A full dive into realizing the edge-enabled metaverse: Visions, enabling technologies, and challenges

M Xu, WC Ng, WYB Lim, J Kang, Z **ong… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
Dubbed “the successor to the mobile Internet,” the concept of the Metaverse has grown in
popularity. While there exist lite versions of the Metaverse today, they are still far from …

Cybersecurity in the AI-Based metaverse: A survey

M Pooyandeh, KJ Han, I Sohn - Applied Sciences, 2022 - mdpi.com
The Metaverse is a multi-user virtual world that combines physical reality with digital virtual
reality. The three basic technologies for building the Metaverse are immersive technologies …

Personal identifiability of user tracking data during observation of 360-degree VR video

MR Miller, F Herrera, H Jun, JA Landay… - Scientific Reports, 2020 - nature.com
Virtual reality (VR) is a technology that is gaining traction in the consumer market. With it
comes an unprecedented ability to track body motions. These body motions are diagnostic …

Sok: Authentication in augmented and virtual reality

S Stephenson, B Pal, S Fan… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
Augmented reality (AR) and virtual reality (VR) devices are emerging as prominent
contenders to today's personal computers. As personal devices, users will use AR and VR to …

Behavioural biometrics in VR: Identifying people from body motion and relations in virtual reality

K Pfeuffer, MJ Geiger, S Prange, L Mecke… - Proceedings of the …, 2019 - dl.acm.org
Every person is unique, with individual behavioural characteristics: how one moves,
coordinates, and uses their body. In this paper we investigate body motion as behavioural …

Paradefender: A scenario-driven parallel system for defending metaverses

J Han, M Yang, X Chen, H Liu, Y Wang… - … on Systems, Man …, 2022 - ieeexplore.ieee.org
The metaverse, as an instance of cyber–physical–social systems (CPSS) that originates in
cyber–physical systems (CPS), features growing complexity, and diversity in terms of …

Fast and secure authentication in virtual reality using coordinated 3d manipulation and pointing

F Mathis, JH Williamson, K Vaniea… - ACM Transactions on …, 2021 - dl.acm.org
There is a growing need for usable and secure authentication in immersive virtual reality
(VR). Established concepts (eg, 2D authentication schemes) are vulnerable to observation …

Security and privacy in virtual reality: a literature survey

A Giaretta - Virtual Reality, 2024 - Springer
Virtual reality (VR) is a multibillionaire market that keeps growing, year after year. As VR is
becoming prevalent in households and small businesses, it is critical to address the effects …

Virtually secure: A taxonomic assessment of cybersecurity challenges in virtual reality environments

B Odeleye, G Loukas, R Heartfield, G Sakellari… - Computers & …, 2023 - Elsevier
Abstract Although Virtual Reality (VR) is certainly not a new technology, its recent adoption
across several sectors beyond entertainment has led the information security research …

LoRa-key: Secure key generation system for LoRa-based network

W Xu, S Jha, W Hu - IEEE Internet of Things Journal, 2018 - ieeexplore.ieee.org
Physical layer key generation that exploits reciprocity and randomness of wireless fading
channels has attracted considerable attention in recent years. Despite much research efforts …