Elliptic Curve Cryptography-Based Identity Authentication Scheme Suitable for Metaverse Environment DOI Open Access

Haonan Zhai,

Miaolei Deng, Huanmei Wu

и другие.

Symmetry, Год журнала: 2024, Номер 16(7), С. 891 - 891

Опубликована: Июль 12, 2024

Compared to traditional platform environments in the online realm, metaverse, as a three-dimensional (3D) virtual world, exposes more identity data network. Once these are compromised, it leads privacy breaches. Therefore, how ensure security metaverse environment has become an urgent problem be solved. Although research on authentication schemes can help improve security, network studied based their own environmental characteristics, which makes difficult meet needs environment. As result, this paper we propose elliptic curve cryptography (ECC)-based scheme address issues This ensures secure communication among users, avatars, and servers. The of was demonstrated through informal analysis automated validation internet protocols applications (AVISPA) formal tools, results showed that resist various known attacks. with existing schemes, lower computational costs.

Язык: Английский

User Safety and Security in the Metaverse: A Critical Review DOI Creative Commons
Saurabh Sharma, Jaiteg Singh, Ankur Gupta

и другие.

IEEE Open Journal of the Communications Society, Год журнала: 2024, Номер 5, С. 5467 - 5487

Опубликована: Янв. 1, 2024

The Metaverse envisions a future where immersive online interactions become the norm. However, this vision can only be safely realized if user safety and privacy are prioritized. This review critically evaluates existing security measures within Metaverse. We have highlighted limited ability of solutions to protect against harassment, identity theft, misuse personal data collected in environment. research comprehensively analyzes dimensions virtual worlds presents taxonomy classify unique threats vulnerabilities users may encounter. reveals critical gaps, including lack comprehensive frameworks balanced privacy-preserving models environments. In response, we propose novel Security Architecture designed with Zero-Trust principles. architecture prioritizes control over data, identity, experiences. It also emphasizes proactive mitigate diverse potential harms worlds. Our highlights importance such robust, user-centric enabling that is immersive, safe, secure for all its participants.

Язык: Английский

Процитировано

15

Privacy-Centric AI and IoT Solutions for Smart Rural Farm Monitoring and Control DOI Creative Commons
Mosiur Rahaman, Chun‐Yuan Lin, Princy Pappachan

и другие.

Sensors, Год журнала: 2024, Номер 24(13), С. 4157 - 4157

Опубликована: Июнь 26, 2024

The integration of artificial intelligence (AI) and the Internet Things (IoT) in agriculture has significantly transformed rural farming. However, adoption these technologies also introduced privacy security concerns, particularly unauthorized breaches cyber-attacks on data collected from IoT devices sensitive information. present study addresses concerns by developing a comprehensive framework that provides practical, privacy-centric AI solutions for monitoring smart farms. This is performed designing includes three-phase protocol secures exchange between User, Sensor Layer, Central Server. In proposed protocol, Server responsible establishing secure communication channel verifying legitimacy User securing using rigorous cryptographic techniques. validated Automated Validation Security Protocols Applications (AVISPA) tool. formal analysis confirms robustness its suitability real-time applications IoT-enabled farms, demonstrating resistance against various attacks enhanced performance metrics, including computation time 0.04 s 11 messages detailed search where 119 nodes were visited at depth 12 plies mere 0.28 s.

Язык: Английский

Процитировано

14

A privacy-preserving three-factor authentication system for IoT-enabled wireless sensor networks DOI
Garima Thakur, Sunil Prajapat, Pankaj Kumar

и другие.

Journal of Systems Architecture, Год журнала: 2024, Номер 154, С. 103245 - 103245

Опубликована: Июль 26, 2024

Язык: Английский

Процитировано

11

Space Authentication in the Metaverse: A Blockchain-Based User-Centric Approach DOI Creative Commons
Jungwon Seo, Hankyeong Ko, Sooyong Park

и другие.

IEEE Access, Год журнала: 2024, Номер 12, С. 18703 - 18713

Опубликована: Янв. 1, 2024

As the metaverse gains traction, importance of security research becomes increasingly evident. While there has been on authenticating users in metaverse, is a notable gap concerning authentication specific spaces within metaverse. This paper addresses this by proposing novel user-centric blockchain-based approach that incorporates space authentication. The proposed leverages blockchain smart contracts to authenticate using cosine similarity metrics. A significant advantage its ability establish seamlessly integrating and technologies, all without need for centralized authority. In paper, we not only evaluate our but also conduct experiments determine threshold assess feasibility environment.

Язык: Английский

Процитировано

8

Avatar Privacy Challenges in the Metaverse: A Comprehensive Review and Future Directions DOI
Somaya Eltanbouly, Osama Halabi, Junaid Qadir

и другие.

International Journal of Human-Computer Interaction, Год журнала: 2024, Номер unknown, С. 1 - 18

Опубликована: Июль 12, 2024

Язык: Английский

Процитировано

8

Introduction of cyber security with metaverse: Challenges and applications DOI

Shantanu Bindewari,

Abhinav Raghav,

Rajeev Tiwari

и другие.

Elsevier eBooks, Год журнала: 2025, Номер unknown, С. 139 - 164

Опубликована: Янв. 1, 2025

Язык: Английский

Процитировано

1

Blockchain Assisted Intra-Twin and Inter-Twin Authentication Scheme for Vehicular Digital Twin System DOI

Deepika Gautam,

Garima Thakur, Pankaj Kumar

и другие.

IEEE Transactions on Intelligent Transportation Systems, Год журнала: 2024, Номер 25(10), С. 15002 - 15015

Опубликована: Май 7, 2024

The potency of digital twins to mitigate the shortcomings traditional mobility systems, such as Vehicular Adhoc Network (VANET) can reconfigure it into an intelligent transportation domain with bolstered processing, storage capabilities and decision-making abilities. vehicular network is emerging industrial revolution, where each real-mobile entity (i.e., vehicle) connected in virtual environment through their replica, known a twin. real-time data synchronization twin-centric approach achieved via open communication channel. Unfortunately, leveraging virtual-reality synthesized security perils which consequently obligates rigorous privacy countermeasures authentication, encryption signature techniques. In this paper, we have suggested blockchain-based authentication framework for intra-twin inter-twin twin networks, integrated blockchain system assures compactness verifiability. protocol investigated under real or random oracle model (ROR) confirmed secure non-mathematical analysis. Eventually, operational competences functionality features are inspected relevant state-of-the-arts. findings study states excel computation overhead than others seemly network.

Язык: Английский

Процитировано

5

Quantum-safe blockchain-assisted data encryption protocol for internet of things networks DOI
Sunil Prajapat, Neeraj Kumar, Ashok Kumar Das

и другие.

Cluster Computing, Год журнала: 2024, Номер 28(1)

Опубликована: Окт. 14, 2024

Язык: Английский

Процитировано

4

A blockchain-assisted privacy-preserving signature scheme using quantum teleportation for metaverse environment in Web 3.0 DOI
Sunil Prajapat, Garima Thakur, Pankaj Kumar

и другие.

Future Generation Computer Systems, Год журнала: 2024, Номер 164, С. 107581 - 107581

Опубликована: Ноя. 4, 2024

Язык: Английский

Процитировано

4

Secure and privacy-preserving quantum authentication scheme using blockchain identifiers in metaverse environment DOI
Sunil Prajapat,

Aryan Rana,

Pankaj Kumar

и другие.

Journal of Systems Architecture, Год журнала: 2025, Номер unknown, С. 103329 - 103329

Опубликована: Янв. 1, 2025

Язык: Английский

Процитировано

0