Wiley Interdisciplinary Reviews Data Mining and Knowledge Discovery,
Год журнала:
2024,
Номер
14(6)
Опубликована: Авг. 19, 2024
Abstract
The
Metaverse,
distinguished
by
its
capacity
to
integrate
the
physical
and
digital
realms
seamlessly,
presents
a
dynamic
virtual
environment
offering
diverse
opportunities
for
engagement
across
innovation,
entertainment,
socialization,
commercial
endeavors.
However,
Metaverse
is
poised
transformative
evolution
through
convergence
of
contemporary
technological
advancements,
including
artificial
intelligence
(AI),
Blockchain,
Robotics,
augmented
reality,
mixed
reality.
This
anticipated
revolutionize
global
landscape,
introducing
novel
social,
economic,
operational
paradigms
organizations
communities.
To
comprehensively
elucidate
future
potential
this
fusion
implications
research
endeavors
undertake
thorough
analysis
scholarly
discourse
pertaining
AI,
associated
technologies.
survey
delves
into
various
critical
facets
ecosystem,
encompassing
component
analysis,
exploration
currencies,
assessment
AI
utilization
in
environments,
examination
Blockchain's
role
enhancing
content
data
security.
Leveraging
articles
retrieved
from
esteemed
repositories
ScienceDirect,
IEEE
Xplore,
Springer
Nature,
Google
Scholar,
ACM,
published
between
2017
2023,
study
adopts
an
analytical
approach
engage
with
these
materials.
Through
rigorous
discourse,
aims
provide
insights
emerging
trends,
challenges,
directions
AI.
article
categorized
under:
Application
Areas
>
Industry
Specific
Applications
Future Generation Computer Systems,
Год журнала:
2023,
Номер
143, С. 401 - 419
Опубликована: Фев. 14, 2023
Since
Facebook
officially
changed
its
name
to
Meta
in
Oct.
2021,
the
metaverse
has
become
a
new
norm
of
social
networks
and
three-dimensional
(3D)
virtual
worlds.
The
aims
bring
3D
immersive
personalized
experiences
users
by
leveraging
many
pertinent
technologies.
Despite
great
attention
benefits,
natural
question
is
how
secure
users'
digital
content
data.
In
this
regard,
blockchain
promising
solution
owing
distinct
features
decentralization,
immutability,
transparency.
To
better
understand
role
metaverse,
we
aim
provide
an
extensive
survey
on
applications
for
metaverse.
We
first
present
preliminary
highlight
motivations
behind
use
Next,
extensively
discuss
blockchain-based
methods
from
technical
perspectives,
such
as
data
acquisition,
storage,
sharing,
interoperability,
privacy
preservation.
For
each
perspective,
challenges
then
can
help.
Moreover,
investigate
impact
key-enabling
technologies
including
Internet-of-Things,
twins,
multi-sensory
applications,
artificial
intelligence,
big
also
some
major
projects
showcase
services.
Finally,
directions
drive
further
research
innovations
developments
toward
future.
ACM Computing Surveys,
Год журнала:
2022,
Номер
55(9), С. 1 - 43
Опубликована: Сен. 6, 2022
The
Internet
of
Things
(IoT)
ecosystem
connects
physical
devices
to
the
internet,
offering
significant
advantages
in
agility,
responsiveness,
and
potential
environmental
benefits.
number
variety
IoT
are
sharply
increasing,
as
they
do,
generate
data
sources.
Deep
learning
(DL)
algorithms
increasingly
integrated
into
applications
learn
infer
patterns
make
intelligent
decisions.
However,
current
paradigms
rely
on
centralized
storage
computing
operate
DL
algorithms.
This
key
central
component
can
potentially
cause
issues
scalability,
security
threats,
privacy
breaches.
Federated
(FL)
has
emerged
a
new
paradigm
for
preserve
privacy.
Although
FL
helps
reduce
leakage
by
avoiding
transferring
client
data,
it
still
many
challenges
related
models’
vulnerabilities
attacks.
With
emergence
blockchain
smart
contracts,
utilization
these
technologies
safeguard
across
ecosystems.
study
aims
review
blockchain-based
methods
securing
systems
holistically.
It
presents
state
research
blockchain,
how
be
applied
approaches,
issues,
responses
outline
need
use
emerging
approaches
toward
also
focuses
analytics
from
perspective
open
questions.
provides
thorough
literature
applications.
Finally,
risks
associated
with
integrating
discussed
considered
future
works.
IEEE Communications Surveys & Tutorials,
Год журнала:
2022,
Номер
25(1), С. 289 - 318
Опубликована: Сен. 12, 2022
Over
the
past
decade,
blockchain
technology
has
attracted
a
huge
attention
from
both
industry
and
academia
because
it
can
be
integrated
with
large
number
of
everyday
applications
modern
information
communication
technologies
(ICT).
Peer-to-peer
(P2P)
architecture
enhances
these
by
providing
strong
security
trust-oriented
guarantees,
such
as
immutability,
verifiability,
decentralization.
Despite
incredible
features
that
brings
to
ICT
applications,
recent
research
indicated
guarantees
are
not
sufficient
enough
networks
may
still
prone
various
security,
privacy,
reliability
issues.
In
order
overcome
issues,
is
important
identify
anomalous
behaviour
within
actionable
time
frame.
this
article,
we
provide
an
in-depth
survey
regarding
integration
anomaly
detection
models
in
technology.
For
this,
first
discuss
how
aid
ensuring
based
applications.
Then,
demonstrate
certain
fundamental
evaluation
metrics
key
requirements
play
critical
role
while
developing
for
blockchain.
Afterwards,
present
thorough
perspective
each
layer
Finally,
conclude
article
highlighting
challenges
alongside
discussing
they
serve
future
directions
new
researchers
field.
IEEE Access,
Год журнала:
2022,
Номер
10, С. 122679 - 122695
Опубликована: Янв. 1, 2022
With
the
rapid
enhancement
in
design
and
development
of
Internet
Things
creates
a
new
research
interest
adaptation
industrial
domains.
It
is
due
to
impact
distributed
emerging
technology
topology
security-related
resource
constraints
5.0.
This
conducts
paradigm
along
with
critical
challenges
existing
information
preservation,
node
transactions
communication,
transmission,
trust
privacy,
security
protection
related
problems.
These
aspects
pose
serious
limitations
issues
for
industry
provide
data
integrity,
exchange
reliability,
provenance,
trustworthiness
overall
activities
service
delivery
prospects.
In
addition,
intersection
blockchain
IoT
has
gained
more
consideration
interest.
However,
there
an
limitation
between
inadequate
performance
connected
nodes,
high
requirement
permissioned
private
ledger
not
yet
been
tackled
complete
solution.
Due
introductions
NuCypher
Re-Encryption
infrastructure,
hashing
tree
allocation,
deployment
proof-of-work
required
computational
power
as
well.
paper
divided
into
three
different
folds;
first,
we
studied
various
literature
blockchain-enabling
its
implementation
challenging
Secondly,
proposed
hyperledger
sawtooth-enabled
framework.
framework
provides
secure
trusted
execution
environment,
which
mechanisms
protocols
are
designed
acknowledgment,
including
immutable
storage
security,
peer-to-peer
network
on-chain
off-chain
communication
activities.
Thirdly,
pseudo-chain
codes
consensus
smooth
streamline
broadcast
content.
The
multiple
investigated
simulated
using
Hyperledger
Sawtooth-enabled
docker
testing
devices
within
limited
usage
constraints.
IEEE Internet of Things Journal,
Год журнала:
2022,
Номер
10(4), С. 3587 - 3610
Опубликована: Ноя. 16, 2022
The
virtual
world
created
by
the
development
of
Internet,
computers,
artificial
intelligence
(AI),
and
hardware
technologies
have
brought
various
degrees
digital
transformation
to
people's
lives.
With
multiple
demands
for
reality
increasing,
metaverse,
a
new
type
social
ecology
that
can
connect
physical
worlds,
is
booming.
However,
with
rapid
growth
data
volume
value,
continuous
evolution
metaverse
faces
challenges
privacy,
security,
high
synchronization,
low
latency.
Fortunately,
ever-evolving
blockchain
intelligent
networking
be
used
satisfy
trusted
construction,
interaction,
computing
metaverse.
Therefore,
it
necessary
conduct
an
in-depth
review
role
gains
blockchain,
networking,
combination
both
in
providing
immersive
experiences
In
this
survey,
we
first
discuss
trend,
characteristics,
architecture
Then,
existing
work
on
two
are
reviewed,
including
overviews,
applications,
challenges.
Next,
applications
summarized,
emphasizing
importance
fields
development.
Finally,
some
open
issues,
challenges,
future
research
directions.
Sensors,
Год журнала:
2022,
Номер
22(14), С. 5274 - 5274
Опубликована: Июль 14, 2022
Blockchain
is
a
modern
technology
that
has
revolutionized
the
way
society
interacts
and
trades.
It
could
be
defined
as
chain
of
blocks
stores
information
with
digital
signatures
in
distributed
decentralized
network.
This
technique
was
first
adopted
for
creation
cryptocurrencies,
such
Bitcoin
Ethereum.
However,
research
industrial
studies
have
recently
focused
on
opportunities
blockchain
provides
various
other
application
domains
to
take
advantage
main
features
this
technology,
as:
decentralization,
persistency,
anonymity,
auditability.
paper
reviews
use
several
interesting
fields,
namely:
finance,
healthcare,
systems,
wireless
networks,
Internet
Things,
smart
grids,
governmental
services,
military/defense.
In
addition,
our
identifies
challenges
overcome,
guarantee
better
technology.
Digital Communications and Networks,
Год журнала:
2022,
Номер
9(2), С. 411 - 421
Опубликована: Ноя. 13, 2022
Some
of
the
significant
new
technologies
researched
in
recent
studies
include
BlockChain
(BC),
Software
Defined
Networking
(SDN),
and
Smart
Industrial
Internet
Things
(IIoT).
All
three
provide
data
integrity,
confidentiality,
integrity
their
respective
use
cases
(especially
industrial
fields).
Additionally,
cloud
computing
has
been
for
several
years
now.
Confidential
information
is
exchanged
with
infrastructure
to
clients
access
distant
resources,
such
as
storage
activities
IIoT.
There
are
also
security
risks,
concerns,
difficulties
associated
computing.
To
address
these
challenges,
we
propose
merging
BC
SDN
into
a
platform
This
paper
introduces
"DistB-SDCloud",
an
architecture
enhanced
smart
IIoT
applications.
The
proposed
uses
distributed
method
security,
secrecy,
privacy,
while
remaining
flexible
scalable.
Customers
sector
benefit
from
dispersed
or
decentralized,
efficient
environment
BC.
described
improve
durability,
stability,
load
balancing
infrastructure.
efficacy
our
BC-based
implementation
was
experimentally
tested
by
using
various
parameters
including
throughput,
packet
analysis,
response
time,
bandwidth,
latency
well
monitoring
attacks
on
system
itself.