Next Article in Journal
Dynamic Channel Selection for Rendezvous in Cognitive Radio Networks
Previous Article in Journal
Refactoring Loops in the Era of LLMs: A Comprehensive Study
Previous Article in Special Issue
Editorial for the Special Issue “Virtual Reality and Metaverse: Impact on the Digital Transformation of Society—2nd Edition”
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

SAVE: Securing Avatars in Virtual Healthcare Through Environmental Fingerprinting for Elder Safety Monitoring †

1
Department of Electrical and Computer Engineering, Binghamton University, Binghamton, NY 13902, USA
2
Department of Computer Science, Virginia State University, Petersburg, VA 23806, USA
3
MOVEJ Analytics, Fairborn, OH 45324, USA
*
Author to whom correspondence should be addressed.
This paper is an extended version of our paper published in 2025 SPIE defense + commercial sensing. ANCHOR: authenticating avatars and virtual objects via anchors in the real world. In Proceedings of the Disruptive Technologies in Information Sciences IX, Orlando FL, USA, 13–17 April 2025.
Future Internet 2025, 17(9), 419; https://doi.org/10.3390/fi17090419
Submission received: 17 July 2025 / Revised: 8 September 2025 / Accepted: 9 September 2025 / Published: 15 September 2025

Abstract

The rapid adoption of Metaverse technologies in healthcare, particularly for elder safety monitoring, has introduced new security challenges related to the authenticity of virtual representations. As healthcare providers increasingly rely on avatars and digital twins to monitor and interact with elderly patients remotely, ensuring the integrity of these virtual entities becomes paramount. This paper introduces SAVE (Securing Avatars in Virtual Environments), an emerging framework that leverages environmental fingerprinting based on Electric Network Frequency (ENF) signals to authenticate avatars and detect potential deepfake attacks in virtual healthcare settings. Unlike conventional authentication methods that rely solely on digital credentials, SAVE anchors virtual entities to the physical world by utilizing the unique temporal and spatial characteristics of ENF signals. We implement and evaluate SAVE in a Microverse-based nursing home environment designed for monitoring elderly individuals living alone. We evaluated SAVE using a prototype system with Raspberry Pi devices and multiple environmental sensors, demonstrating effectiveness across three attack scenarios in a 30-minute experimental window. Through the experimental evaluation of three distinct attack scenarios, unauthorized device attacks, device ID spoofing, and replay attacks using intercepted data, our system demonstrates high detection accuracy with minimal false positives. Results show that by comparing ENF fingerprints embedded in transmitted data with reference ENF signals, SAVE can effectively identify tampering and ensure the authenticity of avatar updates in real time. The SAVE approach enhances the security of virtual healthcare monitoring without requiring additional user intervention, making it particularly suitable for elderly care applications where ease of use is essential. Our findings highlight the potential of physical environmental fingerprints as a robust security layer for virtual healthcare systems, contributing to safer and more trustworthy remote monitoring solutions for vulnerable populations.

1. Introduction

The emergence of the Metaverse as a virtual extension of our physical world has transformed various sectors, with healthcare experiencing particularly significant impacts [1,2]. Virtual healthcare environments now offer unprecedented opportunities for remote patient monitoring, telemedicine, and collaborative medical services [3]. For elderly populations—a demographic expected to comprise more than 22% of the global population by 2050 [4,5]—these technologies address critical challenges in accessibility and continuous monitoring in healthcare [6]. According to recent statistics, nearly 40% of seniors in the United States live alone, creating an urgent need for innovative safety monitoring solutions [7].
Virtual healthcare environments rely on avatars and digital twins (DT), which are virtual representations of patients and physical objects, to facilitate remote monitoring and interactions [8,9]. These digital entities serve as the interface between healthcare providers and patients, allowing real-time assessment of health status, adherence to medications, and safety conditions [10]. In the context of elder care, DTs can detect falls, monitor vital signs, and alert caregivers to potential emergencies without requiring physical presence [11].
However, the growing sophistication of Deepfake technologies poses significant security threats to these virtual healthcare systems [12,13]. Malicious actors can potentially create fraudulent avatars or manipulate existing ones to misrepresent patient conditions, leading to misdiagnosis, delayed interventions, or inappropriate medical decisions [14]. The data manipulation vulnerability is particularly concerning in elder care, where patients may have limited technological ability to identify or report suspicious activities [15]. Traditional authentication methods, including passwords, biometrics, and token-based approaches, are increasingly inadequate against advanced Deepfake attacks [16]. These conventional security measures operate entirely within the digital domain, lacking a verifiable connection to the physical world they claim to represent [17]. The digital-to-physical disconnect creates a fundamental security vulnerability in which digital representations can be manipulated without corresponding changes in physical reality [18].
To address this critical digital-to-physical gap, we propose SAVE (Securing Avatars in Virtual Environments), an emerging framework that leverages physical environmental fingerprints to authenticate avatars and detect Deepfake attacks in virtual healthcare settings [19]. Our approach utilizes electric network frequency (ENF) signals, which are subtle fluctuations in the frequency of the power grid and are location-specific and time-variant, to establish a verifiable link between virtual avatars and their physical counterparts [20].
ENF signals have previously shown effectiveness in digital forensics [21], media authentication [22], and geolocation verification [23]. These signals possess several advantageous properties for security applications: ubiquitous in environments with electrical infrastructure, difficult to predict or replicate without physical presence, and naturally synchronized between geographical regions connected to the same power grid [24]. By embedding ENF fingerprints into the data used to update avatars, SAVE creates an authentication mechanism that is inherently tied to physical reality.
The primary contributions of this paper include the following:
  • Authentication Framework: We introduce SAVE, a comprehensive framework for securing avatars in virtual healthcare environments using environmental fingerprinting based on ENF signals.
  • Implementation in Elder Care: We demonstrate the practical application of SAVE in a lightweight Metaverse-based nursing home designed to monitor elderly people living alone, showcasing its relevance to critical healthcare applications.
  • Security Evaluation: We evaluate SAVE against multiple attack scenarios, including unauthorized device access, device ID spoofing, and replay attacks, providing empirical evidence of its effectiveness in detecting Deepfake attempts.
  • Usability Considerations: We address the unique requirements of elder care applications, ensuring that security enhancements do not introduce additional complexity for elderly users or healthcare providers.
Although previous research has explored various aspects of Metaverse security [25], avatar authentication [26], and DT healthcare applications [27], SAVE represents the first comprehensive framework that specifically leverages physical environmental fingerprints to secure virtual healthcare representations.
The remainder of this paper is organized as follows. Section 2 reviews related work in Metaverse security, ENF-based authentication, and DTs in healthcare. Section 3 details the design and architecture of the SAVE framework. Section 4 describes our implementation in a virtual elder care environment. Section 5 presents our experimental evaluation and results. Section 6 discusses implications, limitations, and future directions, and Section 7 concludes the paper.

2. Background and Related Works

2.1. Metaverse Security and Authentication

The increasing adoption of the Metaverse in e-Healthcare has introduced novel challenges related to the security and authenticity of virtual entities. The Metaverse represents a convergence of physical and virtual realities, creating immersive environments in which users interact through digital avatars [2,28]. While offering unprecedented opportunities for remote collaboration and services, these virtual worlds introduce complex security challenges. A comprehensive survey of Metaverse security identifies authentication of virtual entities as a critical concern, particularly as the boundaries between physical and digital identities become increasingly blurred [13].
Current authentication schemes for Metaverse environments mainly rely on traditional approaches adapted to virtual contexts. A three-factor authentication scheme was proposed based on elliptic curve cryptography (ECC) that improves security while maintaining lower computational overhead compared to alternative approaches [16]. Moreover, a chameleon signature-based framework has been suggested that connects users’ real identities with their virtual avatars [18]. Although innovative, the chameleon approach necessitates periodic verification checks, which increase computational demands.
Biometric authentication has emerged as a promising direction for securing avatars. Fuzzy logic is combined with biometric data to create unique signatures for authentication [15], which captures hand tremor patterns using convolutional neural networks (CNN) to generate distinctive biometric identifiers. Although CNNs possess these advances, current authentication methods remain vulnerable to AI-driven deepfake attacks, which can synthesize biometric data or mimic authorized behavior patterns [3].

2.2. ENF Signals in Security Applications

ENF signals refer to slight fluctuations in power grid frequency around nominal values (60 Hz in North America, 50 Hz in Europe and Asia) [20]. These fluctuations result from the continuous balance of power supply and demand throughout the electrical grid and create unique, time-variant signatures that are consistent between locations connected to the same power grid [24]. ENF signals have gained attention in security applications due to their distinctive properties. As demonstrated by earlier researchers [20], ENF signals are
  • Ubiquitous in environments with electrical infrastructure;
  • Difficult to predict or artificially replicate;
  • Temporally unique, creating time-specific signatures;
  • Regionally consistent across connected power grids.
ENF signals recorded simultaneously from locations 180 miles apart show nearly identical fluctuation patterns, highlighting their potential for authentication applications [24]. Researchers have applied ENF signals in various security domains, such as digital multimedia forensics [21], where ENF signals verify the time and location of recordings, and smart grid infrastructure security [29], where ENF signals are adopted to authenticate the sensing data to secure the critical infrastructure. ENF signals have also been used to detect malicious frame injection attacks in surveillance systems, demonstrating high accuracy in the identification of manipulated video content [22]. Furthermore, researchers explored ENF signals as entropy generators in distributed systems, establishing their utility for security applications beyond forensics [23].
Despite these advantages, ENF-based authentication faces limitations, particularly in environments without reliable access to power grid signals. This constraint requires complementary approaches when implementing security in diverse settings [22].

2.3. Digital Twins in Healthcare

DTs, virtual representations of physical entities that mirror their characteristics, behaviors, and states, have emerged as powerful tools in healthcare applications [9]. By integrating data from multiple sources, including remote and wearable sensors, these virtual models enable real-time monitoring, simulation, and analysis of patients’ conditions [10]. The application of DTs in healthcare spans numerous domains. The fundamental aspects of DTs are described for simulation, highlighting their potential for personalized medicine [9]. A review of recent developments in DT in healthcare identified chronic disease monitoring as a primary application area [10]. For elderly care specifically, DTs have been shown to enable precision and personalized dementia care through continuous monitoring and predictive analytics [11].
Specialized applications include a semi-active DT model for the evaluation of carotid stenosis [27], which combines computational mechanics with computer vision to assess severity based on head vibrations. Similarly, DT models are developed to assess intracranial aneurysms, allowing the monitoring of potentially dangerous conditions through virtual simulations [30].
For elderly patients, DTs offer particular benefits in the management of chronic conditions that require continuous monitoring [31]. By creating virtual representations based on physiological data from wearable devices, healthcare platforms can provide timely analysis and alerts to potential health problems [11,32]. A virtual biometric capability is especially valuable for seniors living alone, who represent a significant proportion of the elderly population in developed countries [7].

2.4. Elder Care Monitoring Systems

The growing elderly population presents unique healthcare challenges, particularly for those living independently. According to the US Census Bureau [7], nearly 40% of seniors live alone, creating significant demand for remote monitoring solutions. These individuals face increased risks of accidents, delayed medical interventions, and complications from chronic diseases [33].
Current monitoring approaches range from simple emergency alert systems to sophisticated IoT-based platforms. Sun and Chen [32] developed a lightweight human action recognition system for real-time elderly monitoring, focusing on fall detection and activity classification. Their approach demonstrates the feasibility of continuous monitoring while respecting privacy concerns. Virtual environments extend these capabilities by creating immersive spaces where healthcare providers can visualize and interact with patient digital representations. Considering technical and resource constraints for a comprehensive full-scale mirror of the physical space, researchers introduced the Microverse concept, a task-oriented edge-scale Metaverse specifically designed for applications such as elderly monitoring [26]. The Microverse framework provides a virtual environment where avatars represent seniors’ real-time status based on sensor data, enabling healthcare providers to remotely monitor multiple patients.
Although these technologies offer remarkable capabilities for elder care, they also introduce significant security vulnerabilities. The authenticity of virtual representations is critical, particularly in healthcare settings, where decisions affecting physical well-being rely on virtual information [13]. Traditional authentication methods may be insufficient against sophisticated attacks, highlighting the need for novel approaches that bridge physical and virtual security [17].

2.5. Research Gap

Continuous authentication [34] is a well-established field in cybersecurity. Traditional continuous authentication systems primarily rely on behavioral biometrics, physiological signals, or context-aware data to periodically or constantly verify a user’s identity after the initial login [35,36].
  • Behavioral Biometrics: These systems monitor patterns like keystroke dynamics, mouse movements, gait, or touchscreen interactions. While effective for detecting user anomalies, these data streams are increasingly susceptible to generative AI models that can mimic legitimate user behavior.
  • Physiological Biometrics: This approach uses signals from wearable devices, such as electrocardiography (ECG) or photoplethysmography (PPG), to create a continuous and unique physiological signature. This is a strong method, but it is vulnerable to sophisticated attacks that can synthesize or replay biometric data, as noted in recent security analyses. It also places the burden on the user to consistently wear a specific monitoring device.
  • Context-Aware Authentication: These methods use environmental cues like GPS location, IP address, or connected Wi-Fi networks to verify the user’s context. However, these digital context markers are often easy to spoof (e.g., via VPNs or GPS spoofing tools) and fail to validate the integrity of the physical environment at a granular level.
The SAVE framework introduces a fundamentally different approach: continuous environmental authentication. Instead of authenticating the user’s identity through their behavior or biology, SAVE authenticates the data’s origin by anchoring it to the physical environment’s unique, time-varying properties. A systematic comparison is presented in the table below.
As illustrated by Table 1, the challenge is not the absence of continuous authentication methods in general, but rather the lack of a solution that meets the specific needs of virtual healthcare monitoring systems for vulnerable populations. The precise gap is the need for a passive, non-intrusive, and deepfake-resistant continuous authentication mechanism that validates the spatio-temporal integrity of sensor data streams used to update digital twins and avatars.
In this work, we introduce the SAVE scheme to address this research gap by performing the following:
  • Authenticating the Environment, Not the User: By using ENF signals, SAVE verifies that the data originates from the correct physical location at the correct time. This is a critical distinction, as an attacker who has compromised a device’s keys and can even synthesize a user’s biometrics cannot remotely forge the real-time ENF signal of the patient’s home.
  • Ensuring Passivity and Usability: The system operates in the background without requiring any action from the elderly user, making it uniquely suited for elder care applications where ease of use is essential.
  • Providing Inherent Replay Attack Resistance: Because the ENF signal is time-variant, data packets from a previous session, even if legitimately captured, will have an ENF fingerprint that does not match the server’s real-time reference signal, rendering replay attacks ineffective.
Therefore, SAVE’s contribution is not in inventing continuous authentication, but in proposing a new paradigm for it, namely environmental fingerprinting, which is uniquely robust against the emerging threat of deepfake data injection in the context of virtual healthcare.

3. SAVE: System Design and Architecture

Figure 1 illustrates the high-level layered architecture of the SAVE framework, which consists of four interconnected layers designed to protect avatars in virtual healthcare settings. The SAVE framework follows a bottom-up approach, with information flowing from the physical world to its virtual representation. At the foundation lies the Physical Layer, where data is collected from the elderly user’s environment through various sensors and ENF signal monitoring devices. This data then moves upward to the Data Processing Layer, where it is aggregated, analyzed, and transformed into secure, verifiable fingerprints. The Security Layer forms the crucial verification barrier, authenticating devices, validating ENF fingerprints, detecting tampering attempts, and triggering alerts when necessary. Finally, at the top lies the Virtual Layer (Microverse), where authenticated information manifests itself as trusted and secure avatar representations within the virtual healthcare environment. This multi-layered architecture ensures that virtual representations of elderly users remain faithful to physical reality, protected against deepfake attacks and manipulation.

3.1. System Overview

Based on the rationale for the design shown in Figure 1, a more detailed virtual health system is proposed and illustrated in Figure 2, which combines SAVE with the Microverse instance to provide robust monitoring for elderly care. To protect the digital twinning process and detect Deepfake-style forgeries, the proposed system employs an ENF-based digital fingerprinting technique. ENF signals are subtle fluctuations in the frequency of the power grid that are inherently time-dependent and location-specific. These unique characteristics make ENF signals extremely difficult to fabricate or reproduce artificially. Figure 2 depicts the Physical World layer, where sensor-equipped devices continuously monitor these ambient ENF traces, either through the pickup of electrical signals or through audio components susceptible to electromagnetic interference [37].
From these ENF readings, a distinctive digital fingerprint is generated that encapsulates both temporal and spatial signal attributes. This fingerprint is then encrypted using a unique device identifier (ID), creating a secure binding between the data, the user’s physical location, and the exact time of capture. This encryption process, shown in the bottom-left Encryption block of the diagram, ensures that only the originating device or a verified party can decrypt and authenticate the data.
Upon transmission to the Microverse Server, the fingerprint is decrypted using the device ID or an associated cryptographic key. During the same time, the server records its own ENF signal as a reference. The decrypted user fingerprint is then compared with the server-side ENF trace. Because ENF signals are inherently tamper-evident, any modification, spoofing, or replay attack will lead to discrepancies between the two traces. If such inconsistencies are detected, the data is flagged as potentially manipulated or untrustworthy.
This identity-based encryption (IBE) approach can integrate various cryptographic schemes, including RSA (Rivest–Shamir–Adleman), Digital Signature Algorithm (DSA), or Elliptic Curve Cryptography (ECC), depending on system requirements [38]. In resource-constrained environments, such as edge devices used for virtual healthcare, ECC is particularly advantageous due to its shorter key lengths and lower computational overhead [16,39,40]. ECC operates on a set of points that meet the equation of the elliptic curve y 2 = x 3 + a x + b , where a and b are constants. These points, together with a special point at infinity, form a cryptographic group used for secure key exchange and identity verification.

3.2. ENF-Based Environmental Fingerprinting

The exponential growth of interconnected sensor networks within intelligent environments, such as smart homes, eldercare systems, and ambient assisted living platforms, has introduced new challenges in ensuring secure and efficient data authentication. Conventional cryptographic schemes, while effective, often impose significant computational and energy burdens that are unsuitable for resource-constrained edge devices. To address efficiency, we incorporate ENF signatures as an environmental authentication mechanism, providing a lightweight, context-aware method to verify data integrity and provenance.
ENF signals arise from subtle fluctuations in the frequency of the electrical power grid. These fluctuations are inherently time-varying and geographically localized, offering unique signatures that are difficult to forge or replicate. Previous studies have demonstrated the feasibility of using ENF traces as environmental fingerprints embedded in multimedia recordings or acquired directly through electromagnetic interference [41]. In the SAVE framework, this principle is extended to a wide range of sensors, including audio, video, and physiological sensors, used in senior safety and health monitoring systems.
The ENF trace is either passively embedded within captured multimedia data or explicitly recorded using dedicated ENF capture sensors. These redundant ENF channels not only enhance resilience against device failures but also support cross-validation across distributed sensing nodes. By associating ENF traces with time and location, the system inherently binds each data sample to its spatio-temporal context, enabling robust environmental authentication.
To perform ENF-based verification, we implement a signal estimation module using short-time Fourier transform (STFT) for frequency domain analysis and correlation coefficient matching to assess temporal consistency between signal segments [22]. These lightweight signal processing techniques allow real-time comparison of ENF traces recorded from multiple independent sources. If the correlation between the server-side and device-side ENF traces falls below a predefined threshold, the data is flagged as suspicious or potentially manipulated.
While ENF signals are technically accessible to external actors, their effectiveness as an authentication tool is greatly strengthened when coupled with unique device IDs. This hybrid approach establishes a two-factor verification scheme: the environmental ENF signal and a device-specific cryptographic ID. Even if adversaries gain access to one component, the absence of the other, either the correct environmental signal or the authenticated device identity, renders spoofing attempts ineffective. This dual-authentication method significantly increases resistance to remote tampering, replay attacks, and sensor impersonation in decentralized monitoring environments. Together, the integration of ENF fingerprinting and device-level IDs forms a scalable, low-overhead authentication strategy suitable for edge-enabled health monitoring and smart community deployments.

3.3. Secure Authentication Framework

3.3.1. Elliptic Curve Cryptography (ECC)

Elliptic Curve Cryptography (ECC) is a highly efficient member of the public-key cryptography family, renowned for offering strong security with significantly smaller key sizes compared to traditional schemes such as RSA and DSA. The ECC is based on the algebraic structure of elliptic curves over finite fields, where the security is based on the computational intractability of the Discrete Logarithm Problem of Elliptic Curves (ECDLP) [42]. Due to its lower computational overhead, ECC has emerged as an ideal cryptographic solution for resource-constrained environments, including edge computing and Internet of Medical Things (IoMT) infrastructures commonly deployed in virtual health monitoring systems [16,39,40].
Unlike RSA, which requires key sizes of 2048 bits or more to achieve robust security, ECC can deliver equivalent levels of protection using keys as small as 256 bits. This substantial reduction in key length leads to reduced processing time, memory usage, and power consumption, critical advantages for edge devices such as wearable sensors, mobile health monitors, and smart gateways, where energy and computational resources are inherently limited. In these environments, efficient cryptographic operations are essential for real-time data protection and secure communication between distributed healthcare networks.
The core of ECC lies in the use of elliptic curves, which are sets of points that satisfy a specific mathematical equation, typically expressed as follows: y 2 = x 3 + a x + b , where a and b are real or integer coefficients that define the shape of the curve. The points that satisfy this equation, along with a distinguished element known as the point at infinity, form a finite abelian group under a well-defined addition operation. This group structure enables cryptographic operations such as key generation, digital signatures, and encryption. Figure 3 illustrates a typical elliptic curve of the form y 2 = x 3 2 x + 4 b , demonstrating the geometric interpretation of the underlying algebra.
In the context of virtual healthcare systems, ECC can be seamlessly integrated into secure communication protocols and authentication frameworks, ensuring data integrity and confidentiality without overwhelming the computational limits of edge devices. Its adaptability to constrained environments makes ECC a promising foundational component for next-generation secure telehealth infrastructures.

3.3.2. ECDH-Based Key Exchange Scheme

Elliptic Curve Diffie–Hellman (ECDH) is an efficient and secure key exchange protocol derived from the classical Diffie–Hellman Key Exchange (DHKE) scheme [43]. While traditional DHKE relies on modular exponentiation over large prime fields, ECDH replaces this operation with elliptic curve point multiplication, significantly reducing computational complexity while maintaining equivalent cryptographic strength.
In an ECDH protocol, both the data sink (e.g., an edge device or client) and the server independently generate their own private keys, denoted by d and s, respectively. These private keys are used to compute the corresponding public keys by multiplying them by a predefined generator point G on the elliptic curve. The security of the scheme is grounded in the mathematical property of elliptic curve point multiplication, which ensures that the following equality holds:
( d · G ) · s = ( s · G ) · d
This equivalence property allows both communicating parties to independently compute a shared secret key without directly transmitting it over the communication channel. The shared key can then be used to encrypt and decrypt messages using a symmetric encryption algorithm.
The ECDH key exchange process is illustrated in Figure 4 and summarized as follows:
  • The data sink generates the private key d based on the device identifier using the Key Derivation Function (KDF) and computes its public key: dataPubKey = d · G .
  • The server generates a random private key s and computes its public key: serverPubKey = s · G .
  • The data sink and the server exchange their public keys.
  • The data sink computes the shared key: sharedKey = serverPubKey · d .
  • The server computes the shared key: sharedKey = dataPubKey · s .
  • Both parties now possess the same shared secret key for symmetric encryption and decryption.
This protocol ensures that even if an adversary intercepts the public keys during transmission, the shared secret remains secure due to the computational hardness of the ECDLP. Consequently, ECDH is particularly well suited for bandwidth- and power-constrained environments such as IoMT and edge-based healthcare systems.

3.4. Threat Model and Security Properties

To clarify the security guarantees of the SAVE framework, this section provides a formal threat model and an analysis of the cryptographic properties that ensure its long-term robustness.

3.4.1. Threat Model

We define our threat model by specifying the adversary’s goals and capabilities, assuming the adversary ( A ) is rational and will leverage any available vulnerability to achieve their objective.
The primary goal of the adversary is to compromise the integrity and authenticity of a patient’s virtual representation (avatar) in the Microverse. By successfully injecting false or manipulated data, the adversary seeks to create a discrepancy between the patient’s actual physical state and their digital twins, which could lead to severe consequences like misdiagnosis, improper medical interventions, or delayed emergency responses.
We assume a capable adversary can perform the following:
  • Intercept and Analyze Traffic: Eavesdrop on all communication between the data sink devices ( D ) and the Microverse Server (S).
  • Modify, Replay, and Inject Messages: Arbitrarily alter, drop, delay, or replay previously captured messages. The adversary can also inject newly created messages into the network. This capability is assessed by our evaluation of replay attacks.
  • Compromise Edge Devices: In the most severe case, the adversary may compromise a data sink device D i to gain access to its cryptographic keys, including its unique identifier I D i and the derived private key d i . Our framework is designed to detect attacks even under this condition.
  • Generate Deepfake Data: The adversary can use sophisticated AI techniques to generate synthetic sensor data ( m sensor ) that appears legitimate, such as faking a normal heart rate to hide a medical emergency.
The central security assumption of the SAVE framework is based on a physical constraint: An adversary operating remotely cannot generate or predict the real-time, spatio-temporally unique ENF signal of the target’s physical location without introducing detectable artifacts such as latency or phase inconsistencies. Because ENF fluctuations are synchronized across a power grid and are difficult to replicate without physical presence, a remote adversary cannot generate a data packet with an ENF fingerprint that will correlate with the server’s independently measured reference signal in real-time. This limitation holds even if the adversary has full knowledge of the cryptographic keys.
We acknowledge that a more advanced threat involves an attacker who is co-located on the same power grid and can perform live ENF mirroring—capturing the real-time ENF signal and injecting it into a forged data stream with minimal latency. While our current model effectively counters remote and non-temporally aligned replay attacks, we consider this specific low-latency mirroring scenario an advanced attack vector that is further discussed as a limitation and a direction for future work in Section 6.2.

3.4.2. Cryptographic Properties for Long-Term Robustness

The SAVE framework combines cryptographic primitives with environmental fingerprinting to provide a multi-layered defense. The chosen primitives ensure the following properties for robust, long-term security:
  • Confidentiality: The privacy of sensitive patient data during transmission is ensured by symmetric encryption (e.g., AES). The ECDH protocol establishes a unique session key for each communication, meaning an adversary who intercepts the ciphertext cannot access the underlying health data without compromising the session key.
  • Authenticity and Integrity: SAVE ensures authenticity at two levels:
    • Device Authenticity: The use of an ECDH key exchange, where the device’s private key is derived from its unique ID, cryptographically authenticates the source of the data. Only the legitimate device can compute the correct shared secret to create a valid ciphertext that the server can decrypt.
    • Spatio-Temporal Authenticity: This is the core innovation of SAVE. The ENF fingerprint serves as a physical-world anchor, verifying that the data was generated not only by the correct device but also at the correct physical location and time. This property is critical for defeating deepfake and replay attacks, as forged data will lack the correct, time-synchronized ENF signature.
  • Forward Secrecy: The protocol is designed to provide forward secrecy. By having the server generate a random, ephemeral private key s for each session, the compromise of a device’s long-term private key d i at some point in the future will not compromise the confidentiality of past communications. Each session is protected by a unique shared key that cannot be re-derived from the long-term keys alone.
  • Efficiency and Scalability: Long-term robustness also depends on practical feasibility. ECC was chosen specifically for its high security with much smaller key sizes and lower computational overhead compared to alternatives like RSA. This efficiency is critical for deployment on resource-constrained IoT devices used in healthcare. Our scalability evaluation confirms that the system maintains low end-to-end delay even as the number of devices increases, ensuring its long-term viability in expanding healthcare networks.

3.5. Formal System Model

In this work, we introduce a formal mathematical model. This model defines the system entities, cryptographic primitives, and the sequence of operations from data collection to avatar authentication, thereby systematizing the concept of environmental authentication discussed above.

3.5.1. System Entities and Components

Assume that our system consists of the following entities:
  • A set of Data Sink Devices D = { D 1 , D 2 , , D n } , where each D i is an edge device (e.g., Raspberry P i ) deployed in the elderly user’s environment. Each device D i is assigned a unique identifier I D i .
  • A central Microverse Server S, responsible for receiving data, performing verification, and updating the virtual environment.
  • An Adversary A , who may attempt to compromise the system by intercepting, modifying, or forging data packets.

3.5.2. Cryptographic and Environmental Primitives

The SAVE framework is built upon the following primitives:
  • Elliptic Curve Cryptography (ECC) Parameters: A public set of domain parameters for ECC, P E C C = ( p , a , b , G , n , h ) , defining the finite field F p , the curve equation y 2 = x 3 + a x + b , a base point G of prime order n, and a cofactor h. All point operations are performed in the additive group G of points on this curve.
  • Key Generation and Exchange:
    • Key Derivation Function (KDF): A function KDF : { 0 , 1 } * Z n * that maps a device identifier I D i to a private key d i .
    • Elliptic Curve Diffie-Hellman (ECDH): A protocol to establish a shared secret s k i , s G between a device D i and the server S.
  • Symmetric Encryption Scheme: A pair of algorithms ( E , D ) where
    • E s k ( M ) C : An encryption algorithm that takes a shared key s k and a message M to produce a ciphertext C.
    • D s k ( C ) M : A decryption algorithm that takes a shared key s k and a ciphertext C to produce the original message M.
  • Environmental Signal Processing:
    • ENF Signal: We denote the Electric Network Frequency signal captured over a time window [ t Δ t , t ] by a device j { D S } as ϵ j ( t ) .
    • Fingerprint Generation Function ( F Gen ): A function F Gen ( ϵ j ( t ) ) ϕ j ( t ) that extracts a unique feature vector, or fingerprint, ϕ j ( t ) , from the raw ENF signal. This function encapsulates techniques such as the Short-time Fourier Transform (STFT).
    • Correlation Function (Corr): A function Corr ( ϕ i ( t ) , ϕ s ( t ) ) ρ [ 1 , 1 ] that computes the similarity (e.g., Pearson correlation coefficient) between the fingerprint from device D i and the reference fingerprint from server S.

3.5.3. Framework Phases

The SAVE protocol operates in four distinct phases:
  • Phase 1: System Initialization and Key Generation
  • The Microverse Server S publishes the global ECC parameters P E C C .
  • Each device D i D generates its long-term private key d i from its unique identifier:
    d i = KDF ( I D i )
  • Each device D i computes its corresponding public key P i :
    P i = d i · G
    The pair ( d i , P i ) constitutes the device’s key pair. The public key P i is securely registered with the server S.
  • The server S generates its own long-term private and public keys, ( s , P s ) , where P s = s · G .
  • Phase 2: Data Aggregation and Environmental Fingerprinting (at Device D i )
At a discrete time t, device D i performs the following actions:
  • Collects Sensor Data: Acquires raw sensor data m sensor ( t ) from its attached sensors (e.g., camera, thermometer).
  • Captures ENF Signal: Records the local ENF signal ϵ i ( t ) over a predefined time window.
  • Generates ENF Fingerprint: Computes the environmental fingerprint ϕ i ( t ) :
    ϕ i ( t ) = F Gen ( ϵ i ( t ) )
  • Constructs Data Packet: Assembles a message packet M i ( t ) containing the sensor data, the ENF fingerprint, a timestamp, and its identifier:
    M i ( t ) = ( m sensor ( t ) | | ϕ i ( t ) | | t | | I D i )
    where | | denotes concatenation.
  • Phase 3: Secure Data Transmission (ECDH-based Encryption)
  • To transmit M i ( t ) securely, D i and S establish a session-specific shared secret key s k i , s using the ECDH protocol.
    • Device D i computes: s k i , s = d i · P s = d i · ( s · G )
    • Server S computes: s k i , s = s · P i = s · ( d i · G )
  • Device D i encrypts the message packet M i ( t ) using the shared key:
    C i ( t ) = E s k i , s ( M i ( t ) )
  • D i transmits the ciphertext C i ( t ) to the server S.
  • Phase 4: Server-Side Verification and Authentication
Upon receiving C i ( t ) from device D i at time t r x , the server S performs:
  • Decryption: It computes the same shared key s k i , s and decrypts the ciphertext to recover the message packet:
    M i ( t ) = D s k i , s ( C i ( t ) )
    This yields the components ( m sensor ( t ) | | ϕ i ( t ) | | t | | I D i ) . The server first validates that I D i matches the claimed sender identity.
  • Reference Fingerprint Generation: Concurrently, the server captures its own local ENF signal ϵ s ( t ) for the corresponding timestamp t and generates a reference fingerprint:
    ϕ s ( t ) = F Gen ( ϵ s ( t ) )
  • Environmental Authentication: The server computes the correlation between the received fingerprint and its reference fingerprint:
    ρ = Corr ( ϕ i ( t ) , ϕ s ( t ) )
  • Decision Logic: A verification function V ( ρ , τ ) determines the authenticity of the data based on a predefined correlation threshold τ :
    V ( ρ , τ ) = ACCEPT if ρ τ REJECT if ρ < τ
  • State Update:
    • If V ( ρ , τ ) = ACCEPT , the data m sensor ( t ) is deemed authentic. The server uses it to update the corresponding avatar’s state in the Microverse.
    • If V ( ρ , τ ) = REJECT , the data is flagged as suspicious. The server discards the data and triggers an alert mechanism as described in Section 4.3. This outcome indicates a potential deepfake, replay, or man-in-the-middle attack.
This formalization establishes that the security of SAVE relies not only on the computational difficulty of the ECDLP but also on the physical constraint that an adversary A cannot forge or predict the spatio-temporally unique ENF signal in real time without being physically present in the same power grid. This anchors the digital authentication process to a verifiable physical reality.

4. Implementation in Virtual Elder Care

To evaluate the effectiveness and demonstrate the practical feasibility of the proposed SAVE scheme, we present a detailed case study set within the context of a real-time patient monitoring system. The SAVE prototype is deployed in a virtual nursing home environment constructed using the Microverse platform, which provides a highly interactive and immersive DT framework. By simulating realistic healthcare scenarios, the case study allows us to assess the performance of the SAVE scheme in terms of security, responsiveness, and scalability of the system under dynamic and heterogeneous IoT conditions commonly encountered in smart healthcare infrastructures.

4.1. Microverse-Based Nursing Home Environment

The right portion of Figure 2 presents the layered architectural design of a Microverse-based virtual health monitoring system, inspired by the concept of the small-scale Metaverse [26]. The SAVE architecture supports real-time, immersive patient monitoring within a smart senior care community by integrating physical sensing, virtual representation, and intelligent analysis.
In the physical layer, the system reflects the actual living conditions of elderly residents in smart homes or institutional care settings. Each physical unit, whether an apartment, a private room, or a nursing home suite, is equipped with a variety of sensors, including smart cameras for skeletal imaging, motion detectors, and inertial measurement units. These devices continuously collect health-relevant data from the environment and the residents themselves.
This physical space is mirrored in the Microverse layer, where a DT of both the resident and their environment is instantiated in real time. Each resident’s unit is mapped to a dedicated Microverse instance, providing a one-to-one correspondence between physical and virtual domains. Through this virtual replication, real-time monitoring and behavioral tracking are achieved, allowing for continuous and remote observation of the individual’s well-being. Within each instance, a Distributed Intelligent Health Monitoring (DIHM) framework is deployed to handle on-site data processing, anomaly detection, and rapid response generation. The localized intelligence enables timely interventions without relying solely on cloud-based infrastructure.
In terms of system integration, the Microverse architecture aligns with the edge–fog–cloud computing paradigm [44]. Microverse instances operate primarily at the edge and fog layers, where computational proximity ensures low-latency responsiveness and efficient resource utilization for real-time healthcare services. As a natural extension, multiple Microverse instances can be federated into a broader Metaverse layer operating in the cloud. This higher-level integration opens opportunities for more sophisticated tasks such as advanced diagnostic analytics, long-term health trend modeling, and coordinated healthcare resource allocation across communities. However, the current paper focuses exclusively on the functionalities and capabilities of individual Microverse instances, with the community-level Metaverse vision left for future investigation.
To support immersive visualization and interaction, the Microverse environment is built using Unreal Engine 5 (UE5) [45], a high-fidelity 3D modeling engine capable of generating life-like digital replicas. Figure 5 shows that each resident’s living space is rendered with realistic furniture arrangements and layouts of the environment, while a personalized avatar is created to represent the individual within the virtual space. The avatar’s appearance and posture are continuously updated based on real-time sensor data, particularly skeletal information derived from the optic camera input. This dynamic avatar update mechanism ensures that visual cues, such as posture anomalies or fall detection, are intuitively communicated to caregivers and authorized agents via the system’s graphical user interface (GUI).
In addition, the GUI provides interactive monitoring features, including visual alerts, severity-based alarm levels, and status summaries, empowering caregivers with actionable insights. This tightly integrated virtual environment not only enhances situational awareness but also serves as a scalable foundation for intelligent, responsive eldercare in future smart communities.

4.2. Sensor Deployment

To enable real-time health monitoring within the Microverse-based nursing home environment, a heterogeneous set of sensors is strategically deployed in each residential unit to capture multi-modal data streams reflecting both the physical environment and the physiological conditions of the elderly resident. These sensors form the critical data acquisition layer that drives intelligent analytics, human activity recognition (HAR), and virtual representations within the Microverse system [46,47].

4.2.1. Hardware Configuration

The sensor network includes the following core components:
  • Motion Sensors: Passive Infrared (PIR) and ultrasonic motion sensors are installed at key locations (e.g., near beds, doors, and bathrooms) to detect movement patterns, presence, and activity levels. These are essential for behavioral profiling and fall detection.
  • Smart Cameras: Depth and RGB (red, green, and blue) cameras with embedded AI capabilities are deployed to perform real-time skeletal tracking, posture analysis, and anomaly detection. Cameras are installed at high vantage points to maximize coverage while preserving privacy through body-skeleton abstraction.
  • Thermometers: Non-contact infrared thermometers continuously measure ambient and body surface temperature. These sensors are placed in living quarters and integrated with bedside systems to monitor possible signs of fever or thermal stress.
  • Humidity Sensors: Capacitive humidity sensors are used to assess the level of moisture in the environment, ensuring that the conditions of the room remain within the medically recommended comfort thresholds for respiratory health.
All sensors are connected to a local edge computing unit, typically a single-board computer (e.g., NVIDIA Jetson Nano or Raspberry Pi 5), which performs initial data processing and facilitates communication with the Microverse engine via a secure local area network.

4.2.2. Data Collection Parameters

Each sensor type operates with a predefined sampling rate optimized for its function:
  • Motion Sensors: Sampled at 1–2 Hz, sufficient for capturing discrete activity events without excessive data redundancy.
  • Smart Cameras: Operate at 15–30 frames per second (fps), allowing smooth and accurate skeletal modeling and behavior inference.
  • Thermometers: Sampled every 0.1 s to capture gradual temperature fluctuations while saving energy.
  • Humidity Sensors: Sampled every 1–2 min, as the environmental humidity changes slowly over time.
To reduce bandwidth and computational overhead, an adaptive data fusion mechanism is implemented at the edge node. Motion events are stored as timestamped activity logs. At the same time, camera frames are processed to extract skeleton keypoints, and only summary vectors (e.g., joint angles, posture scores) are sent to the virtual environment. Temperature and humidity readings are averaged over sliding windows (e.g., 5 min intervals) unless anomalies are detected, in which case raw data are retained and transmitted.
Data transmission is managed via a lightweight and secure MQTT (Message Queuing Telemetry Transport) protocol for scalable communication between edge nodes and the Microverse platform. Real-time and critical alerts (e.g., fall detection, sudden fever spikes) are prioritized and transmitted immediately, while noncritical data are batched and sent periodically to reduce network load.
The combined sensing and transmission framework ensures a balance between continuous monitoring fidelity and system efficiency, enabling scalable deployment across multiple Microverse instances while preserving low latency and high reliability for time-sensitive healthcare scenarios.

4.3. Security Integration

In SAVE, the ENF signal is either directly extracted from a power line voltage via voltage sensors or indirectly captured using co-located audio/video devices susceptible to ENF-induced noise. The extracted ENF signature is embedded into the sensor data stream as timestamped frequency vectors. Each sensor node appends its local ENF sequence alongside its primary payload (such as motion activity, temperature readings, or skeletal data), creating a synchronized data structure that includes environmental fingerprints.
A reference ENF sequence is collected simultaneously on the server side as ground truth using a dedicated ENF monitoring device. After receiving and processing the data sequence, the server performs a correlation analysis between the embedded ENF sequence and the reference ENF signal using a sliding-window approach. Specifically, the Pearson correlation coefficient is calculated in 2 to 10 s windows to assess the similarity between the two sequences. A correlation value close to 1 indicates consistent and reliable data. However, significant drops in correlation (e.g., below 0.8) are treated as potential indicators of tampering, synchronization failure, or device compromise.
To manage ENF anomalies, we design a multi-level alert scheme. A Level 1 alert is issued when the correlation dips moderately (e.g., 0.8 to 0.85) in isolated instances, flagging the data for logging without halting operations. Level 2 alerts are triggered by repeated or sustained correlation drops below 0.8, prompting the system to quarantine the affected data and initiate cross-checks from redundant sensor streams. Finally, a Level 3 alert represents a critical event where the correlation falls below 0.6, indicating a high probability of forgery or injection attacks. In this case, immediate notifications are sent to caregivers and system administrators, and automatic recovery actions are executed, such as restarting the edge node or switching to a backup instance.

5. Experimental Evaluation

5.1. Experimental Setup

To evaluate the feasibility of the proposed SAVE framework, we developed a proof-of-concept prototype system and conducted experiments within a controlled Microverse environment. The prototype was implemented primarily using Python 3.12.3 and C++ 20, and deployed over a physical local area network (LAN) to simulate realistic conditions. The experimental testbed, summarized in Table 2, consists of a laptop (Alienware m15), a Raspberry Pi 5 (RPi 5) labeled RPi A, a webcam, and multiple environmental and biometric sensors. Additionally, seven more RPi5s, labeled as B to H, are also configured with the same software environment for further evaluation of scalability.
The laptop, located on a different floor of the building, functions as the Microverse server. It maintains the virtual environment and synchronizes avatar states in real time using biometric data streams, as illustrated in Figure 5. The Rpi A is equipped with a smartwatch, a Logi webcam, and additional sensors, and operates as a data collection and transmission node. Each device, including the RPi A, is registered with a unique identifier on the Microverse server. Simultaneous acquisition of ENF signals is performed on each RPi 5 and laptop to enable temporal correlation and authentication.

5.2. Attack Scenarios

To validate the SAVE framework under adversarial conditions, we simulated three distinct attack scenarios using the collected ENF signals. Each scenario was repeated for ten experimental epochs, each epoch lasting 30 min. Attacks were triggered at randomly selected time points within each epoch to ensure variability and robustness in the evaluation. The three types of attacks are the following:
  • An attacker tries to feed fake data but has no information about the device ID (private keys) nor the elliptic curve;
  • An attacker obtained all information about encryption/decryption and intercepts the channel with deepfake data, but is unaware of or does not have sufficient/correct information about the current ENF signals;
  • An attacker obtained all information about encryption/decryption from both agents and tampered with the user’s behavior description data using intercepted data packets from earlier communication.

5.3. Data Profile and Validation

The experimental evaluation was conducted using data collected from eight Raspberry Pi 5 devices over multiple 30 min epochs, generating a comprehensive dataset for authentication analysis. The primary dataset comprises ENF signals sampled at 1 Hz, environmental sensor readings (temperature and humidity) sampled at 0.5 Hz, and webcam imagery captured at 30 frames per second (fps) for avatar synchronization. ENF signal characteristics show typical fluctuations within the expected range for the North American power grid. The collected ENF data exhibited a mean frequency of 60.001 Hz with a standard deviation of 0.018 Hz, staying within the normal operational range of ±0.02 Hz from the nominal 60 Hz frequency. The experimental dataset encompasses 300 h of continuous monitoring data across all devices, with each attack scenario repeated for 10 epochs of 30 min each. This resulted in 50 h of attack scenario data and 250 h of baseline operational data, providing a robust foundation for statistical analysis.
Data validity was established through multiple validation mechanisms. Specifically, ENF signal accuracy was verified by cross-correlation analysis between simultaneously collected signals from different devices allocated at two cities (Binghamton, NY and Spring City, PA) that are 180 miles apart, in different states within the Eastern Power Grid Interconnect of the USA, achieving correlation coefficients exceeding 0.95 for authentic signals under normal conditions.

5.4. Analysis of Results

5.4.1. Attack Detection Effectiveness

In the first attack scenario, the absence of the correct cryptographic information prevents the adversary from successfully decrypting the ciphertext, allowing the SAVE framework to easily identify and reject the tampered data stream. Without valid decryption, the received data are unintelligible or malformed, providing a clear indication of compromise.
In the second scenario, we demonstrate a more subtle tampering attempt using heart rate data as a representative sensor signal. The original raw data includes not only the heart rate sequence (in beats per minute), but also the ENF. However, an attacker unaware of the embedded ENF may assume the data contains only physiological readings and may generate a synthetic (deepfaked) heart rate sequence without replicating or inserting the correct ENF.
Figure 6 highlights the ENF as a case study, where the synthetic heart rate waveform exhibits frequency and amplitude characteristics that differ significantly from those of the original ENF signal. This discrepancy leads to detectable inconsistencies between the physiological data and the environmental context. Our analysis demonstrates that even advanced tampering techniques fail to replicate the nuanced correlation between real-world anchors and sensor data. When subjected to frequency domain analysis, these mismatches allow for reliable detection of falsified signals, underscoring the robustness of environmental fingerprint-based authentication.
In the third scenario, the attacker is fully aware of the presence of ENF signals used for authentication within the system. To bypass the defense, the attacker attempts a replay attack by injecting previously intercepted data packets into the communication channel. To counteract this, the SAVE framework utilizes ENF signals as authentication anchors, using their high sampling rate, temporal uniqueness, and geographic consistency.
Figure 7 illustrates the SAVE continuous authentication process based on timestamp-synchronized ENF signal comparisons. Figure 7 includes two complementary plots. The upper plot presents the raw ENF signals collected from two sources: the reference ENF (blue line), obtained on the server side, and the sensor-side ENF (green line), captured from the data sink device. Both signals are plotted as functions of time (in seconds), with frequency (Hz) on the vertical axis. The natural fluctuations in these waveforms reflect the time-varying characteristics that make the ENF a reliable environmental fingerprint. The regions highlighted between the red dashed vertical lines indicate the analysis windows where signal comparison is performed.
The lower plot quantifies the similarity of the signal using correlation coefficient analysis in multiple time windows. A correlation threshold of 0.8 is adopted based on our previous studies and associated false positive rates [22]. The green curve shows the correlation values over time, while the red dashed horizontal line denotes the authentication threshold. A significant drop below this threshold, such as the one observed around window 40, indicates a likely tampering event, where the injected data does not align with the real-time ENF signature. We also evaluate the authentication system by comparing the ROC curve under different ENF detection window sizes, as illustrated in Figure 8. All four window sizes produce curves that are well above the diagonal random-guess line, indicating strong discriminative power for detecting tampered ENF segments.
This experiment demonstrates that even in the presence of key compromise, replay attacks can be reliably detected. The attacker’s inability to regenerate authentic, temporally aligned ENF signals exposes the tampering, highlighting the robustness of SAVE to maintain continuous, real-time integrity verification through environmental fingerprinting.

5.4.2. Scalability Evaluation

To assess the scalability of the proposed IoT network architecture, we conducted an empirical evaluation of the end-to-end processing delay under varying device loads using the MQTT protocol [48]. The testbed consists of up to eight Raspberry Pi 5 (RPi5) nodes acting as the publishers and a centralized laptop server as the message “broker”. Each RPi5 encrypts sensor data using a symmetric-key Advanced Encryption Standard (AES) key derived from an ECDH key exchange with the server and transmits the encrypted payload via MQTT. We also performed RSA-1024 as the reference method to evaluate the performance of ECDH (secp256r1).
The end-to-end delay is decomposed into three components:
  • Encryption Time: The time required to perform encryption of the plain text sensor data on the RPi5;
  • Transmission Time: The time taken to transmit the encrypted message over the MQTT protocol from the RPi5 to the server;
  • Decryption Time: The time required to decipher the message received on the server.
To evaluate scalability, we incrementally increased the number of active RPi5 devices from two to eight and measured the average end-to-end delay across 100 messages per device. Each measurement captures the time interval from message creation and encryption in the RPi5 to successful decryption and parsing at the server. The results indicate a consistent increase in total processing time with the number of devices, primarily attributed to the cumulative transmission load and the concurrent message handling.
Figure 9 illustrates the relationship between the number of connected RPi5 devices and the average end-to-end delay. ECDH consistently outperforms RSA in terms of latency, with significantly lower delay values at each device count. Specifically, the average end-to-end delay for ECDH increases modestly from 15 ms to 28 ms as the number of devices grows from 2 to 8, reflecting a near-linear and scalable behavior. In contrast, RSA exhibits a steeper growth curve, with delays rising from 45 ms to 89 ms over the same range, indicating a higher computational overhead and poorer scalability. These results suggest that ECDH is more suitable for resource-constrained and latency-sensitive environments, offering more efficient key exchange without compromising responsiveness as device counts increase. The findings confirm ECDH as a lightweight and scalable alternative to RSA for secure communication in distributed IoT networks.

6. Discussions

6.1. Key Findings and Insights

This study demonstrates the feasibility and effectiveness of the SAVE framework for secure, real-time monitoring in smart healthcare environments, leveraging environmental fingerprinting via ENF signals. The integration of ENF-based authentication within the Microverse virtual nursing home platform offers several notable advantages, including enhanced data integrity verification, improved adversarial resilience, and increased operational scalability.
The results of the case study validate the robustness of ENF signal correlation as a lightweight yet effective authentication mechanism. Across simulated attack scenarios, the framework successfully identified data injection, replay, and deepfake attacks, even in the presence of key compromise. By embedding time-stamped ENF sequences into sensor data and performing continuous correlation analysis with a server-side reference signal, the SAVE system enables persistent and low-cost verification of data authenticity. The SAVE approach improves traditional cryptographic defenses by linking authentication to the spatiotemporal environmental context, which is inherently difficult for attackers to replicate.
Secondly, the real-time performance and low-latency characteristics of ECDH-AES-based communication confirm the practical applicability of the proposed system in dynamic IoT environments. Our evaluation of end-to-end delays under varying device counts showed that ECDH consistently achieves lower latency than RSA, scaling efficiently from two to eight RPi 5 nodes. The modest increase in delay (from 15 to 28 ms) under ECDH underscores its suitability for time-sensitive healthcare applications, where rapid data processing and responsiveness are crucial.
In addition, the use of a distributed edge–fog–cloud architecture via Microverse instances significantly reduces the reliance on centralized cloud services. By offloading data aggregation, anomaly detection, and initial ENF embedding to local edge nodes, the system achieves both scalability and resilience, supporting individualized monitoring while enabling community-wide integration in future Metaverse extensions.
The graphical interface, designed using Unreal Engine 5, also offers an intuitive and immersive visualization layer that bridges the physical and virtual realms. Through personalized avatars, skeletal tracking, and real-time alerts, caregivers can maintain situational awareness and respond quickly to anomalies without needing to intervene physically.

6.2. Limitations

Despite the promising results, several limitations and practical considerations must be acknowledged.
First, ENF-based authentication is inherently dependent on the availability and quality of environmental power line signals. The ENF’s fluctuations around these nominal values are influenced by the regional variations in the load of the grid, the balance between the generation and demand, and the characteristics of the infrastructure. This means that ENF patterns exhibit both global consistency (within a single interconnected grid) and local uniqueness (between grids or between regions). In border areas where two grids operate at the same nominal frequency but are loosely synchronized, ENF signals may overlap in characteristics, potentially reducing the precision of location. In certain wireless, outdoor, or off-grid environments, such as rural or mobile care units, the absence of stable sources of ENF may hinder the effectiveness of this method. Additionally, the quality of ENF signals captured through indirect means (e.g., via microphones or cameras) may vary due to ambient noise, sampling resolution, or hardware differences, which can potentially reduce correlation accuracy.
As for the ENF correlation threshold, we chose a specific value of 0.8, which is by no means optimal but empirically determined by means of previous research and false positive rates. However, we are aware that a single cutoff value may not be the best global choice since signal quality is location-dependent. To enhance the practical applicability and adaptability of the SAVE framework, this threshold can be automatically configured during an initial setup phase of the system. The system can be put into a learning mode (e.g., for a 24 h period) when installed to develop a baseline correlation profile, and the base profile would capture normal local (to that location) environmental fluctuations. Such an approach would enable the establishment of an adaptive threshold for such an individual, thereby enhancing the specificity of the multi-level alert scenario and reducing the risk of false alarms.
Although the computational overhead of ENF correlation is relatively low, the real-time processing requirement across multiple time windows can become burdensome in large-scale deployments with high sensor density [49]. Sliding-window correlation and anomaly detection, when performed continuously, can impose processing delays or increase power consumption on resource-constrained edge devices, particularly in configurations with multiple high-frame-rate smart cameras or biometric sensors.
The scalability of secure communication protocols such as MQTT combined with ECDH-AES encryption, while more efficient than RSA, still faces throughput and congestion challenges in networks with dozens or hundreds of devices. As the number of Microverse instances increases, message collision, broker saturation, and synchronization drift may introduce performance bottlenecks, especially in high-latency or lossy network environments.
Finally, our threat model primarily addresses remote adversaries and replay attacks using previously captured data. A more sophisticated threat, live ENF mirroring, remains a challenging scenario not covered in our experimental evaluation. In such an attack, an adversary co-located on the same power grid could theoretically capture the live ENF signal and inject it into a synthetic data stream with very low latency, potentially bypassing our current correlation-based verification. While we assume this is a non-trivial attack to mount in practice, its possibility constitutes a notable limitation.
Potential countermeasures, which we plan to explore in future work, could significantly harden the system against this vector. These include implementing server-side challenge-response protocols, where the server requests data from unpredictable or non-contiguous time windows. This would force a mirroring attacker to react, likely introducing measurable latency that could be detected. Another robust mitigation is adopting multi-modal environmental fingerprinting, fusing ENF signals with other difficult-to-mirror signals like fine-grained light fluctuations or acoustic signatures. An attacker capable of mirroring the ENF is unlikely to be able to simultaneously forge the unique, time-synchronized patterns of a secondary physical signal. Investigating these advanced defensive techniques is a critical next step toward ensuring robustness against the full spectrum of physical-layer attacks.

6.3. Ethical and Regulatory Concerns

ENF and other environmental fingerprints can implicitly reveal the geographic location of a patient. Even if patient names and medical data are anonymized, these data may allow adversaries (or even healthcare providers) to deduce approximate physical locations. This creates a risk of re-identification and location tracking, which could be particularly sensitive for high-risk patients, domestic abuse survivors, or those in conflict zones. In addition, environmental fingerprints datasets, if stored, could be misused for purposes beyond healthcare authentication, such as surveillance, profiling, or law enforcement inquiries. Strong governance policies must restrict secondary use without explicit consent from the patient. Moreover, regulatory frameworks require informed consent for the collection and processing of identifiable data. Although ENF and other environmental data are not a direct biometric identifier, their ability to infer location and verify real-world contexts means that they fall into a quasi-identifiable category [50]. Patients should be fully informed. A practical system should consider adopting data minimization techniques. For example, instead of storing the raw ENF signal on the server, the system could store only the correlation scores and alert logs. This would provide the necessary audit trail without retaining the location-rich ENF data itself, thus enhancing privacy.

6.4. Future Work

Although the proposed SAVE framework has demonstrated its effectiveness in real-time authentication and anomaly detection through ENF-based environmental fingerprinting, several promising avenues remain for future research and system enhancement.
First of all, a critical direction is the extension of environmental fingerprinting beyond ENF signals to incorporate other physical-layer phenomena as authentication anchors. For example, ambient light fluctuations, electromagnetic interference patterns, acoustic signatures, or temperature noise can serve as complementary modalities to enrich the environmental context. We are now exploring the potential of temperature and humidity as environmental fingerprints to build location-based authentication profiles, which exploit the distinctive microclimate patterns that are determined by the building structure, HVAC (Heating, Ventilation, and Air Conditioning) action plans, and occupant behaviors. As an example of a more discrete methodological proposal, in the context of multi-modal analysis, an initial protocol could go as follows:
  • Sensing and Sampling: Sense temperature and humidity with cheap digital sensors (e.g., DHT22) and sample them continuously at a low rate (e.g., 0.1–1 Hz). This rate is fast enough to capture the slow-moving dynamics of HVAC cycles and background thermal changes without adding too much data overhead.
  • Feature Extraction: From raw time-series data, extract discriminative features in 5–15 min sliding windows. High current order three features, such as short-time mean, variance, and spectral energy, were used to provide a consistent, but distinguishing model of the local environmental state at any time.
  • Authentication and Fusion: The extracted temperature and humidity feature vectors are compared with trusted baselines, specific to the location. This analog could be performed using techniques such as Pearson correlation or dynamic time warping (DTW) to adjust for small temporal differences. The decision to authenticate was made based on whether a similarity score exceeded a pre-set threshold. In a fusion strategy, an intuitive policy would enforce the validation of the primary ENF fingerprint and the second microclimate fingerprint (logic AND) to accept an authentication request, making the plot of an attacker to spoof multiple, independent environmental signals at the same time much more challenging.
By integrating multiple environmental signals in this manner, the system can achieve greater robustness and resilience, especially in scenarios where one modality (e.g., ENF) may be weak or unavailable.
In addition, the SAVE framework focuses primarily on continuous authentication and tamper detection at the sensor data level. Future efforts will explore tighter integration with other cybersecurity primitives, such as secure bootstrapping, blockchain-based audit trails, and federated identity management. For example, blockchain can be used to log the correlation scores of the ENF as proof of ENF (PoENF) [22] and to provide immutable support for anomaly alerts, thus improving forensic traceability and trust management in distributed healthcare settings. Additionally, integrating SAVE with hardware-level security modules, such as trusted platform modules (TPMs) or physical unclonable functions (PUFs), may further safeguard device identities and key material, reducing the attack surface.
Last but not least, although correlation analysis with fixed thresholds provides a lightweight and interpretable method to detect tampering, it may not fully capture the complexity of advanced attack patterns or subtle anomalies. Future work will incorporate machine learning (ML) techniques, such as time series classification, deep autoencoders, or graph-based anomaly detection, to model normal signal behavior and dynamically adapt to evolving threats. These ML models could learn contextual patterns in ENF or multimodal signals and offer probabilistic threat scoring, allowing more nuanced and adaptive alert mechanisms. Furthermore, edge-deployable learning models will be considered to support on-device intelligence without relying on centralized servers.

6.5. Theoretical and Practical Implications

Our study makes several contributions both theoretically and practically to the fields of cybersecurity and virtual environment authentication.

6.5.1. Theoretical Implications

SAVE proposes a formal model for authenticating the physical presence of virtual entities through environmental fingerprints. They authenticate based on physical characteristics in time and space, and they extend traditional paradigms of authentication to spatio-temporal authentication within a three-dimensional security model that incorporates authentication factors: knowledge factors, possession factors, and environmental factor presence. In addition, the ECDH-based encryption approach with environmental fingerprints is a novel hybrid approach that combines computational security with real-world evidence. This convergence demonstrates that security anchors can enhance traditional cryptography, complementing a verification layer that cannot be compromised in digital terms alone. We also suggested integrating ENF with complementary environmental readings (e.g., temperature and humidity). When multiple modalities are combined, the strength of environmental authentication increases non-linearly. We expect the combination of single sensors with ENF signals to achieve much higher detection accuracy, even in the presence of redundancy against single-point failure.

6.5.2. Practical Implications

SAVE tackles a critical impediment for Metaverse technology adoption in healthcare by ensuring strong security without adding additional user hassle for elderly patients. This outpatient approach enables healthcare professionals to leverage immersive monitoring technologies with advanced security safeguards. The low computational requirements (15–28 ms latency for ECDH processing) of environmental authentication demonstrate its feasibility for resource-constrained IoT devices used in healthcare installations. This scalability enables seamless integration with existing medical equipment, eliminating the need for costly hardware upgrades.
SAVE establishes a regulatory baseline for best practice in virtual healthcare security. The persistent authentication system generates audit logs of the environmental authentication process, which can be used to help ensure compliance with healthcare data protection legislation and support the monitoring of remote patient environments. The multilevel alert mechanism (levels 1–3 defined by correlation threshold) offers graduated responses to healthcare professionals according to decision-making pathways. This is a process-driven methodology to make security decisions appropriately with a reduced number of false alarms (and consequent annoyances that disrupt patient care).
The framework model enables the detection of advanced attacks with minimal computational requirements, thereby mitigating the need for a heavy, centralized security infrastructure. Healthcare institutions can leverage robust security on existing edge hardware to lower the adoption threshold for virtual healthcare. Methodological bases for environmental fingerprinting in virtual healthcare are being developed, with the potential to influence future policy, standards, and industry best practices regarding security for patient-provider interactions in a virtual space.

7. Conclusions

This paper introduces SAVE (Securing Avatars in Virtual Environments), an emerging framework that addresses critical security challenges in virtual healthcare environments through environmental fingerprinting based on Electric Network Frequency (ENF) signals. As Metaverse technologies expand in healthcare applications, particularly for vulnerable populations such as elderly individuals living alone, ensuring the authenticity and integrity of virtual representations becomes paramount for maintaining trust and safety. The SAVE framework demonstrates that physical environmental fingerprints can effectively bridge the gap between virtual and physical realities by leveraging the unique temporal and spatial characteristics of ENF signals combined with elliptic-curve cryptography. Our experimental evaluation in a Microverse-based nursing home environment validates the approach’s effectiveness across multiple attack scenarios, successfully detecting unauthorized access, device spoofing, and replay attacks with high accuracy and minimal false positives.
Although the current implementation focuses on ENF signals as the primary environmental fingerprint, the SAVE framework architecture supports extension to incorporate additional environmental modalities such as ambient light patterns and acoustic signatures. This multimodal capability represents a significant advancement in securing virtual healthcare environments and establishes important foundations for future research in environmental fingerprinting in diverse deployment scenarios.

Author Contributions

Conceptualization, Q.Q., Y.C. and E.B.; methodology, Q.Q. and Y.C.; software, Q.Q.; validation, Q.Q. and Y.C.; formal analysis, Q.Q.; investigation, Q.Q.; resources, Y.C. and E.B.; data curation, Q.Q.; writing—original draft preparation, Q.Q., Y.C. and E.B.; writing—review and editing, Q.Q., Y.C. and E.B.; visualization, Q.Q.; supervision, Y.C. and E.B.; project administration, Y.C.; funding acquisition, Y.C. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Conflicts of Interest

The authors declare no conflicts of interest.

Abbreviations

The following abbreviations are used in this manuscript:
AESAdvanced Encryption Standard
AIArtificial Intelligence
DHKEDiffie–Hellman Key Exchange
DIHMDistributed Intelligent Health Monitoring
DSADigital Signature Algorithm
DTDigital Twin
DTWDynamic Time Warping
ECCElliptic Curve Cryptography
ECDHElliptic Curve Diffie–Hellman
ECDLPElliptic Curve Discrete Logarithm Problem
ENFElectric Network Frequency
FNRFalse Negative Rate
FPRFalse Positive Rate
FPSFrames per Second
GUIGraphic User Interface
HARHuman Activity Recognition
HVACHeating, Ventilation, and Air Conditioning
IBEIdentity-based Encryption
IoMTInternet of Medical Things
IoTInternet of Things
KDFKey Derivation Function
LANLocal Area Network
LSTMLong Short Term Memory
MLMachine Learning
MQTTMessage Queuing Telemetry Transport
PIRPassive Infrared
PoENFProof of ENF
PRNGPseudorandom Number Generator
PUFPhysical Unclonable Functions
RGBred, green, and blue
RPiRaspberry Pi
RSARivest–Shamir–Adleman
STFTShort-time Fourier Transform
TPMTrusted Platform Modules
UE5Unreal Engine 5
UMGUnreal Motion Graphics

References

  1. Bibri, S.E. The social shaping of the metaverse as an alternative to the imaginaries of data-driven smart Cities: A study in science, technology, and society. Smart Cities 2022, 5, 832–874. [Google Scholar] [CrossRef]
  2. Musamih, A.; Yaqoob, I.; Salah, K.; Jayaraman, R.; Al-Hammadi, Y.; Omar, M.; Ellahham, S. Metaverse in healthcare: Applications, challenges, and future directions. IEEE Consum. Electron. Mag. 2022, 12, 33–46. [Google Scholar] [CrossRef]
  3. Wang, H.; Ning, H.; Lin, Y.; Wang, W.; Dhelim, S.; Farha, F.; Ding, J.; Daneshmand, M. A survey on the metaverse: The state-of-the-art, technologies, applications, and challenges. IEEE Internet Things J. 2023, 10, 14671–14688. [Google Scholar] [CrossRef]
  4. Gu, D.; Andreev, K.; Dupre, M.E. Major trends in population growth around the world. China CDC Wkly. 2021, 3, 604. [Google Scholar] [CrossRef]
  5. Navaneetham, K.; Arunachalam, D. Global population aging, 1950–2050. In Handbook of Aging, Health and Public Policy: Perspectives from Asia; Springer: Berlin/Heidelberg, Germany, 2023; pp. 1–18. [Google Scholar]
  6. Melgar, M. Use of respiratory syncytial virus vaccines in older adults: Recommendations of the Advisory Committee on Immunization Practices—United States, 2023. MMWR. Morb. Mortal. Wkly. Rep. 2023, 72, 793–801. [Google Scholar] [CrossRef]
  7. US Census Bureau. The Older Population in the United States: 2023. Available online: https://www.census.gov/library/publications/2020/demo/p25-1145.html (accessed on 17 July 2024).
  8. Awasthi, M.; Raghuvanshi, C.; Dudhagara, C.; Awasthi, A. Exploring virtual smart healthcare trends using digital twins. In Digital Twins for Smart Cities and Villages; Elsevier: Amsterdam, The Netherlands, 2025; pp. 377–406. [Google Scholar]
  9. Boschert, S.; Rosen, R. Digital twin—The simulation aspect. In Mechatronic Futures: Challenges and Solutions for Mechatronic Systems and Their Designers; Springer: Cham, Switzerland, 2016; pp. 59–74. [Google Scholar]
  10. Sun, T.; He, X.; Li, Z. Digital twin in healthcare: Recent updates and challenges. Digit. Health 2023, 9, 20552076221149651. [Google Scholar] [CrossRef]
  11. Wickramasinghe, N.; Ulapane, N.; Andargoli, A.; Ossai, C.; Shuakat, N.; Nguyen, T.; Zelcer, J. Digital twins to enable better precision and personalized dementia care. JAMIA Open 2022, 5, ooac072. [Google Scholar] [CrossRef]
  12. Hsu, C.C.; Tsai, M.Y.; Yu, C.M. Securing Healthcare Data Integrity: Deepfake Detection Using Autonomous AI Approaches. IEEE J. Biomed. Health Inform. 2025. [Google Scholar] [CrossRef]
  13. Wang, Y.; Su, Z.; Zhang, N.; Xing, R.; Liu, D.; Luan, T.H.; Shen, X. A survey on metaverse: Fundamentals, security, and privacy. IEEE Commun. Surv. Tutor. 2022, 25, 319–352. [Google Scholar] [CrossRef]
  14. Wang, J.; Makowski, S.; Cieślik, A.; Lv, H.; Lv, Z. Fake news in virtual community, virtual society, and metaverse: A survey. IEEE Trans. Comput. Soc. Syst. 2023, 11, 4828–4842. [Google Scholar] [CrossRef]
  15. Gupta, B.B.; Gaurav, A.; Arya, V. Fuzzy logic and biometric-based lightweight cryptographic authentication for metaverse security. Appl. Soft Comput. 2024, 164, 111973. [Google Scholar] [CrossRef]
  16. Thakur, G.; Kumar, P.; Chen, C.M.; Vasilakos, A.V.; Anchna; Prajapat, S. A robust privacy-preserving ecc-based three-factor authentication scheme for metaverse environment. Comput. Commun. 2023, 211, 271–285. [Google Scholar] [CrossRef]
  17. Ruiu, P.; Nitti, M.; Pilloni, V.; Cadoni, M.; Grosso, E.; Fadda, M. Metaverse & Human Digital Twin: Digital Identity, Biometrics, and Privacy in the Future Virtual Worlds. Multimodal Technol. Interact. 2024, 8, 48. [Google Scholar] [CrossRef]
  18. Yang, K.; Zhang, Z.; Youliang, T.; Ma, J. A secure authentication framework to guarantee the traceability of avatars in metaverse. IEEE Trans. Inf. Forensics Secur. 2023, 18, 3817–3832. [Google Scholar] [CrossRef]
  19. Qu, Q.; Chen, Y. ANCHOR: Authenticating avatars and virtual objects via anchors in the real world. In Proceedings of the Disruptive Technologies in Information Sciences IX, Orlando, FL, USA, 13–17 April 2025; pp. 237–253. [Google Scholar]
  20. Grigoras, C. Applications of ENF criterion in forensic audio, video, computer and telecommunication analysis. Forensic Sci. Int. 2007, 167, 136–145. [Google Scholar] [CrossRef]
  21. Ngharamike, E.; Ang, L.M.; Seng, K.P.; Wang, M. ENF based digital multimedia forensics: Survey, application, challenges and future work. IEEE Access 2023, 11, 101241–101272. [Google Scholar] [CrossRef]
  22. Nagothu, D.; Xu, R.; Chen, Y.; Blasch, E.; Aved, A. Defakepro: Decentralized deepfake attacks detection using enf authentication. IT Prof. 2022, 24, 46–52. [Google Scholar] [CrossRef]
  23. Hua, G.; Bi, G.; Thing, V.L. On practical issues of electric network frequency based audio forensics. IEEE Access 2017, 5, 20640–20651. [Google Scholar] [CrossRef]
  24. Liu, Y.; You, S.; Yao, W.; Cui, Y.; Wu, L.; Zhou, D.; Zhao, J.; Liu, H.; Liu, Y. A distribution level wide area monitoring system for the electric power grid–FNET/GridEye. IEEE Access 2017, 5, 2329–2338. [Google Scholar] [CrossRef]
  25. Cheng, R.; Wu, N.; Chen, S.; Han, B. Will metaverse be nextg internet? vision, hype, and reality. IEEE Netw. 2022, 36, 197–204. [Google Scholar] [CrossRef]
  26. Qu, Q.; Hatami, M.; Xu, R.; Nagothu, D.; Chen, Y.; Li, X.; Blasch, E.; Ardiles-Cruz, E.; Chen, G. The microverse: A task-oriented edge-scale metaverse. Future Internet 2024, 16, 60. [Google Scholar] [CrossRef]
  27. Chakshu, N.K.; Carson, J.; Sazonov, I.; Nithiarasu, P. A semi-active human digital twin model for detecting severity of carotid stenoses from head vibration—A coupled computational mechanics and computer vision method. Int. J. Numer. Methods Biomed. Eng. 2019, 35, e3180. [Google Scholar] [CrossRef] [PubMed]
  28. Hatami, M.; Qu, Q.; Chen, Y.; Kholidy, H.; Blasch, E.; Ardiles-Cruz, E. A survey of the real-time metaverse: Challenges and opportunities. Future Internet 2024, 16, 379. [Google Scholar] [CrossRef]
  29. He, S.; Zhang, Y.; Zhu, R.; Tian, W. Electric signature detection and analysis for power equipment failure monitoring in smart grid. IEEE Trans. Ind. Inform. 2020, 17, 3739–3750. [Google Scholar] [CrossRef]
  30. Suzuki, T.; Takao, H.; Rapaka, S.; Fujimura, S.; Ioan Nita, C.; Uchiyama, Y.; Ohno, H.; Otani, K.; Dahmani, C.; Mihalef, V.; et al. Rupture risk of small unruptured intracranial aneurysms in Japanese adults. Stroke 2020, 51, 641–643. [Google Scholar] [CrossRef]
  31. Barabási, A.L.; Gulbahce, N.; Loscalzo, J. Network medicine: A network-based approach to human disease. Nat. Rev. Genet. 2011, 12, 56–68. [Google Scholar] [CrossRef]
  32. Sun, H.; Chen, Y. Real-time elderly monitoring for senior safety by lightweight human action recognition. In Proceedings of the 2022 IEEE 16th International Symposium on Medical Information and Communication Technology (ISMICT), Lincoln, NE, USA, 2–4 May 2022; pp. 1–6. [Google Scholar]
  33. National Academies of Sciences and Medicine and Medicine Division; Committee on Health Care Utilization and Adults with Disabilities. Health-Care Utilization as a Proxy in Disability Determination; National Academies Press: Washington, DC, USA, 2018. [Google Scholar]
  34. Al-Naji, F.H.; Zagrouba, R. A survey on continuous authentication methods in Internet of Things environment. Comput. Commun. 2020, 163, 109–133. [Google Scholar] [CrossRef]
  35. Baig, A.F.; Eskeland, S. Security, privacy, and usability in continuous authentication: A survey. Sensors 2021, 21, 5967. [Google Scholar] [CrossRef]
  36. Dahia, G.; Jesus, L.; Pamplona Segundo, M. Continuous authentication using biometrics: An advanced review. Wiley Interdiscip. Rev. Data Min. Knowl. Discov. 2020, 10, e1365. [Google Scholar] [CrossRef]
  37. Nagothu, D.; Xu, R.; Chen, Y.; Blasch, E.; Ardiles-Cruz, E. Application of Electrical Network Frequency as an Entropy Generator in Distributed Systems. In Proceedings of the NAECON 2023—IEEE National Aerospace and Electronics Conference, Dayton, OH, USA, 28–31 August 2023; pp. 233–238. [Google Scholar]
  38. Shamir, A. Identity-based cryptosystems and signature schemes. In Advances in Cryptology: Proceedings of CRYPTO ’84; Springer: Berlin/Heidelberg, Germany, 1985; pp. 47–53. [Google Scholar]
  39. Hammi, B.; Fayad, A.; Khatoun, R.; Zeadally, S.; Begriche, Y. A lightweight ECC-based authentication scheme for Internet of Things (IoT). IEEE Syst. J. 2020, 14, 3440–3450. [Google Scholar] [CrossRef]
  40. Subashini, A.; Raju, P.K. Hybrid AES model with elliptic curve and ID based key generation for IOT in telemedicine. Meas. Sensors 2023, 28, 100824. [Google Scholar] [CrossRef]
  41. Hajj-Ahmad, A.; Garg, R.; Wu, M. Instantaneous frequency estimation and localization for ENF signals. In Proceedings of the 2012 Asia Pacific Signal and Information Processing Association Annual Summit and Conference, Hollywood, CA, USA, 3–6 December 2012; pp. 1–10. [Google Scholar]
  42. Menezes, A. Evaluation of security level of cryptography: The elliptic curve discrete logarithm problem (ECDLP). Univ. Waterloo 2001, 14, 1–24. [Google Scholar]
  43. Haakegaard, R.; Lang, J. The Elliptic Curve Diffie-Hellman (ecdh). 2015. Available online: https://koclab.cs.ucsb.edu/teaching/ecc/project/2015Projects/Haakegaard+Lang.pdf (accessed on 10 December 2024).
  44. Angel, N.A.; Ravindran, D.; Vincent, P.D.R.; Srinivasan, K.; Hu, Y.C. Recent advances in evolving computing paradigms: Cloud, edge, and fog technologies. Sensors 2021, 22, 196. [Google Scholar] [CrossRef] [PubMed]
  45. El-Wajeh, Y.A.; Hatton, P.V.; Lee, N.J. Unreal Engine 5 and immersive surgical training: Translating advances in gaming technology into extended-reality surgical simulation training programmes. Br. J. Surg. 2022, 109, 470–471. [Google Scholar] [CrossRef]
  46. Li, C.; Niu, D.; Jiang, B.; Zuo, X.; Yang, J. Meta-har: Federated representation learning for human activity recognition. In Proceedings of the Web Conference 2021, Ljubljana, Slovenia, 19–23 April 2021; pp. 912–922. [Google Scholar]
  47. Sun, Z.; Ke, Q.; Rahmani, H.; Bennamoun, M.; Wang, G.; Liu, J. Human action recognition from various data modalities: A review. IEEE Trans. Pattern Anal. Mach. Intell. 2022, 45, 3200–3225. [Google Scholar] [CrossRef]
  48. Soni, D.; Makwana, A. A survey on mqtt: A protocol of internet of things (iot). In Proceedings of the International Conference on Telecommunication, Power Analysis and Computing Techniques (ICTPACT-2017), Chennai, India, 6–8 April 2017; Volume 20. [Google Scholar]
  49. Wen, D.; Zhou, Y.; Li, X.; Shi, Y.; Huang, K.; Letaief, K.B. A survey on integrated sensing, communication, and computation. IEEE Commun. Surv. Tutor. 2024. [Google Scholar] [CrossRef]
  50. Morehouse, K.N.; Kurdi, B.; Nosek, B.A. Responsible data sharing: Identifying and remedying possible re-identification of human participants. Am. Psychol. 2025, 80. [Google Scholar] [CrossRef]
Figure 1. Layered architecture of SAVE framework.
Figure 1. Layered architecture of SAVE framework.
Futureinternet 17 00419 g001
Figure 2. An illustration of SAVE implementation scenario in the smart healthcare application. The red color ENF* refers ENF signals collected at the server side.
Figure 2. An illustration of SAVE implementation scenario in the smart healthcare application. The red color ENF* refers ENF signals collected at the server side.
Futureinternet 17 00419 g002
Figure 3. Visualization of elliptic curve.
Figure 3. Visualization of elliptic curve.
Futureinternet 17 00419 g003
Figure 4. ECDH-based hybrid encryption with ENF-anchored authentication. ENF* stands for the ENF signals collected at the server side.
Figure 4. ECDH-based hybrid encryption with ENF-anchored authentication. ENF* stands for the ENF signals collected at the server side.
Futureinternet 17 00419 g004
Figure 5. Real-time monitoring Microverse instance.
Figure 5. Real-time monitoring Microverse instance.
Futureinternet 17 00419 g005
Figure 6. Deepfake attack occurred in Scenario #2.
Figure 6. Deepfake attack occurred in Scenario #2.
Futureinternet 17 00419 g006
Figure 7. Real-time ENF signal correlation for tampering detection based on timestamp alignment.
Figure 7. Real-time ENF signal correlation for tampering detection based on timestamp alignment.
Futureinternet 17 00419 g007
Figure 8. ROC curve for different ENF window size.
Figure 8. ROC curve for different ENF window size.
Futureinternet 17 00419 g008
Figure 9. Comparison of end-to-end delay.
Figure 9. Comparison of end-to-end delay.
Futureinternet 17 00419 g009
Table 1. Systematic comparison of continuous authentication paradigms.
Table 1. Systematic comparison of continuous authentication paradigms.
ParadigmCore PrincipleUser IntrusivenessResilience to Deepfake DataPrimary Application
Behavioral BiometricsUser’s unique interaction patternsLowLow to Medium: Patterns can be learned and synthesized by AI.Desktop/Mobile Security
Physiological BiometricsUser’s unique biological signalsMedium (Requires wearable)Medium: Signals can be synthesized or captured in replay attacks.High-Security Access, Healthcare
Context-Aware SystemsDigital context (GPS, IP, Wi-Fi)LowLow: Digital context is easily spoofed.Mobile Security, Fraud Detection
SAVE (Environmental)Ambient physical phenomena (ENF)Very Low (Passive)High: Real-time physical signals are difficult to predict or forge remotely.Virtual Twins, Metaverse Integrity
Table 2. Configuration of experimental devices.
Table 2. Configuration of experimental devices.
DeviceLaptopRPi 5(s)Smart Watch
CPUIntel Core i5-114002.4 GHz2.0 GHz
Memory16 GB DDR38 GB1 GB
SensorsMAX30101MLX90632Webcam
FunctionPPGTempImage
Sample rate25 Hz10 Hz30 Hz
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Qu, Q.; Chen, Y.; Blasch, E. SAVE: Securing Avatars in Virtual Healthcare Through Environmental Fingerprinting for Elder Safety Monitoring. Future Internet 2025, 17, 419. https://doi.org/10.3390/fi17090419

AMA Style

Qu Q, Chen Y, Blasch E. SAVE: Securing Avatars in Virtual Healthcare Through Environmental Fingerprinting for Elder Safety Monitoring. Future Internet. 2025; 17(9):419. https://doi.org/10.3390/fi17090419

Chicago/Turabian Style

Qu, Qian, Yu Chen, and Erik Blasch. 2025. "SAVE: Securing Avatars in Virtual Healthcare Through Environmental Fingerprinting for Elder Safety Monitoring" Future Internet 17, no. 9: 419. https://doi.org/10.3390/fi17090419

APA Style

Qu, Q., Chen, Y., & Blasch, E. (2025). SAVE: Securing Avatars in Virtual Healthcare Through Environmental Fingerprinting for Elder Safety Monitoring. Future Internet, 17(9), 419. https://doi.org/10.3390/fi17090419

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop