Next Article in Journal
An Integrated Software-Defined Networking–Network Function Virtualization Architecture for 5G RAN–Multi-Access Edge Computing Slice Management in the Internet of Industrial Things
Previous Article in Journal
Application of Proximal Policy Optimization for Resource Orchestration in Serverless Edge Computing
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

SLACPSS: Secure Lightweight Authentication for Cyber–Physical–Social Systems

by
Ahmed Zedaan M. Abed
*,
Tamer Abdelkader
* and
Mohamed Hashem
Faculty of Computer and Information Sciences, Ain Shames University, Cairo 11566, Egypt
*
Authors to whom correspondence should be addressed.
Submission received: 2 June 2024 / Revised: 10 July 2024 / Accepted: 16 July 2024 / Published: 9 September 2024

Abstract

:
The concept of Cyber–Physical–Social Systems (CPSSs) has emerged as a response to the need to understand the interaction between Cyber–Physical Systems (CPSs) and humans. This shift from CPSs to CPSSs is primarily due to the widespread use of sensor-equipped smart devices that are closely connected to users. CPSSs have been a topic of interest for more than ten years, gaining increasing attention in recent years. The inclusion of human elements in CPS research has presented new challenges, particularly in understanding human dynamics, which adds complexity that has yet to be fully explored. CPSSs are a base class and consist of three basic components (cyberspace, physical space, and social space). We map the components of the metaverse with that of a CPSS, and we show that the metaverse is an implementation of a Cyber–Physical–Social System (CPSS). The metaverse is made up of computer systems with many elements, such as artificial intelligence, computer vision, image processing, mixed reality, augmented reality, and extended reality. It also comprises physical systems, controlled objects, and human interaction. The identification process in CPSSs suffers from weak security, and the authentication problem requires heavy computation. Therefore, we propose a new protocol for secure lightweight authentication in Cyber–Physical–Social Systems (SLACPSSs) to offer secure communication between platform servers and users as well as secure interactions between avatars. We perform a security analysis and compare the proposed protocol to the related previous ones. The analysis shows that the proposed protocol is lightweight and secure.

1. Introduction

Cyber–Physical–Social Systems (CPSSs) are systems that tightly integrate data processing across physical systems, cyberspace, and social interactions by utilizing diverse resources such as sensors, actuators, and computational systems to create a unified entity within digital environments. CPSSs consist of three classes (cyber systems, physical system, and social systems); these systems depend on communication, processing, and control infrastructures that frequently cross layers in all three systems and contain a variety of resources, such as sensors, actuators, computer resources, services, people, etc. As shown in Figure 1, a CPSS can be described based on its primary elements in the following manner: the cyber system (a system comprising only technical components, such as computers, networks, etc.), the physical elements (controlled entities), and the social elements (e.g., humans).
CPSSs facilitate intelligent interaction across cyber, physical, and social spaces. CPSSs focus on the interaction of human society with other system components; the purpose is to gather and categorize resources in a manner that is beneficial for both machines and humans [1]. These systems collect data from virtual and real spaces by utilizing sensors, mobile crowd sourcing, and social networks. The goal is to offer users information to support their decisions and improve overall results [2].
CPSSs have greatly developed in most areas of life and have become irreplaceable. CPSSs have been applied across numerous domains, including smart cities [3], intelligent transportation [2], healthcare [4], smart tourism [5], behavioral profiling to predict future behaviors [6], and artificial societies. An example of a cyber system is a computer system within a healthcare institution, allowing physicians, nurses, and even patients to access medical data. Interactions between doctors and patients, nurses and patients, doctors and nurses, etc., are examples of social relationships. In particular, data relating to the physical aspects of the system can be discovered and saved, and the data can be transferred using the cyber system. [4].
The concept of a “metaverse” was named by merging the terms “meta” and “universe” and refers to a digital environment existing in three dimensions. In this realm, virtual representations known as avatars engage in a wide range of activities including political, economic, social, and cultural interactions. Such an environment is frequently used to depict a virtual space that reflects real-life elements alongside fantasy components. The physical layer is a vital component in the metaverse, serving to enhance the immersive experience while also posing technical challenges. Despite the rapid progress in metaverse hardware, ongoing development is necessary to achieve the same level of realism as the physical world. The key hardware element in the metaverse is the head-mounted display (HMD).
The cyber layer is indispensable in the operation of the metaverse as it provides software-based services through cyber systems, whether they are on the premises or in the cloud. This includes the underlying infrastructures and platforms. Within the metaverse, the social system is defined by the interaction between users and software applications in a three-dimensional virtual space, where they take on the appearance of avatars. According to the information provided, it can be concluded that the metaverse functions as a Cyber–Physical–Social System. Another example that lends itself to CPSSs is the metaverse, where “metaverse” serves as an umbrella concept for the future Internet, with humans being represented as avatars; by immersing themselves in a three-dimensional environment that accurately replicates the physical world, users and software agents can engage in interactive exchanges with one another [7].
Figure 1. A Cyber–Physical–Social System (CPSS), the image was taken from [8].
Figure 1. A Cyber–Physical–Social System (CPSS), the image was taken from [8].
Computers 13 00225 g001
The metaverse consists of sensors; a computer system with storage; and 3D virtualization technologies such as virtual reality (VR), augmented reality (AR), and mixed reality (MR) with human-controlled devices, as shown in Figure 2. The metaverse has been applied in a variety of areas, including gaming and social research, as well as marketing simulations and education due to its ability to provide an immersive learning experience. These simulations accurately depict real-world tasks, making them a valuable tool for various educational applications.
The metaverse is very popular in gaming, E-learning, healthcare, smart cities, and simulated training and serves as the most popular platform. Before the COVID-19 pandemic, online education was already experiencing consistent growth year after year. The effective provision of education in a virtual setting has long been a subject of research interest [9,10,11,12]. Due to the worldwide spread of the pandemic, the education of many children, especially those in vulnerable situations, has been significantly impacted. UNICEF’s April 2020 report revealed that traditional classroom teaching was interrupted in most countries, leading to more than 91% of students globally being unable to attend physical classes [13]. The emergence of the pandemic constrained individuals’ movement in physical environments, resulting in a marked surge in the dissemination of digital material. E-learning presents a remedy for the obstacles presented by geographical boundaries, although traditional techniques frequently fall short in producing desirable results [14,15]. Various digital technologies, such as computing capabilities and networks, have progressed, resulting in the creation of immersive virtual environments in education. Through the use of XR, cloud computing, and other advancements, educators, mentors, and professionals are able to engage with students in a collaborative virtual learning space [11,16]. The educational metaverse presents numerous possibilities for expansion and discovery. It is essential to prioritize enhancing the quality of portrayals in the metaverse and increasing its accessibility.
The metaverse provides a unique opportunity for medical instruction by delivering an immersive encounter and enhanced interoperability. Through the integration of MR and AI technologies, individuals can explore a virtual human body, gaining a comprehensive understanding of organs and engaging in simulated surgical practices [17]. Smart cities use a combination of software, communication networks, and the Internet of Things (IoT) to gather varied data within cities. These data are then scrutinized to derive astute solutions that enrich public life. Numerous countries around the world have already initiated the establishment of clever cities with the aim of refining traffic conditions, preserving energy, enhancing urban safety measures, and providing optimal planning solutions for urban development. Smart city technology improves productivity in manufacturing, urban agriculture, and energy usage while also enabling the merging of different services to offer cooperative solutions for residents. Within the metaverse, the use of digital twin (DT) technology to create digital cities and replicate real-time urban settings can promote economic growth, support efficient human resource management, and enhance the natural environment, ultimately elevating the residents’ quality of life [18,19].
The metaverse shows promising results, but continued growth is hampered by significant challenges due to security and privacy issues. To overcome these security and privacy issues in metaverse systems, and to deal with the heaviness of the authentication processes, we propose a Secure Lightweight Authentication (SLACPSS) protocol to secure avatar interactions and communication in the metaverse environment and conduct an informal study to prove that the proposed Lightweight mutual authentication system is resistant to a number of security risks, such as impersonation, theft of a smart device, man-in-the-middle (MITM) and insider attacks, offline password guessing, server spoofing on platforms, perfect forward secrecy, superior insiders, and ephemeral secret leakage, and provides user anonymity and mutual authentication.
The rest of the paper is organized as follows: We present the metaverse and its security threats in Section 2; in Section 3, we display the related work; in Section 4, we present the proposed protocol for secure lightweight authentication in a Cyber–Physical Social System (SLACPSS); we discuss the security analysis in Section 5; and finally, conclusions are drawn in Section 6.

2. Metaverse and Security Threats

Users can log in whenever they choose to interact with others within a continuous virtual environment with an avatar, where they have the opportunity to take part in a range of activities including gaming, trading, artistic expression, and discovery. Through their avatars, users can explore online pages within 3D virtual environments. The metaverse has the capacity to enhance accessibility and cater to diverse social needs. For example, numerous events have shifted to virtual formats with the assistance of the metaverse. In 2020, UC Berkeley conducted its graduation ceremony in Minecraft. Furthermore, in Fortnite, every day, a lot of virtual events take place, like a Travis Scott concert. Regarding diversity, the real world lacks the ability to bring together different elements in a single location to meet the needs of diverse individuals. In contrast, the metaverse offers a boundless space for expansion and effortless transitions between scenes, making it an effective platform for achieving diversity. The metaverse presents numerous captivating scenarios, such as the popular game Animal Crossing [20].

2.1. Metaverse Architecture

The metaverse is a virtual environment that includes user-controlled avatars, digital entities, simulated environments, and other computer-generated elements. Within this environment, individuals can utilize their virtual identities on various smart devices, represented by their avatars, to interact, collaborate, and engage socially with one another. We will provide a detailed analysis of the interrelations between the three worlds and provide a detailed explanation of the components found in the metaverse.

2.1.1. Human Society

The metaverse is seen as a human-centered system [21]. Human users, along with their internal psychological dynamics and social relationships, comprise the human sphere. The metaverse offers a platform where humans can seamlessly connect with their digital avatars through human–computer interaction (HCI) and extended reality (XR) technologies [22]. This allows for a wide range of experiences, including gaming, work-related tasks, and social interactions.

2.1.2. Physical Infrastructures

The metaverse relies on the physical environment to establish necessary infrastructures, including sensing/control, communication, computation, and storage. These infrastructures enable the metaverse to perceive, transmit, process, and cache multi-sensory data while facilitating effective interactions with the digital and human worlds.

2.1.3. Interconnection of Virtual Worlds

According to the guidelines established by ISO/IEC 23005 and IEEE 2888 [23,24], the digital realm consists of a series of interconnected distributed virtual worlds, referred to as sub-metaverses. Each sub-metaverse can offer unique virtual products/services, such as gaming, social networking, online museums, and virtual concerts, along with virtual settings such as game environments and virtual cities, to users who are depicted as digital avatars—virtual representations of individuals in the metaverse. Users can create a variety of avatars in various metaverse applications, which can resemble humans, animals, or mythical beings.

2.1.4. Metaverse Engine

The metaverse engine [25] employs interactivity, artificial intelligence (AI), digital twin, and blockchain technologies to process real-world big data, enabling the generation, maintenance, and updating of the virtual world.

2.1.5. In-World Information Flow

The human world is interconnected by social networks and established through collective activities and mutual engagements among people as follows:
  • In the physical world, sensing and control infrastructure driven by IoT technologies is a key element in the digital transformation of the physical world, utilizing pervasive sensors and actuators. The resulting massive data from IoT devices are transmitted and processed through network and computing infrastructures.
  • Within the digital realm, the metaverse engine efficiently processes and organizes digital information gathered from both the physical and human spheres, enabling the construction and presentation of vast metaverses while offering a selection of metaverse services.

2.1.6. Information Flow across Worlds

The Internet and the Internet of things (IoT) are the key platforms among the three domains. Further details are provided below:
  • By employing human–computer interface (HCI) technologies, humans can engage with physical objects, and XR technologies allow them to immerse themselves in virtually augmented reality, such as holographic telepresence.
  • The connection between the human world and the digital world is facilitated by the Internet, which is the largest computer network globally. Through smart devices like smartphones, wearable sensors, and VR helmets, users can engage with the digital realm for purposes such as knowledge creation, sharing, and acquisition.
  • The interconnection of smart devices in the IoT infrastructure facilitates the seamless exchange of information between the physical and digital realms, enabling effective digitalization [26].

2.2. Security Threats to the Metaverse

The subsequent section will present an outline of the threats that exist in the metaverse, specifically focusing on authentication, data management, privacy, the metaverse network, the metaverse economy, the physical world and human society, and metaverse governance, as shown in Figure 3.

2.2.1. Threats to Authentication in the Metaverse

Within the metaverse, unauthorized acquisition, impersonation, and authentication discrepancies can pose significant challenges across virtual worlds. The threats are described below:
  • Identity Theft: If a user’s identity is stolen in the metaverse, their avatars, digital belongings, social connections, and digital life may be at risk of being exposed and lost, posing a more significant threat than in traditional information systems.
  • Impersonation Attack: Within the metaverse, an impersonation attack can be executed when an attacker pretends to be an authorized entity, allowing the attacker to gain access to services or systems without proper authorization [28].
  • Avatar Authentication Issue: Verifying the authenticity of avatars, such as confirming friends’ avatars, presents a more complex task in the metaverse than real-world identity authentication. This complexity arises from the necessity to validate facial features, voice, video recordings, and similar aspects.
  • Trusted and Interoperable Authentication: To achieve the security, efficiency, and reliability of diverse service domains and virtual worlds in the metaverse, users and avatars must promptly establish a robust cross-platform and cross-domain identity verification system. This system should be able to operate seamlessly across various platforms, including blockchains.

2.2.2. Threats to Data Management in the Metaverse

In the metaverse, both the data collected or generated by wearable devices and users/avatars are exposed to threats such as data tampering, false data injection, low-quality user-generated content, challenges in tracing ownership/provenance, and potential violations of intellectual property. These threats are explained below:
  • Data Tampering Attacks: Integrity characteristics play a crucial role in ensuring the efficient monitoring and identification of changes that occur during data exchange across ternary worlds and diverse sub-metaverses. Adversaries can manipulate, counterfeit, substitute, and eliminate unprocessed data throughout the metaverse data services’ lifecycle to disrupt the normal activities of users, avatars, or physical entities [29].
  • False Data Injection Attacks: Attackers can inject falsified information, including false messages and incorrect instructions, to mislead metaverse systems [30]. For example, the use of AI-aided content creation can contribute to an enhanced user experience during the initial phase of the metaverse. However, adversaries can exploit this by injecting adversary training samples or poisoned gradients into centralized or distributed AI training, thereby generating biased AI models.
  • Issues in Managing New Types of Metaverse Data: When examining the metaverse in relation to the existing Internet, it becomes evident that new hardware and devices are necessary to collect diverse forms of data (e.g., eye movement, facial expression, and head movement) that were previously uncollected. Data collection is vital for enabling fully immersive user experiences [31].
  • Threats to the Data Quality of User-Generated Content (UGC) and Physical Input: In the metaverse, self-centered users or avatars might upload low-quality content in UGC mode to reduce expenses, consequently impacting user experience by creating an artificial environment.
  • Threats to User-Generated Content (UGC) Ownership and Provenance: Contrary to the government’s regulated asset registration process in the physical realm, the metaverse exists as an open and fully autonomous domain with no centralized authority in place.
  • Threats to Intellectual Property Protection: In contrast to the real world, the definition of intellectual property in the metaverse should be modified to establish clear licensing boundaries and usage rights for owners as the metaverse expands [32].

2.2.3. Privacy Threats in the Metaverse

The protection of user privacy, which encompasses location privacy, habits, living styles, and other personal data, may be jeopardized throughout the lifecycle of data services in the metaverse, including data perception, transmission, processing, governance, and storage. The privacy threats are as follows:
  • Pervasive Data Collection: For a truly immersive experience with an avatar, it is essential to conduct comprehensive user profiling at an exceedingly granular level [33], which includes facial expressions, eye and hand movements, speech patterns, biometric features, and even brainwave patterns.
  • Privacy Leakage in Data Transmission: Personally identifiable information obtained from wearables such as Head-Mounted Displays (HMDs) is extensively gathered in metaverse systems and then transmitted through wired and wireless means, with strict measures in place to safeguard the confidentiality of these data from unauthorized parties [34].
  • Privacy Leakage in Data Processing: Metaverse services rely on the collection and analysis of large amounts of data from people and their environments to develop avatars and virtual settings, posing a risk of sensitive information exposure [35].
  • Privacy Leakage in Cloud/Edge Storage: Storing private and sensitive information, such as user profiling, for a significant number of users on cloud servers or edge devices can give rise to privacy disclosure concerns. Hackers can potentially deduce users’ privacy information by leveraging frequent queries through differential attacks [36].
  • Rogue or Compromised End Devices: In the metaverse, an increased number of wearable sensors will be utilized on human bodies and their surroundings to enable avatars to establish natural eye contact, interpret hand gestures, mirror facial expressions, and more in real-time.
  • Threats to Digital Footprints: Avatars in the metaverse can exhibit behavior patterns, preferences, habits, and activities that mirror those of their physical counterparts, enabling attackers to gather digital footprints and exploit the similarity to real users for accurate user profiling and potentially illegal activities [37].
  • Identity Linkability in Ternary Worlds: As the metaverse incorporates reality within itself, the seamless integration of the human, physical, and virtual worlds gives rise to concerns regarding identity linkability across these ternary realms [32].
  • Threats to Accountability: XR and HCI devices inherently capture a higher degree of sensitive data, such as user locations, behavior patterns, and surroundings, than traditional smart devices.
  • Threats to Customized Privacy: Different users within specific sub-metaverses [38] tend to have unique privacy preferences for various services or interaction objects, similar to what is seen on other service platforms on the Internet.

2.2.4. Threats to Metaverse Network

In the metaverse, there are traditional threats (such as physical-layer security). Enhancing communication networks can also prove to be efficient as the metaverse advances beyond the current Internet and integrates current wireless communication technologies and threats such as SPoF, DDoS, and Sybil attacks.

2.2.5. Threats to the Metaverse Economy

The integrity of the creator economy in the metaverse is at risk due to potential attacks that undermine service trust, digital asset ownership, and economic fairness.
  • Service Trust Issues in UGC and Virtual Object Trading: Avatars in the open metaverse marketplace can be considered untrustworthy entities due to the absence of prior interactions. This poses inherent risks of fraud, such as repudiation and refusal to pay, during user-generated content and virtual object trading among various stakeholders in the metaverse. Additionally, when constructing virtual objects using digital twin technologies, the metaverse must ensure the authenticity and trustworthiness of the produced and deployed digital copies [39].
  • Threats to Digital Asset Ownership: The distributed metaverse system, lacking a central authority and featuring intricate circulation and ownership structures such as collective ownership and shared ownership [40], poses substantial challenges in the lifecycle of digital assets within the creator economy. These challenges encompass the generation, pricing, trusted trading, and ownership traceability of such assets.

2.2.6. Threats to the Physical World and Human Society

The metaverse represents an expanded version of a CPSS [41]. It involves complex interactions and interconnections between physical systems, human society, and cyber systems. Threats in virtual worlds can have severe implications for physical infrastructures, personal safety, and human society:
  • Threats to Personal Safety: In the metaverse, hackers can exploit wearable devices, XR helmets, and indoor sensors like cameras to gather information on users’ daily routines and monitor their live locations, ultimately aiding in criminal activities such as burglary and endangering their safety [42].
  • Threats to Infrastructure Safety: The identification of software or system vulnerabilities within the complex metaverse allows hackers to use compromised devices as entry points for launching APT attacks on critical national infrastructures like power grid systems and high-speed rail systems.
  • Social Effects: Despite the appeal of the metaverse as a digital society, it can lead to severe side effects in human society, such as addiction, the spread of rumors, child exploitation, biased outcomes, extortion, cyberbullying, cyberstalking, and even simulated terrorist activities [43].

2.2.7. Threats to Metaverse Governance

The interactions among avatars in the metaverse, such as content creation, social activities, and the virtual economy, should mirror the social norms and regulations observed in the physical world to maintain compliance with digital norms and regulations [44]. In overseeing and governing the metaverse, it is crucial to address threats that could compromise system efficiency and security.

3. Related Works

The aims of this section are to examine the existing literature on metaverse security. References [45,46,47,48] address the security and privacy issues within the metaverse area. In addition, a study conducted by O’Brolchain et al. [49] in 2017 addressed the concerns surrounding security and privacy within the metaverse area, focusing on the communication between users and platform servers. In 2018, privacy was emphasized by Falchuk et al. [28]. They highlighted the significance of using avatars for communication between users. However, it was cautioned that if a malicious avatar is involved, it could potentially exploit and obtain sensitive information.
The security of the device utilized by the user to access the virtual world was examined by Guzman et al. [50] in 2019. Tan et al. [51] highlighted the utilization of blockchain technology in the metaverse for protecting user data and platform server security in 2022. Furthermore, the advantages of blockchain technology are also addressed in [52]. References [45,46,47,48,49,50,51,52] exclusively highlight the security concerns that arise in the metaverse environment when users interact with virtual realms. They do not suggest any authentication method to protect users’ communication when connecting to virtual worlds. A virtual reality teaching platform was proposed by Gan et al. [53] in 2021, aiming to offer users an immersive educational experience. This mechanism relies on the use of Elliptic Curve Cryptography (ECC) and asserts its ability to defend against all forms of attacks.
However, the security analysis indicates that the scheme is vulnerable to impersonation attacks in the presence of a malicious platform server, assuming the CK adversary model. On the other hand, there are only a few articles that can be utilized in the metaverse environment as well [54].
The authentication mechanisms utilizing ECC discussed in references [55,56,57] were found to be vulnerable to various types of attacks according to the security analysis conducted in [58,59]. In a study conducted in 2018, Falchuk et al. [33] highlighted the necessity of privacy in metaverse environments. They identified personal information, behavior, and communication data as major areas of concern when it comes to privacy.
The researchers cautioned that sharing personal information while interacting with potentially harmful avatars, such as through trading or chatting in virtual worlds, could make individuals susceptible to privacy violations. This could result in privacy invasion, impersonation, and identity theft by malicious actors who take advantage of the disclosed personal information. Yang et al. [60] declared in 2022 that by employing blockchain technology, data transparency, openness, authenticity, and efficiency can be achieved in metaverse environments. Ryn et al. [54] declared in 2022 that a system model would be developed using blockchain technology to guarantee secure communication and efficiently manage user identification data in metaverse environments. Additionally, they suggested a mutual authentication method incorporating biometric data and Elliptic Curve Cryptography (ECC).

4. Preliminaries

In this section, we go over basic preliminaries such as Biohashing and Elliptic Curve Cryptography (ECC).

4.1. Elliptic Curve Cryptography (ECC)

ECC uses an elliptic curve over a vast finite field, resulting in higher security performance with smaller key sizes than earlier public-key encryption techniques [61,62]. Assume that p is a large prime, that Fp is an abbreviation for prime fields, and that 4u3 + 27 r2 ≠ 0 (mod p). EP (u, r):y2 = x3 + u x + r (mod p) denotes a nonsingular elliptic curve that follows over Fp. Consider Q as the basis point for EP (u, r) as well as a positive integer t € Fp, where t stands for point multiplication. Q is equal to Q + ···+Q (t times).

4.2. Biohashing

The user’s biometric data can be utilized as an additional authentication factor and is an appropriate technique to recognize a genuine user. To validate users, Jin et al. [63] presented the biohashing function and showed how it may be used to transform user fingerprint data into a bit form:
  • A vector, V € Rn, is used to represent a biometric characteristic derived from the fingerprint.
  • Using the Blum–Blum–Shub method, a set of ri € Rn (i = 1···n) pseudo-random numbers is generated.
  • The Gram–Schmidt procedure is used to change the basis ri into an ori € Rn (i = 1, ···n) using generated pseudo-random numbers.
  • The inner product between V and ori is obtained, followed by the calculation for the biohash code bi:
b i = 0   if   ( V | ori ) τ   1   if   ( V | ori ) > τ
where τ is a threshold.

5. Proposed Secure Lightweight Authentication for Cyber–Physical–Social System (SLACPSS)

The process flow of the proposed protocol is categorized into five phases, namely initialization, user setup, avatar creation, login and authentication, and avatar authentication, to provide secure avatar-to-avatar interactions in virtual environments.

5.1. System Model

As shown in Figure 4, the certificate authority, users, platform servers, and database make up the system paradigm for a metaverse environment. They are explained below:
  • Certificate authority (CA): The certificate authority is a completely reliable entity that sets the initial system parameters and shares public information. The certificate authority obtains the user’s pseudo-identity, public key, and personal details from the user, which will be used to verify the user’s identity and are then stored in the database. Moreover, the certificate authority generates user credentials that need to be authenticated by the user and the platform servers. These credentials are then delivered to the user.
  • User: The user submits their pseudo-identity, public key, and personal details to the certificate authority for verification of their identity in order to join the metaverse. Subsequently, the user can interact with different platform servers by undergoing an authentication procedure that relies on the user’s pseudo-identity and credential information. Following that, the user can design an avatar and enter different virtual environments overseen by the platform servers. Moreover, the user can verify their identity with other avatars by utilizing the pseudo-identity and public key saved in the database, ensuring secure interactions between avatars in virtual spaces.
  • Platform Server: Each platform server offers a range of immersive services, including education and gaming, to users within virtual spaces. When a user tries to log into the platform server, their credentials and pseudo-identity are verified using the database and the public key of the certificate authority.
Figure 4. System model for metaverse as a Cyber–Physical–Social System.
Figure 4. System model for metaverse as a Cyber–Physical–Social System.
Computers 13 00225 g004
Furthermore, each platform server is tasked with handling request and response messages within their virtual spaces for avatar authentication procedures, and the notations and parameters used in the proposed scheme are given in Table 1.
The technique of the proposed system model is as follows:
  • The certificate authority requires users to share their pseudo-identity, public key, and personal information to verify their identity and grant access credentials for interacting with metaverse environments.
  • On each platform server, an avatar can be created using the user’s pseudo-identity, public key, and credential information. The user then sends an authentication message to the suitable platform server to gain access to the pertinent virtual spaces.
  • If the authentication process goes well, the platform server will provide the user with a session key.
  • The session key will then be used to establish a secure connection between the user and the platform server.
  • A user can communicate with other avatars after entering a virtual environment using an avatar. The avatar authentication phase can be handled by the user for safe interactions between avatars.

5.1.1. Initialization Step

As shown in Table 2 over Fp, CA chooses a nonsingular Elliptic Curve EP (u, r); a base point, P, is chosen using CA on EP (u, r), and CA chooses a private key, k ca.
The public key (PK; ca = kca·P) is created by CA. The following system parameters are published by {EP (u, r), P, PK ca, h (·); h b (·)}.

5.1.2. User Setup Step

Ui must verify the identification with the CA during the user setup procedure in order to obtain the credentials required to interact in the metaverse environment. The process for the user setup step, which is shown in Table 3, is described below.
  • ID i, PW i, and B i are entered by the Ui into SDi, which then makes a random integer, RN i, and a private key, ki. The public key (PK i = k i · P) and pseudo-identity (PID i = h (ID i || RN i)) are then calculated by Ui. Then, the Ui transmits the message {PID i, PK i, info i } to CA across a trust line, where info (i) is the Ui’s private information.
  • CA verifies the information and examines the database’s (PID I; PK i) uniqueness. If this process is finished successfully, CA makes a random number, xi, and calculates X i = x i · p, Sig i_ca = x i + h (PID i || PK i || X i) · k ca, where Sig i_ca is the signature value used to verify that Ui has been approved by the CA. Afterward, the CA transmits V i = (X i, Sig i-ca) and saves (PID i, PK i) in the database.
  • The CA transmits {Vi} to U i by the trusted line.
  • U i calculates Z = Vi ⊕ h (ID i || PW i|| RN i) and then saves Z in SD.

5.1.3. Creating an Avatar

  • To enter the virtual environment managed by the St, the Ui creates an avatar using SDi during the creating an avatar stage, and the avatar making process is shown in Table 4, which is detailed below.
  • ID i, PW i, and B i are entered by the U i into SDi and then they create and calculate a random number, RN I, and a private key (k i) and public key (PK i = k i · P). Then, Vi* = Z + h (IDi ||PWi||RNi) is calculated, and the user creates a random number (n i) and calculates Ni = ni · P and EM i = (N i||Sig i_ca) ⊕ h (avatar i||PID i||RN i).
  • Through a secure channel, the Ui transmits {avatar i, PID i, EM i } to the St.
  • The St retrieves PK i after checking PID i in the database, the St confirms the database’s uniqueness of (avatar i, PK i), and the St calculates (Ni ||Sig i_ca) = EMi ⊕ h (avatar i || PID i|| RN i) and Sig i_ca · P = x i · P + h (PID i ||PK i || X i) · PK ca.
  • The St saves (avatar i, PK i) in the database and publishes (avatar i, PK i).

5.1.4. Login and Authentication Step

In order to access the virtual area, a user must log in using an avatar. The processes that the U i and St undergo to obtain the session key to implement secure communication are listed below. The phase of login and authentication is shown in Table 5.
  • ID i, PW i, and B i are entered by the U i into SDi, and then a random number (n 1 and T1) is created and calculated.
  • The U i calculates N 1 = n 1 · P, Ver i - st = h (avatar i||PID i||T1) · K i, and EM 1 = (avatar i|| PID i|| Ver i - st) + h (N1||T1).
  • The U i transmits {EM 1, T 1} to St by a public channel.
  • Then, St receives {EM 1, T 1} from U i.
  • T1 is checked by the condition |T1* − T1|.
  • St calculates Ver i - st · P = ? h (avatar i|| PID i||T1) · PK i.
  • St creates T2 and n 2 and calculates N 2 = n 2 ·P.
  • SKi- st = h (avatar i||N2||T2) ·K st.
  • St calculates EM 2 = h (avatar i||PID i||N 2||T 2) ⊕ (SKi- st||T 2).
  • St transmits {EM 2, T 2} to U i by a public channel.
  • As soon as the U i receives {EM 2, T 2} from St, T2 is checked by the condition |T2* − T2|, and the user calculates SKi- st · P = h (avatar i||N2||T2) · PK st and EM*2 = h (a vatar i||PID i || N2||T 2) ⊕ (SKi- st||T 2) and verifies EM*2 =? EM 2.
Table 5. Login and authentication step.
Table 5. Login and authentication step.
User (Ui)                           Platform Server (St)
Input ID i, PW i, B i
Generate random number, n1 and T1
Compute N1 = P· n1
Compute Ver i – st = h (avatar i|| PID i||T1) · K i
EM 1 = (avatar i|| PID i||Ver i - st) + h (N1 ||T1)
                         { EM1, T 1}
           Computers 13 00225 i004
                         Check | T1* − T1|
                         Ver i - st·P =? h (avatar i|| PID i|| T1) · PK i
                       Generate T2 and n2
                       Compute N2 = P · n2
                       SKi - st = h (avatar i|| N2||T2) · K st
                       EM 2 = h (avatar i || PID i || N2||T 2) ⊕ (Ski – st || T 2)
            { EM2, T 2}
           Computers 13 00225 i005
Check |T2* − T2|
SKi - st · P = h (avatar i|| N2 || T2) · PK st
EM*2 = h (avatar i||PID i||N2||T 2) ⊕ (SKi - st||T 2)
Verifies EM*2 = ? EM 2

5.1.5. Avatar Authentication Step

Users have access to the avatar authentication stage only after exchanging session keys with the platform server and logging in, which ensures safe avatar interaction in the virtual environment. The platform server is simply in charge of forwarding request and response messages during this stage.
Avatars can execute mutual authentication in the virtual world using the procedure shown in Table 6.
  • U i creates a random number (n 3 and T3) and calculates N 3 = n 3 · P.
  • Ui calculates Ver i = h (avatar i|| avatar j || PID i|| PID j ||T3) · K i.
  • EM 3 = (PID i|| Ver i) ⊕ h (N3|| T3) is calculated.
  • U i calculates Req = SYE SKi-st (avatar j, EM 3, T3).
  • U i transmits {Req} to St by a public channel.
  • St calculates (avatar j, EM 3, T3) = SYD SKi-st (Req).
  • St calculates Req i j = SYE SKj-st (EM 3, T3).
  • St transmits {Req ij} to U j by a public channel.
  • U j calculates (EM 3, T3) = SYD SKj-st (Req i j).
  • PK i is retrieved by Uj after U j verifies PID in database.
  • U j verifies Ver i · P = ? h (avatar i ||avatar j ||PID i || PID j ||T3) · PK i.
  • U j creates T4 and n 4 and calculates N 4 = n 4 · P.
  • ver j = h (avatar j||avatar i||PID j ||PID i||T4) · K j.
  • EM 4 = (PID j || Ver j) h (N4|| T4).
  • Res = SYE SK j – st (avatar i, EM 4, N4, T4).
  • U j transmits {Res} to St by a public channel.
  • St calculates (avatar i, EM 4, N4, T4) = SYD SK j – st (Res).
  • Res i j = SYE SK i-st (EM 4, N4, T4).
  • St transmits {Res i j} to U i.
  • User i calculates (EM 4, N4, T4) = SYD SK i- st (Res i j).
  • (PID j ||Ver j) = EM 4 ⊕ h (N4||T4).
  • PK j is retrieved by Ui after Ui verifies PID j in database.
  • ver j · P = ? h (avatar j ||avatar i ||PID j||PID i||T4) · PK j is verified.
  • If every stage is successfully performed, the U i and U j can demonstrate their ownership of avatar i and avatar j.

6. Security Analysis

An informal security analysis of the proposed system is conducted similar to the one in [55]. The analysis shows that the proposed approach is resistant to various attacks, such as impersonation, a stolen smart device, MITM and insider attacks, offline password guessing, platform server spoofing, privileged insiders, and ephemeral secret leakage. In addition, our scheme provides perfect forward secrecy, user anonymity, and mutual authentication. Siddhartha et al. [64] proposed a Lightweight Authentication Protocol using Implicit Certificates for Securing IoT Systems (LAPIC) and evaluated the suggested protocol against several existing protocols. LAPIC is resistant to various attacks. We compared the proposed protocol (SLACPSS) with LAPIC and previous protocols used in [64] by the same attacks, as presented in Table 7.

6.1. The Theft of a Smart Device

Assume, using the adversary paradigm, that an opponent has access to the SDi and is able to obtain the stored parameter, Z. To ensure that the opponent cannot discover important information about the Ui, using IDi, PWi, and Bi, all of the arguments are hashed and XORed. Our system (SLACPSS) can therefore defend against attacks involving the theft of a smart device.

6.2. Offline Guessing of Passwords

Assume that a malicious party intercepts the messages {EM1, T1} and {EM2, T2} as they are being transmitted over the public channel, as shown in Figure 5, to obtain the parameter, Z, that is kept on the SDi. Following that, the attacker can attempt to compute the Ui’s sensitive information. However, without knowledge of IDi, PWi, and Bi, the adversary is unable to derive any sensitive data, such as Z = Vi ⊕ h (IDi|| PWi|| RNi). As a result, our system (SLACPSS) is protected against offline guessing of passwords.

6.3. Impersonation Attacks

Consider the possibility that someone with bad intentions can listen to a message being transmitted using a public channel. If an adversary seeks to impersonate the Ui, they should make a login request message that contains the characters {EM1,T1}. The adversary does not have permission to access the Ui’s private key (ki), random numbers (RNi; n1), identity (Idi), or password (PWi); therefore, they are unable to construct the login request message. Therefore, our system (SLACPSS) prevents impersonation attacks.

6.4. Platform Server Spoofing Attacks

Assume an adversary can show these messages ({EM1, T1}, {EM2, T2}) using an insecure channel to spoof the St. The attacker can then try to deceive legitimate users to create a replay message {EM*2, T*2}. However, the suggested approach protects against replay messages because the adversary lacks access to the private key (kst) and does not know the random number (n2). Consequently, our proposed system (SLACPSS) can withstand server spoofing on platform attacks.

6.5. Attacks by Replay and MITM

Assume the adversary captures the messages being transmitted ({EM1, T1}; {EM2, T2}) through the public channel. However, the adversary must validate the timestamps (T1; T2) and random numbers (n1; n2) to ensure the messages are current, For the login and authentication phase, the adversary cannot utilize the same messages. Additionally, the adversary has to know the random integers (n1; n2) and private keys (ki; kst) in order to calculate EM1 and EM2. Therefore, both replay and MITM attacks cannot be used against our approach (SLACPSS).

6.6. Forward Secrecy

Assume that the adversary captures the messages ({EM1, T1} and {EM2, T2}) through the public channel and acquires permanent secret keys {ki, kst}. After that, the adversary can attempt to calculate the SKi- st = h (avatar i || N2||T2) · Kst, but the adversary cannot calculate the SKi- st without knowing n2. Thus, our approach (SLACPSS) offers perfect forward secrecy.

6.7. Insider Attacks

An adversary can attempt to establish a malicious avatar, gain access to the St, and read the messages ({EM1, T1}, {EM2, T2}). However, the adversary is unable to determine the parameters needed to pass for the Ui, such as Ver i -st = h (avatar i || PID i ||T1) · PK i, without the private key (ki) and random number (n1). Additionally, suppose the adversary acquires the messages (Req, Reqij, Res, and Resij). Because the adversary does not know the SKi- st and SK j- st, they are unable to obtain the data needed to spoof avatars. Thus, insider assaults will not succeed against our scheme.

6.8. Superior Insiders Attacks

Assume that the adversary is one of the insider users of the St and the adversary captures the message {avatar i, PIDi, EM i}. In the avatar generation phase, the adversary captures the two messages ({EM1, T1} and {EM2, T2}) through the insecure channel. Without knowing n1 and ki, the adversary cannot make any data to impersonate the Ui, such as Ver i-st and EM1. Assume, furthermore, that the opponent has access to the messages (Req, Reqij, Res, and Resij). However, without n3, n4, ki, and kj, the adversary cannot gain the crucial information needed to impersonate avatars. As a result, our approach (SLACPSS) can defend against superior insider attacks.

6.9. Temporary or Ephemeral Secret Leakage Attack

An adversary tries to make ephemeral and long-part secret values. Then, they try to calculate the SKi-st = h (avatar i||N2||T2) · Kst generated between the Ui and St as follows:
  • An adversary obtains the ephemeral secret values n1 and n2 to compute SKi-st.
  • Assume that the adversary captures the long-part secret values Xi, ki, and K st to compute SKi-st.
  • Without knowing the ephemeral numbers n1 and n2, S1 cannot be obtained.
Therefore, to calculate SKi-st, the adversary needs to possess both the short-part and long-part secret values. As a result, our approach (SLACPSS) can stop temporary secret leak attacks.

6.10. User Anonymity

Assume the adversary has the ability to obtain SDi through intercepting sent signals. They are unable to obtain the true identity (Idi) though the proposed system, so the Ui makes use of a pseudo-identity PID i = h (ID i || RN i) instead of ID i in the metaverse settings to ensure that ID i is never made public to any entities. Our approach (SLACPSS) can guarantee user anonymity.

6.11. Mutual Authentication

In the login and authentication step, the Ui transmits the login request message {EM1, T1} to the St. Then, the St obtains Veri- st by decrypting EM1 and retrieves PKi from the database using PIDi. Then, the St verifies (Ver i - st · P = ? h (avatar i || PID i ||T1) · PK i). If it is equal, the St can authenticate the Ui, and the St transmits messages {EM2, T2} to the Ui. The Ui calculates EM*2 and authenticates the St by checking that EM*2 = ? EM 2. Our approach (SLACPSS) also includes a phase for avatar authentication to enable safe interactions between avatars in virtual environments. When avatar i and avatar j desire to verify each other, they communicate over the St and exchange the request message (Reqij) and response message (Resij). Avatar i then acquires Ver j via EM4 and uses PIDj to extract PKj from the database. Then, the Ui verifies (Ver i · P = ? h (avatar i || avatar j||PID i || PID j ||T3) · PK i). Avatar i can verify avatar j if the equation is correct. Comparably, avatar j can confirm avatar i’s identity by checking (Ver i = h (avatari ||avatar j||PID i||PID j ||T3) · K i).

7. Conclusions

A CPSS is a base class and consists of three basic components (cyber space–physical space–social space). We have proven that the metaverse is an element derived from a CPSS and consists of the same components that a CPSS is composed of. Therefore, the metaverse is an example of a CPSS. We proposed a lightweight authentication approach (SLACPSS) that is based on hash and XOR operations using Elliptic Curve Cryptography (ECC) and biometric data. The proposed approach achieves mutual authentication (user i and user j can demonstrate their ownership of avatar i and avatar j), session key agreement, the device’s identity confidentiality, and resistance to many attacks while having low computing cost, communication, and storage overhead. We conducted an informal study to prove that the proposed Lightweight mutual authentication system (SLACPSS) is resistant to various attacks, such as impersonation, stolen smart devices, MITM, insider attacks, offline password guessing, platform server spoofing, privileged insiders, and ephemeral secret leakage. In addition, our proposal provides perfect forward secrecy, user anonymity, and mutual authentication. We compared the proposed protocol (SLACPSS) with previous protocols, and the analysis shows that the proposed protocol is lightweight and secure.

Author Contributions

Conceptualization, M.H. and T.A.; methodology, A.Z.M.A.; software, A.Z.M.A.; validation, A.Z.M.A., M.H. and T.A.; formal analysis, M.H.; investigation, A.Z.M.A.; writing—original draft preparation, A.Z.M.A.; writing—review and editing, T.A.; visualization, A.Z.M.A.; supervision, M.H. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

No new data were created or analyzed in this study. Data sharing is not applicable to this article.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Zhu, Y.; Tan, Y.; Li, R.; Luo, X. Cyber-physical-social-thinking modeling and computing for geological information service system. In Proceedings of the International Conference on Identification, Information, and Knowledge in the Internet of Things (IIKI), Beijing, China, 22–23 October 2015. [Google Scholar]
  2. Xiong, G.; Zhu, F.; Liu, X.; Dong, X.; Huang, W.; Chen, S.; Zhao, K. Cyber-physical-social system in intelligent transportation. IEEE CAA J. Autom. Sin. 2015, 2, 320–333. [Google Scholar] [CrossRef]
  3. Cassandras, C.G. Smart cities as cyber-physical social systems. Engineering 2016, 2, 156–158. [Google Scholar] [CrossRef]
  4. Gharib, M.; Lollini, P.; Bondavalli, A. Towards an Approach for Analyzing Trust in Cyber-Physical-Social Systems. In Proceedings of the 12th System of Systems Engineering Conference (SoSE), Waikoloa, HI, USA, 18–21 June 2017; pp. 18–21. [Google Scholar]
  5. Ashari, I.F. Implementation of cyber-physical-social system based on service oriented architecture in smart tourism. J. Appl. Inform. Comput. 2020, 4, 66–73. [Google Scholar] [CrossRef]
  6. Perno, J.; Probst, C.W. Behavioural profiling in cyber-social systems. In Human Aspects of Information Security, Privacy and Trust; Springer: Cham, Switzerland, 2017; pp. 507–517. [Google Scholar]
  7. Camtepe, S.A.; Yener, B. Modeling and detection of complex attacks. In Proceedings of the Third International Conference on Security and Privacy in Communications Networks and the Workshops—Secure Comm, Nice, France, 17–21 September 2007; pp. 234–243. [Google Scholar]
  8. Pasandideh, S.; Pereira, P.; Gomes, L. Cyber-Physical-Social Systems: Taxonomy, Challenges, and Opportunities. IEEE Access 2022, 10, 42404–42419. [Google Scholar] [CrossRef]
  9. Ayiter, E. Integrative art education in a metaverse: Ground. Technoetic Arts 2008, 6, 41–53. [Google Scholar] [CrossRef]
  10. Collins, C. Looking to the future: Higher education in the Metaverse. Educ. Rev. 2008, 43, 50–52. [Google Scholar]
  11. Díaz, J.; Saldaña, C.; Avila, C. Virtual world as a resource for hybrid education. Int. J. Emerg. Technol. Learn. 2020, 15, 94–109. [Google Scholar] [CrossRef]
  12. Suh, W.; Ahn, S. Utilizing the metaverse for learner-centered constructivist education in the postpandemicera: An analysis of elementary school students. J. Intell. 2022, 10, 17. [Google Scholar] [CrossRef]
  13. Miks, J.; McIlwaine, J. Keeping the World’s Children Learning through COVID-19. Available online: https://www.unicef.org/coronavirus/keeping-worlds-children-learning-through-covid-19 (accessed on 20 December 2023).
  14. Maharg, P.; Owen, M. Simulations, learning and the metaverse: Changing cultures in legal education. J. Inf. Law Technol. 2007, 5, 1–19. [Google Scholar]
  15. Kanematsu, H.; Fukumura, Y.; Ogawa, N.; Okuda, A.; Taguchi, R.; Nagai, H. Practice and Evaluation of Problem Based Learning in Metaverse. In Proceedings of the ED-MEDIA 2009 (World Conference on Educational Multimedia, Hypermedia & Telecommunications), Honolulu, HI, USA, 22–26 June 2009; Association for the Advancement of Computing in Education: Waynesville, NC, USA, 2009; pp. 2862–2870. [Google Scholar]
  16. Mystakidis, S. Metaverse. Encyclopedia 2022, 2, 486–497. [Google Scholar] [CrossRef]
  17. Skalidis, I.; Muller, O.; Fournier, S. Cardioverse: The cardiovascular medicine in the era of metaverse. Trends Cardiovasc. Med. 2022, 33, 471–476. [Google Scholar] [CrossRef]
  18. Smith, A.H.; Milton, R.; Dearden, J.; Batty, M. Virtual Cities: Digital Mirrors into a Recursive World; Centre for Advanced Spatial Analysis: London, UK, 2008. [Google Scholar]
  19. Aurigi, A. Smart cities, metaverses, and the relevance of place. IET Smart Cities 2022, 4, 157–159. [Google Scholar] [CrossRef]
  20. Duan, H.; Li, J.; Fan, S. Metaverse for Social Good: A University Campus Prototype. In Proceedings of the Association for Computing Machinery, Virtual, 20–24 October 2021; pp. 153–161. [Google Scholar]
  21. Heller, L.; Goodman, L. What do avatars want now? Posthuman embodiment and the technological sublime. In Proceedings of the 22nd International Conference on Virtual System & Multimedia (VSMM), Kuala Lumpur, Malaysia, 17–21 October 2016; pp. 1–4. [Google Scholar]
  22. Genay, A.C.S.; Lecuyer, A.; Hachet, M. Being an avatar for real: A survey on virtual embodiment in augmented reality. IEEE Trans. Vis. Comput. Graph. 2021, 28, 5071–5090. [Google Scholar] [CrossRef] [PubMed]
  23. ISO/IEC 23005 (MPEG-V) Standards. Available online: https://mpeg.chiariglione.org/standards/mpeg-v.html (accessed on 20 December 2023).
  24. IEEE 2888 Standards. Available online: https://sagroups.ieee.org/2888/ (accessed on 20 December 2023).
  25. Xu, M.; Ng, W.C.; Lim, W.Y.B.; Kang, J.; Xiong, Z.; Niyato, D.; Yang, Q.; Shen, X.; Miao, C. A full dive into realizing the edge-enabled metaverse: Visions, enabling technologies, and challenges. IEEE Commun. Surv. Tutor. 2023, 25, 656–700. [Google Scholar] [CrossRef]
  26. Jayasinghe, U.; Lee, G.M.; Um, T.W.; Shi, Q. Machine learning based trust computational model for IoT services. IEEE Trans. Sustain. Comput. 2019, 4, 39–52. [Google Scholar] [CrossRef]
  27. Wang, Y.; Su, Z.; Zhang, N.; Xing, R.; Liu, D.; Luan, T.H.; Shen, X. A Survey on Metaverse: Fundamentals, Security, and Privacy. IEEE Commun. Surv. 2022, 25, 319–352. [Google Scholar] [CrossRef]
  28. Hu, P.; Li, H.; Fu, H.; Cansever, D.; Mohapatra, P. Dynamic defense strategy against advanced persistent threat with insiders. In Proceedings of the IEEE Conference on Computer Communications (INFOCOM), Hong Kong, China, 26 April–1 May 2015; pp. 747–755. [Google Scholar]
  29. Su, Z.; Wang, Y.; Xu, Q.; Zhang, N. LVBS: Lightweight vehicular blockchain for secure data sharing in disaster rescue. IEEE Trans. Dependable Secur. Comput. 2022, 19, 19–32. [Google Scholar] [CrossRef]
  30. Liang, G.; Weller, S.R.; Zhao, J.; Luo, F.; Dong, Z.Y. The 2015 Ukraine blackout: Implications for false data injection attacks. IEEE Trans. Power Syst. 2017, 32, 3317–3318. [Google Scholar] [CrossRef]
  31. Kumar, S.; Chhugani, J.; Kim, C.; Kim, D.; Nguyen, A.; Dubey, P.; Bienia, C.; Kim, Y. Second life and the new generation of virtual worlds. Computer 2008, 41, 46–53. [Google Scholar] [CrossRef]
  32. Hendaoui, A.; Limayem, M.; Thompson, C.W. 3D social virtual worlds: Research issues and challenges. IEEE Internet Comput. 2008, 12, 88–92. [Google Scholar] [CrossRef]
  33. Falchuk, B.; Loeb, S.; Neff, R. The social metaverse: Battle for privacy. IEEE Technol. Soc. Mag. 2018, 37, 52–61. [Google Scholar] [CrossRef]
  34. Ometov, A.; Bezzateev, S.V.; Kannisto, J.; Harju, J.; Andreev, S.; Koucheryavy, Y. Facilitating the delegation of use for private devices in the era of the internet of wearable things. IEEE Internet Things J. 2017, 4, 843–854. [Google Scholar] [CrossRef]
  35. Li, X.; He, J.; Vijayakumar, P.; Zhang, X.; Chang, V. A verifiable privacy-preserving machine learning prediction scheme for edge-enhanced HCPSs. IEEE Trans. Ind. Inform. 2021, 18, 5494–5503. [Google Scholar] [CrossRef]
  36. Wei, J.; Li, J.; Lin, Y.; Zhang, J. LDP-based social content protection for trending topic recommendation. IEEE Internet Things J. 2021, 8, 4353–4372. [Google Scholar] [CrossRef]
  37. Ning, H.; Wang, H.; Lin, Y.; Wang, W.; Dhelim, S.; Farha, F.; Ding, J.; Daneshmand, M. A survey on metaverse: The state-of-the-art, technologies, applications, and challenges. IEEE Internet Things J. 2021, 10, 14671–14688. [Google Scholar]
  38. Song, H.; Luo, T.; Wang, X.; Li, J. Multiple sensitive values-oriented personalized privacy preservation based on randomized response. IEEE Trans. Inf. Forensics Secur. 2020, 15, 2209–2224. [Google Scholar] [CrossRef]
  39. Liao, S.; Wu, J.; Bashir, A.K.; Yang, W.; Li, J.; Tariq, U. Digital twin consensus for blockchain-enabled intelligent transportation systems in smart cities. IEEE Trans. Intell. Transp. Syst. 2021, 23, 22619–22629. [Google Scholar] [CrossRef]
  40. Ritzdorf, H.; Soriente, C.; Karame, G.O.; Marinovic, S.; Gruber, D.; Capkun, S. Toward shared ownership in the cloud. IEEE Trans. Inf. Forensics Secur. 2018, 13, 3019–3034. [Google Scholar] [CrossRef]
  41. Zhou, Y.; Yu, F.R.; Chen, J.; Kuo, Y. Cyber-physical-social systems: A state-of-the-art survey, challenges and opportunities. IEEE Commun. Surv. Tutor. 2020, 22, 389–425. [Google Scholar] [CrossRef]
  42. Casey, P.; Baggili, I.; Yarramreddy, A. Immersive virtual reality attacks and the human joystick. IEEE Trans. Dependable Secur. Comput. 2021, 18, 550–562. [Google Scholar] [CrossRef]
  43. The Metaverse Offers a Future Full of Potential—For Terrorists and Extremists, Too. Available online: https://theconversation.com/the-metaverse-offers-a-future-full-of-potential-for-terrorists-and-extremists-too-173622 (accessed on 7 January 2024).
  44. Almeida, V.; Filgueiras, F.; Doneda, D. The ecosystem of digital content governance. IEEE Internet Comput. 2021, 25, 13–17. [Google Scholar] [CrossRef]
  45. Bruun, A.; Stentoft, M.L. Lifelogging in the wild: Participant experiences of using lifelogging as a research tool. In Proceedings of the IFIP Conference on Human-Computer Interaction, Paphos, Cyprus, 2–6 September 2019; pp. 431–451. [Google Scholar]
  46. Lim, W.Y.B.; Xiong, Z.; Niyato, D.; Cao, X.; Miao, C.; Sun, S.; Yang, Q. Realizing the metaverse with edge intelligence: A match made in heaven. IEEE Wirel. Commun. 2023, 30, 64–71. [Google Scholar] [CrossRef]
  47. Facebook Inc. Rebrands as Meta to Stress “Metaverse” Plan; Facebook Inc.: Menlo Park, CA, USA, 2021. [Google Scholar]
  48. Leenes, R. Privacy in the metaverse: Regulating a complex social construct in a virtual world. In The Future of Identity in the Information Society; Springer: Berlin/Heidelberg, Germany, 2008; pp. 95–112. [Google Scholar]
  49. Shang, J.; Chen, S.; Wu, J.; Yin, S. ARSpy: Breaking location-based multi-player augmented reality application for user location tracking. IEEE Trans. Mob. Comput. 2022, 21, 433–447. [Google Scholar] [CrossRef]
  50. Nevelsteen, K.J. Virtual world, defined from a technological perspective and applied to video games, mixed reality, and the metaverse. Comput. Animat. Virtual Worlds 2018, 29, e1752. [Google Scholar] [CrossRef]
  51. Nguyen, C.T.; Hoang, D.T.; Nguyen, D.N.; Dutkiewicz, E. Metachain: A novel blockchain-based framework for metaverse applications. In Proceedings of the IEEE 95th Vehicular Technology Conference: (VTC2022-Spring), Helsinki, Finland, 19–22 June 2022. [Google Scholar]
  52. Sanchez, J. Second life: An interactive qualitative analysis. In Proceedings of the Society for Information Technology & Teacher Education International Conference, San Antonio, TX, USA, 26 March 2007; pp. 1240–1243. [Google Scholar]
  53. Gan, L.; Wang, D.; Wang, C.; Xiao, D.; Zhang, M.; Wang, Z.; Li, F. Design and implementation of multimedia teaching platform for situational teaching of music appreciation course based on virtual reality. Int. J. Electr. Eng. Educ. 2021, 60, 40–48. [Google Scholar] [CrossRef]
  54. Ryu, J.; Son, S.; Lee, J.; Park, Y.; Park, Y. Design of secure mutual authentication scheme for metaverse environments using blockchain. IEEE Access 2022, 10, 98944–98958. [Google Scholar] [CrossRef]
  55. Panda, P.K.; Chattopadhyay, S. A secure mutual authentication protocol for iot environment. J. Reliab. Intell. Environ. 2020, 6, 79–94. [Google Scholar] [CrossRef]
  56. Haq, I.U.; Wang, J.; Zhu, Y. Secure two-factor lightweight authentication protocol using self-certified public key cryptography for multi-server 5G networks. J. Netw. Comput. Appl. 2020, 161, 102660. [Google Scholar] [CrossRef]
  57. Li, Y.; Xu, M.; Xu, G. Blockchain-based mutual authentication protocol without CA. J. Supercomput. 2022, 78, 17261–17283. [Google Scholar] [CrossRef]
  58. Chen, F.; Xiao, Z.; Xiang, T.; Fan, J.; Truong, H.L. A Full Lifecycle Authentication Scheme for Large-scale Smart IoT Application. IEEE Trans. Dependable Secur. Comput. 2022, 20, 2221–2237. [Google Scholar] [CrossRef]
  59. Kumar, P.; Om, H. A secure and efficient authentication protocol for wireless applications in multi-server environment. Peer--Peer Netw. Appl. 2022, 15, 1939–1952. [Google Scholar] [CrossRef]
  60. Yang, Q.; Zhao, Y.; Huang, H.; Xiong, Z.; Kang, J.; Zheng, Z. Fusing blockchain and AI with metaverse: A survey. IEEE Open J. Comput. Soc. 2022, 3, 122–136. [Google Scholar] [CrossRef]
  61. Koblitz, N. Elliptic curve cryptosystems. Math. Comput. 1987, 48, 203–209. [Google Scholar] [CrossRef]
  62. Ryu, J.; Oh, J.; Kwon, D.; Son, S.; Lee, J.; Park, Y.; Park, Y. Secure ECC-based three-factor mutual authentication protocol for telecare medi1 cal information system. IEEE Access 2022, 10, 11511–11526. [Google Scholar] [CrossRef]
  63. Teoh, A.B.J.; Ngo, D.; Goh, A. BioHashing: Two factor authen1 tication featuring fingerprint data and tokenized random number. Pattern Recognit. 2004, 37, 2245–2255. [Google Scholar]
  64. Siddhartha, V.; Gaba, G.S.; Kansal, L. A Lightweight Authentication Protocol using Implicit Certificates for Securing IoT Systems. In Proceedings of the International Conference on Computational Intelligence and Data Science (ICCIDS 2019), Punjab, India, 6–7 September 2019; pp. 85–96. [Google Scholar]
  65. Sciancalepore, S.; Capossele, A.; Piro, G.; Boggia, G.; Bianchi, G. Key Management Protocol with Implicit Certificates for IoT systems. In Proceedings of the 2015 Workshop on IoT challenges in Mobile and Industrial Systems, Florence, Italy, 18 May 2015; pp. 37–42. [Google Scholar]
  66. Porambage, P.; Kumar, P.; Schmitt, C.; Gurtov, A.; Ylianttila, M. Certificate-Based Pairwise Key Establishment Protocol for Wireless Sensor Networks. In Proceedings of the IEEE 16th International Conference on Computational Science and Engineering, Sydney, NSW, Australia, 3–5 December 2013; pp. 667–674. [Google Scholar]
  67. Kumar, P.; Gurtov, A.; Iinatti, J.; Ylianttila, M.; Sain, M. Lightweight and Secure Session-Key Establishment Scheme in Smart Home Environments. IEEE Sens. J. 2016, 16, 254–264. [Google Scholar] [CrossRef]
  68. Kumar, P.; Braeken, A.; Gurtov, A.; Iinatti, J.; Ha, P.H. Anonymous Secure Framework in Connected Smart Home Environments. IEEE Trans. Inf. Forensics Secur. 2017, 12, 968–979. [Google Scholar] [CrossRef]
  69. Li, Y. Design of a Key Establishment Protocol for Smart Home Energy Management System. In Proceedings of the Fifth International Conference on Computational Intelligence, Communication Systems and Networks, Madrid, Spain, 5–7 June 2013; pp. 88–93. [Google Scholar]
  70. Vaidya, B.; Makrakis, D.; Mouftah, H. Device Authentication mechanism for smart energy home area networks. In Proceeding of the IEEE, International Conference on Consumer Electronics (ICCE), Las Vegas, NV, USA, 9–12 January 2011; pp. 787–788. [Google Scholar]
  71. Han, K.; Kim, J.; Shon, T.; Ko, D. A novel secure key paring protocol for rf4ce ubiquitous smart home systems. Pers. Ubiquitous Comput. 2013, 17, 945–949. [Google Scholar] [CrossRef]
  72. Sciancalepore, S.; Piro, G.; Boggia, G.; Bianchi, G. Public Key Authentication and Key Agreement in IoT Devices with Minimal Airtime Consumption. IEEE Embed. Syst. Lett. 2017, 9, 1–4. [Google Scholar] [CrossRef]
  73. Patel, S.; Patel, D.R.; Navik, A.P. Energy efficient integrated authentication and access control mechanisms for Internet of Things. In Proceedings of the IEEE International Conference on Internet of Things and Applications (IOTA), Pune, India, 22–24 January 2016; pp. 304–309. [Google Scholar]
  74. Hossain, M.; Noor, S.; Hasan, R. HSC-IoT: A Hardware and Software Co-Verification Based Authentication Scheme for Internet of Thing. In Proceedings of the 5th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud), San Francisco, CA, USA, 6–8 April 2017; pp. 109–116. [Google Scholar]
Figure 2. The metaverse as a Cyber–Physical–Social System.
Figure 2. The metaverse as a Cyber–Physical–Social System.
Computers 13 00225 g002
Figure 3. Security threats to the metaverse [27].
Figure 3. Security threats to the metaverse [27].
Computers 13 00225 g003
Figure 5. Authentication message transition.
Figure 5. Authentication message transition.
Computers 13 00225 g005
Table 1. Notations and parameters.
Table 1. Notations and parameters.
No.NotationDescription
1UGCUser-Generated Content
2MITMMan in the Middle
3HMDsHead-Mounted Displays
4CACertificate Authority
5U iUser
6StPlatform Server
7ID iIdentity of Ui
8PIDiPseudo-Identity of Ui
9PWiPassword of Ui
10B iBiometric Information of Ui
11SD iSmart Device of Ui
12AvatariAvatar Identity of U i
13info iPersonal Information of U i
14PK ca, PK i, PK stPublic Key of CA, U i, and St
15K ca, K i, K stPrivate Key of CA, U i, and St
16Sig i_caSignature Value Generated by CA
17RNi, xi, ni, n1, n2, n3, n4 Random Numbers
18T1, T2, T3, T4Timestamp
19SKSession Key
20SYE K, SYD KSymmetric Encryption and Dec
21h (·)One-Side Hashing Method
22h b (·)Biohash Function
23Exclusive OR Operation
24||Concatenation
Table 2. Initialization phase.
Table 2. Initialization phase.
Certificate Authority (CA)
Over Fp, CA chooses a nonsingular Elliptic Curve EP (u, r).
A base point is chosen using CA (P on EP (u, r)).
CA chooses a secret key, k ca
PK ca = kca + P is created by CA.
The following system parameters are published by CA:
EP (u, r); P; PK ca; h (•); h b (•)
Table 3. User setup step.
Table 3. User setup step.
 User (Ui)                     Certificate Authority (CA)
Input ID i, PW i, B i
Generate random number, RN i
Generate private key, k i
PK i = k i·P
Compute PID i = h (ID i|| RN i)
                { PIDi, PK i, info i}
           Computers 13 00225 i001
                  Check the uniqueness (PID i, PK i) in database
                  Verify info i
                  Generate random number x i
                  Compute X i = x i·p
                  Sig i_ca = x i + h (PID i || PK i||X i) · kca
                  V i = (Xi, Sig i_ca)
                  saves (PID i, PK i) in database
         {Vi}
   Computers 13 00225 i002

Compute Z = Vi ⊕ h (IDi || PW i || RN i)
save {Z} in SD i
Table 4. Creating an avatar.
Table 4. Creating an avatar.
User (Ui)                                  Platform Server (St)
Input ID i, PW i, B i
Compute Vi* = Z + h (ID i|| PW i|| RN i)
Verify Vi* = Vi
Generate avatar i and random number, n i
Compute Ni = n i · P
EM i = (N i||Sig i_ca) ⊕ h (avatar i || PID i || RN i)

                    { avatari, PID i, EM i}
                  Computers 13 00225 i003

                    Check PID in database and retrieve PK i
                    Check uniqueness (avatar i, PK i) in database
                      Compute (N i|| Sig i_ca) = EM i ⊕ h (avatar i|| PIDi ||RNi)
                      Sig i – ca · P = x i · P + h (PID i|| PK i ||Xi) · k ca · P
                      Sig i_ca·P =X i + h (PID i || PK i|| X i) · Pk ca
                      save {avatar i, PK i} in database
                      Publish { avatar i, PK i } in virtual space
Table 6. Avatar authentication step.
Table 6. Avatar authentication step.
 User (U)          Platform Server (St)          User (Uj)
Generate n3 and T3
Compute N3 = P · n3
Compute Ver i = h (avatar i|| avatar j || PID i|| PID j||T3) · K i
EM 3 = (PID i||Ver i) ⊕ h (N3 ||T3)
Req = SYE SK i-st (avatar j, EM 3, T3)
               { Req }
          Computers 13 00225 i006
                 Computes
               (avatar j, EM 3,T3) = SYD SK i-st (Req)
               Req i j = SYE SKj-st (EM 3,T3)
                          { Req i j}
                   Computers 13 00225 i007
                        Compute (EM 3, T3) = SYD SK j-st(Reqi j)
                        Check PID in database and retrieve PKi
                        Verify
                           Ver i · P = ? h (avatar i||avatar j ||PID i||PID j||T3) ·PK i
                        Generate n 4 and T4
                        Compute N4 = P· n4
                        ver j = h (avatar j || avatar i|| PID j || PID i||T4) · K j
                        EM 4 = (PID j|| Ver j) ⊕ h (N4||T4)
                     {Res }   Res = SYE SK j-st(avatar i, EM 4, N4, T4)
            Computers 13 00225 i008
                Compute
                (avatar i, EM 4, N4, T4) = SYD SK j-st(Res)
                Res i j = SYE SKi-st (EM 4, N4, T4)
   { Resij}
Computers 13 00225 i009
Compute
(EM 4, N4, T4) = SYD SK i-st(Res i j)
(PID j|| Ver j) = EM 4 ⊕ h (N4||T4)
Check PID j in database and retrieves PK j
Verifies
ver j · P = ?h (avatar j || avatar i|| PID j || PID i||T4) · PK j
If okay, U i and U j can demonstrate that avatars i and j are authenticated
Table 7. Evaluation and comparison of prevention protocols.
Table 7. Evaluation and comparison of prevention protocols.
ProtocolsTheft of a Smart DeviceOffline Guessing of PasswordsImpersonationPlatform Server Spoofing AttacksEphemeral Secret Leakage AttackInsider Attack
Sciancalepore et al. [65], 2015××××
Porambage et al. [66], 2013××
Kumar et al. [67], 2016××
Kumar et al. [68], 2017×××
Li et al. [69], 2013××××
Vaidya et al. [70], 2011××
Han et al. [71], 2013××××
Sciancalepore et al. [72], 2017×××
Patel et al. [73], 2016×××××
Hossain et al. [74], 2017××××××
Siddhartha et al. [64], 2019×
RYU et al. [54], 2022
Proposed protocol (SLACPSS)
ProtocolsSuperior Insiders AttacksForward SecrecyUser AnonymityMutual Authentication
Sciancalepore et al. [65], 2015××
Porambage et al. [66], 2013×
Kumar et al. [67], 2016
Kumar et al. [68], 2017×
Li et al. [69], 2013××
Vaidya et al. [70], 2011××
Han et al. [71], 2013×
Sciancalepore et al. [72], 2017××
Patel et al. [73], 2016×
Hossain et al. [74], 2017××
Siddhartha et al. [64], 2019×
RYU et al. [54], 2022
Proposed protocol (SLACPSS)
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Abed, A.Z.M.; Abdelkader, T.; Hashem, M. SLACPSS: Secure Lightweight Authentication for Cyber–Physical–Social Systems. Computers 2024, 13, 225. https://doi.org/10.3390/computers13090225

AMA Style

Abed AZM, Abdelkader T, Hashem M. SLACPSS: Secure Lightweight Authentication for Cyber–Physical–Social Systems. Computers. 2024; 13(9):225. https://doi.org/10.3390/computers13090225

Chicago/Turabian Style

Abed, Ahmed Zedaan M., Tamer Abdelkader, and Mohamed Hashem. 2024. "SLACPSS: Secure Lightweight Authentication for Cyber–Physical–Social Systems" Computers 13, no. 9: 225. https://doi.org/10.3390/computers13090225

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop