\/j.comcom.2023.09.020","article-title":"A robust privacy-preserving ecc-based three-factor authentication scheme for metaverse environment","volume":"211","author":"Thakur","year":"2023","journal-title":"Comput. Commun."},{"key":"ref_182","doi-asserted-by":"crossref","unstructured":"Ahn, J., Hussain, R., Kang, K., and Son, J. (IEEE Commun. Surv. Tutor., 2025). Exploring Encryption Algorithms and Network Protocols: A Comprehensive Survey of Threats and Vulnerabilities, IEEE Commun. Surv. Tutor., Early Access.","DOI":"10.1109\/COMST.2025.3526605"},{"key":"ref_183","doi-asserted-by":"crossref","unstructured":"Li, M., Banerjee, N.K., and Banerjee, S. (2024, January 17\u201319). Using motion forecasting for behavior-based virtual reality (vr) authentication. Proceedings of the 2024 IEEE International Conference on Artificial Intelligence and eXtended and Virtual Reality (AIxVR), Los Angeles, CA, USA.","DOI":"10.1109\/AIxVR59861.2024.00012"},{"key":"ref_184","doi-asserted-by":"crossref","unstructured":"Aljrees, T., Kumar, A., Singh, K.U., and Singh, T. (2023). Enhancing IoT Security through a Green and Sustainable Federated Learning Platform: Leveraging Efficient Encryption and the Quondam Signature Algorithm. Sensors, 23.","DOI":"10.3390\/s23198090"},{"key":"ref_185","doi-asserted-by":"crossref","first-page":"83507","DOI":"10.1109\/ACCESS.2021.3087016","article-title":"A critical analysis of methodologies for detection and classification of power quality events in smart grid","volume":"9","author":"Beniwal","year":"2021","journal-title":"IEEE Access"}],"container-title":["Computers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-431X\/14\/8\/321\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T18:26:14Z","timestamp":1760034374000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-431X\/14\/8\/321"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,8]]},"references-count":185,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2025,8]]}},"alternative-id":["computers14080321"],"URL":"https:\/\/doi.org\/10.3390\/computers14080321","relation":{"has-preprint":[{"id-type":"doi","id":"10.36227\/techrxiv.175022028.87403614\/v1","asserted-by":"object"}]},"ISSN":["2073-431X"],"issn-type":[{"value":"2073-431X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,8,8]]}}}