Symmetry,
Год журнала:
2024,
Номер
16(7), С. 891 - 891
Опубликована: Июль 12, 2024
Compared
to
traditional
platform
environments
in
the
online
realm,
metaverse,
as
a
three-dimensional
(3D)
virtual
world,
exposes
more
identity
data
network.
Once
these
are
compromised,
it
leads
privacy
breaches.
Therefore,
how
ensure
security
metaverse
environment
has
become
an
urgent
problem
be
solved.
Although
research
on
authentication
schemes
can
help
improve
security,
network
studied
based
their
own
environmental
characteristics,
which
makes
difficult
meet
needs
environment.
As
result,
this
paper
we
propose
elliptic
curve
cryptography
(ECC)-based
scheme
address
issues
This
ensures
secure
communication
among
users,
avatars,
and
servers.
The
of
was
demonstrated
through
informal
analysis
automated
validation
internet
protocols
applications
(AVISPA)
formal
tools,
results
showed
that
resist
various
known
attacks.
with
existing
schemes,
lower
computational
costs.
IEEE Open Journal of the Communications Society,
Год журнала:
2024,
Номер
5, С. 5467 - 5487
Опубликована: Янв. 1, 2024
The
Metaverse
envisions
a
future
where
immersive
online
interactions
become
the
norm.
However,
this
vision
can
only
be
safely
realized
if
user
safety
and
privacy
are
prioritized.
This
review
critically
evaluates
existing
security
measures
within
Metaverse.
We
have
highlighted
limited
ability
of
solutions
to
protect
against
harassment,
identity
theft,
misuse
personal
data
collected
in
environment.
research
comprehensively
analyzes
dimensions
virtual
worlds
presents
taxonomy
classify
unique
threats
vulnerabilities
users
may
encounter.
reveals
critical
gaps,
including
lack
comprehensive
frameworks
balanced
privacy-preserving
models
environments.
In
response,
we
propose
novel
Security
Architecture
designed
with
Zero-Trust
principles.
architecture
prioritizes
control
over
data,
identity,
experiences.
It
also
emphasizes
proactive
mitigate
diverse
potential
harms
worlds.
Our
highlights
importance
such
robust,
user-centric
enabling
that
is
immersive,
safe,
secure
for
all
its
participants.
Sensors,
Год журнала:
2024,
Номер
24(13), С. 4157 - 4157
Опубликована: Июнь 26, 2024
The
integration
of
artificial
intelligence
(AI)
and
the
Internet
Things
(IoT)
in
agriculture
has
significantly
transformed
rural
farming.
However,
adoption
these
technologies
also
introduced
privacy
security
concerns,
particularly
unauthorized
breaches
cyber-attacks
on
data
collected
from
IoT
devices
sensitive
information.
present
study
addresses
concerns
by
developing
a
comprehensive
framework
that
provides
practical,
privacy-centric
AI
solutions
for
monitoring
smart
farms.
This
is
performed
designing
includes
three-phase
protocol
secures
exchange
between
User,
Sensor
Layer,
Central
Server.
In
proposed
protocol,
Server
responsible
establishing
secure
communication
channel
verifying
legitimacy
User
securing
using
rigorous
cryptographic
techniques.
validated
Automated
Validation
Security
Protocols
Applications
(AVISPA)
tool.
formal
analysis
confirms
robustness
its
suitability
real-time
applications
IoT-enabled
farms,
demonstrating
resistance
against
various
attacks
enhanced
performance
metrics,
including
computation
time
0.04
s
11
messages
detailed
search
where
119
nodes
were
visited
at
depth
12
plies
mere
0.28
s.
IEEE Access,
Год журнала:
2024,
Номер
12, С. 18703 - 18713
Опубликована: Янв. 1, 2024
As
the
metaverse
gains
traction,
importance
of
security
research
becomes
increasingly
evident.
While
there
has
been
on
authenticating
users
in
metaverse,
is
a
notable
gap
concerning
authentication
specific
spaces
within
metaverse.
This
paper
addresses
this
by
proposing
novel
user-centric
blockchain-based
approach
that
incorporates
space
authentication.
The
proposed
leverages
blockchain
smart
contracts
to
authenticate
using
cosine
similarity
metrics.
A
significant
advantage
its
ability
establish
seamlessly
integrating
and
technologies,
all
without
need
for
centralized
authority.
In
paper,
we
not
only
evaluate
our
but
also
conduct
experiments
determine
threshold
assess
feasibility
environment.
IEEE Transactions on Intelligent Transportation Systems,
Год журнала:
2024,
Номер
25(10), С. 15002 - 15015
Опубликована: Май 7, 2024
The
potency
of
digital
twins
to
mitigate
the
shortcomings
traditional
mobility
systems,
such
as
Vehicular
Adhoc
Network
(VANET)
can
reconfigure
it
into
an
intelligent
transportation
domain
with
bolstered
processing,
storage
capabilities
and
decision-making
abilities.
vehicular
network
is
emerging
industrial
revolution,
where
each
real-mobile
entity
(i.e.,
vehicle)
connected
in
virtual
environment
through
their
replica,
known
a
twin.
real-time
data
synchronization
twin-centric
approach
achieved
via
open
communication
channel.
Unfortunately,
leveraging
virtual-reality
synthesized
security
perils
which
consequently
obligates
rigorous
privacy
countermeasures
authentication,
encryption
signature
techniques.
In
this
paper,
we
have
suggested
blockchain-based
authentication
framework
for
intra-twin
inter-twin
twin
networks,
integrated
blockchain
system
assures
compactness
verifiability.
protocol
investigated
under
real
or
random
oracle
model
(ROR)
confirmed
secure
non-mathematical
analysis.
Eventually,
operational
competences
functionality
features
are
inspected
relevant
state-of-the-arts.
findings
study
states
excel
computation
overhead
than
others
seemly
network.