Comnet S 24 04092
Comnet S 24 04092
Manuscript Number:
Keywords: Web 3.0; Internet of Things; 5G; Blockchain; Semantic Web; Artificial Intelligence;
Decentralized
Networks
Mohammad Jamshidi
Manh Bui
Nam Chu
Chi-Hieu Nguyen
Cong Nguyen
Diep Nguyen
Eryk Dutkiewicz
Abstract: Web 3.0 represents the next stage of Internet evolution, aiming to empower users with
increased autonomy, efficiency, quality, security, and privacy. This evolution can
potentially democratize content access by utilizing the latest developments in enabling
technologies. In this paper, we conduct an in-depth survey of enabling technologies in
the context of Web 3.0, such as blockchain, semantic web, 3D interactive web,
Metaverse, Virtual Reality/Augmented Reality, Internet of Things (IoT) technology, and
their roles in shaping Web 3.0. We commence by providing a comprehensive
background of Web 3.0, including its concept, basic architecture, potential applications,
and industry adoption. Subsequently, we examine recent breakthroughs in IoT, 5G,
and blockchain technologies that are pivotal to Web 3.0 development. Following that,
other enabling technologies, including AI, semantic web, and 3D interactive web, are
discussed. Utilizing these technologies can effectively address the critical challenges in
realizing Web 3.0, such as ensuring decentralized identity, platform interoperability,
data transparency, reducing latency, and enhancing the system's scalability. Finally,
we highlight significant challenges associated with Web 3.0 implementation,
emphasizing potential solutions and providing insights into future research directions in
this field.
Duy Tran
[email protected]
Powered by Editorial Manager® and ProduXion Manager® from Aries Systems Corporation
Manuscript File (Word or PDF file only) Click here to view linked References
Md Arif Hassana , Mohammad (Behdad) Jamshidia , Bui Duc Manha , Nam H. Chua , Chi-Hieu Nguyena , Nguyen Quang Hieua ,
Cong T. Nguyenb,c , Dinh Thai Hoanga , Diep N. Nguyena , Nguyen Van Huynhd , Mohammad Abu Alsheikhe , Eryk Dutkiewicza
a School of Electrical and Data Engineering, University of Technology Sydney, , Sydney, 2007, NSW, Australia
b Instituteof Fundamental and Applied Sciences, Duy Tan University, , Da Nang, 70000, , Vietnam
c Faculty of Information Technology, Duy Tan University, , Da Nang, 55000, , Vietnam
d Department of Electrical Engineering and Electronics, University of Liverpool, , Liverpool, L69 3BX, , United Kingdom
e Faculty of Science and Technology, University of Canberra, , Canberra, 2601, ACT, Australia
Abstract
Web 3.0 represents the next stage of Internet evolution, aiming to empower users with increased autonomy, efficiency, quality,
security, and privacy. This evolution can potentially democratize content access by utilizing the latest developments in enabling
technologies. In this paper, we conduct an in-depth survey of enabling technologies in the context of Web 3.0, such as blockchain,
semantic web, 3D interactive web, Metaverse, Virtual Reality/Augmented Reality, Internet of Things (IoT) technology, and their
roles in shaping Web 3.0. We commence by providing a comprehensive background of Web 3.0, including its concept, basic archi-
tecture, potential applications, and industry adoption. Subsequently, we examine recent breakthroughs in IoT, 5G, and blockchain
technologies that are pivotal to Web 3.0 development. Following that, other enabling technologies, including AI, semantic web, and
3D interactive web, are discussed. Utilizing these technologies can effectively address the critical challenges in realizing Web 3.0,
such as ensuring decentralized identity, platform interoperability, data transparency, reducing latency, and enhancing the system’s
scalability. Finally, we highlight significant challenges associated with Web 3.0 implementation, emphasizing potential solutions
and providing insights into future research directions in this field.
Keywords: Web 3.0, Internet of Things, 5G, Blockchain, Semantic Web, Metaverse, Artificial Intelligence, Decentralized
Networks, Security, Privacy
Table 2
List of Abbreviations
ence, overcoming the information overload issue [14]. With
recent advances in natural language processing, e.g., via large
Abbreviation Description language models, AI-empowered agents, e.g., AI-based Decen-
AR Augmented Reality tralized autonomous organizations (DAOs), and AI-based VR
BTC Bitcoin interactive interfaces, are increasingly becoming a vital part of
DAO Decentralized Autonomous Organization
DApps Decentralized Application
the future Web 3.0. Additionally, the decentralization aspect
ETH Ethereum of Web 3.0 aims to reduce reliance on centralization, enhance
FL File Inclusion security, and provide users with more control over their own
Intel SGX Intel Software Guard Extensions data. For instance, blockchain technology can be implemented
IoT Internet of Things to ensure secure and transparent storage and sharing of personal
IPFS Interplanetary File System
JSON JavaScript Object Notation data, giving users more ownership of their data [9] [19]. It al-
ML Machine Learning lows the users to control their information, countering central-
MIMO Multiple-Input Multiple-Output ized companies that currently dominate the majority of the web
NFT Non-fungible Tokens we use and interact with [20].
OWL Web Ontology Language
PoS Proof of Stake
Web 3.0 provides many benefits and advancements over its
PoW Proof-of-Work predecessor, (i.e., Web 2.0, as shown in Fig. 2). The key im-
QIT Quantum Information Technology provements of Web 3.0 are described as follows:
RDF Resource Description Framework
SMW Social Media Web • Semantic understanding and contextualization: Web 3.0
SWT Semantic Web Technologies
Turtle Terse RDF Triple Language
introduces semantic technologies that enable computers to
3D Three Dimensional understand the context and meaning of data. Unlike Web
URI Universal Resource Identifier 2.0 where semantic understanding is limited to the key-
VR Virtual Reality words and metadata associated with a type of content, se-
WWW World Wide Web mantic knowledge in Web 3.0 is more sophisticated. The
WebGL Web Graphics Library
W3C World Wide Web Consortium
deeper understanding of data is achieved through AI and
Machine learning (ML) algorithms, e.g., through large
language models. This allows the web engine to make
better outcomes and search results. The recent break-
3.0. Fortunately, the recently ever-increasing technological in-
throughs of large language models like OpenAI’s Chat-
novations bring back the interest of Web 3.0. The core tech-
GPT and Google’s Bard are the emerging applications of
nologies that will be expected as building blocks of Web 3.0 in-
such semantic understanding based on the web’s language,
clude blockchain for decentralization, IoT and 5G for commu-
in which the search engine can understand the user’s intent
nications, semantic extraction of web content, and extended re-
and return more relevant results.
ality for immersive human-computer experiences, as illustrated
in Fig. 2. The convergence of decentralization, semantic extrac- • Decentralization and data ownership: Unlike the central-
tion, and extended reality toward Web 3.0 is closer to reality ization of Web 2.0 platforms, Web 3.0 emphasizes decen-
than ever, thanks to the development of emerging technologies, tralization using blockchain technology such as Ethereum.
such as AI, blockchain, Virtual reality (VR)/Augmented reality This reduces the control of large corporations and gives
(AR), 5G, IoT, and edge computing [6, 17, 18, 7]. users more ownership and control over their data. For ex-
AI-driven algorithms can provide users with personalized ample, NFTs can be utilized as unique digital assets to rep-
and relevant information based on their behavior and prefer- resent ownership of digital goods, e.g., digital arts, tickets,
3
Web 1.0 Web 2.0 Web 3.0
Static read-only web pages Information-centric and intractive User-centric, decentralized, private,
and secure
ADS
ADS
EOS
Ethlance Akasha
Incentive mechanisms
Communication 5G
MQTT
layer technologies
Gateways Storage & analytics
IoT
Physical
layer
technologies
Industrial Smart
motors devices
Fig. 3: The architecture of Web 3.0 with five main layers. The data is communicated from the physical layer to the application layer through intermediate layers,
i.e., the communication layer, network layer, and semantic layer. Each layer can be realized by corresponding technologies that are IoT, 5G, blockchain, semantic
web, and 3D interactive web technologies.
are utilized at this layer to collect a wide range of data from the security by integrating blockchain technology and smart con-
real environment. These devices allow the seamless integra- tracts. Moreover, security is maintained using consensus mech-
tion of real-world data into the digital sphere, hence improv- anisms, ensuring that all nodes in the network agree on the state
ing knowledge of different platforms and environments by effi- of the network eliminating the dependency on centralized au-
ciently collecting, processing, and transmitting data [7]. More thority [25] [26]. In addition, incentive mechanisms can be
details about IoT technologies used in Web 3.0 will be dis- deployed at this layer to compensate users for their contribu-
cussed in Section 3. tions, such as data storage or transaction validation [27]. This
layer aims to foster trust and transparency by reducing fraudu-
2.2.2. Communication Layer lent activities. Furthermore, it builds a strong network platform
The communication layer connects multiple nodes using var- resistant to censorship and single points of failure, resulting in
ious protocols that allow decentralized and peer-to-peer data a more open and trustworthy online environment. Blockchain
transmissions. It determines how data is packetized, addressed, technologies used in Web 3.0 will be discussed in more detail
transferred, routed, and retrieved [24]. It includes critical com- in Section 5.
ponents like network propagation and validation protocols, net-
work security, privacy, and trust mechanisms. It efficiently 2.2.4. Semantic Layer
shares data via propagation protocols and maintains data in-
The semantic layer is responsible for analyzing and process-
tegrity through validation protocols. Network security mea-
ing data. It is used to make predictions based on user activities
sures defend against illegal access and assaults, while privacy
that can be used to improve the user experience [10]. Several
controls provide users with the ownership of their personal in-
strategies and operations are available for the semantic layer.
formation. These components provide a solid infrastructure
The operations can be cloud-based algorithms, machine learn-
that allows secure, efficient, and trustworthy data transfer in a
ing, analytics, and semantic extraction. These approaches are
Web 3.0 environment. To reliably deploy Web 3.0 in existing
all used to gather information from various sources, such as
infrastructures like the 5G networks, several requirements of
IoT devices. For example, it can enhance users personalizing
the communication layer need to match the 5G standards, such
by providing recommendations based on user preferences, be-
as network slicing, edge computing, and massive Multiple-
havior, and interests. At this layer, semantic web technologies
Input Multiple-Output (MIMO). Further discussion about the
play the key role, and they will be discussed in more detail in
5G technologies for Web 3.0 will be presented in Section 4.
Section 6.
2.2.3. Network Layer
The network layer is one of the most important layers of 2.2.5. Application Layer
the Web 3.0 architecture which provides a decentralized, se- The application layer is the topmost layer of the Web 3.0 ar-
cure, and intelligent web. It improves data decentralization chitecture which creates a user interface for decentralized appli-
and trustless transactions while maintaining data integrity and cations (DApps) that run on top of blockchain networks. DApps
5
various industries. For instance, social media platforms of-
fer decentralized alternatives, prioritizing user autonomy and
Decentralized data privacy through DApps. Steemit (www.steemit.com), and
Finance Sapien (www.sapien.network) are a few notable examples of
Metaverse decentralized social media applications. Similarly, decentral-
Decentralized
Applications ized gaming platforms transform user interactions by securing
ownership of in-game assets via blockchain, ensuring trans-
Non-Fungible parent transactions. Examples of decentralized Web 3.0 gam-
Tokens
ing applications include Decentraland (www.decentraland.org)
Supply Chain and RaceFi (www.racefi.io). In healthcare, DApps introduce
Management
transformative changes by integrating advanced technologies
and decentralized networks, promoting seamless data sharing,
Decentralized Decentralized
Autonomous Identity securing patient control over health records, and improving
Organizations
interoperability among providers. AiGIA (www.aigia.health)
and DeHealth (www.dehealth.world) as some notable ex-
Fig. 4: Potential applications of Web 3.0. amples. Decentralized education platforms empower users
with personalized, secure ownership learning environments,
are more secure and efficient than traditional centralized appli-
ensuring privacy and ownership guarantees the authenticity
cations [28]. It is built on open protocols and standards, allow-
of certificates and credentials, reducing the risk of falsifi-
ing users to engage directly with services without the need for
cation. BitDegree (www.bitdegree.org) and TeachMePlease
a third-party [29]. The application layer in Web 3.0 provides
(www.teachmeplease.co.uk) are two examples of decentralized
users with improved control over their data and digital identi-
learning applications.
ties. Through user-centric design and decentralized architec-
Additionally, DeFi revolutionizes traditional financial sys-
ture, it enables personalized experiences, enhanced AI-driven
tems, offering various instruments like borrowing and lend-
services, and faster transactions, while simultaneously encour-
ing without third party. It employs blockchain technology to
aging better privacy and security. At this layer, interactive 3D
establish an open and permissionless financial services envi-
technologies play a key role in enhancing users’ experiences
ronment based on smart contracts, allowing for direct peer-
and engagement in Web 3.0, and this will be discussed in more
to-peer transactions. Uniswap (www.uniswap.org), and Aave
detail in Section 7.
(www.aave.com), are among many examples of applications of
The architecture of Web 3.0 marks significant changes from
DeFi. Decentralized Autonomous Organizations (DAOs) intro-
conventional client-server paradigms. Its emphasis on decen-
duce a novel approach to organization and governance, operat-
tralization, semantic data comprehension, open standards, user
ing without centralized authorities, and fostering efficiency and
empowerment, and smart contract integration establishes the
global collaboration. Unlike centralized systems, it allows users
foundations for a more inclusive, interconnected, secured In-
to make collective choices and regulate the organization’s oper-
ternet environment [30]. As Web 3.0 continues to develop, it
ations without the need for third-party which promotes open-
has the potential to transform industries and open up new op-
ness, eliminates complexity, and increases inclusion. It im-
portunities and applications for innovations and engagement.
proves efficiency, reduces corruption, and fosters global col-
The next section explores the diverse applications of Web 3.0.
laboration, improving governance standards [31]. Some of
DAO’s applications are MolochDAO (www.molochdao.com),
2.3. Potential Applications and Services of Web 3.0 USDT (www.kucoin.com/trade/DAO-USDT), and MakerDAO
(www.makerdao.com/en).
Although Web 3.0 is still in its initial stages, its technological
Furthermore, decentralized supply chains offer transpar-
foundation is rich. By leveraging cutting-edge technologies,
ent and traceable monitoring of items from source to con-
Web 3.0 can offer numerous novel applications and services to
sumer. It decreases fraud, ensures product authenticity, and
build a more decentralized, secure, and user-centric Internet.
improves overall efficiency granting greater control over their
This subsection discusses potential applications and services of
supply chain. Notable decentralized supply chain applica-
Web 3.0 as shown in Fig. 4.
tions include VeChain (www.vechain.org), and Provenance
(www.provenance.io). Similarly, decentralized identity man-
2.3.1. Decentralized Applications (DApps) agement, including self-sovereign identity, empowers users
Decentralized Applications (DApps) leverage decentraliza- with ownership and control over personal information without
tion to revolutionize user engagement with online resources, de- intermediaries. It makes user data more secure and reduces
parting from traditional apps reliant on centralized servers [28]. the chance of being stolen, enhancing security, and identity
DApps operate on blockchain networks, distributing data and verification. It also removes the necessity for multiple user-
functionalities across a network of nodes, thereby mitigat- names and passwords, enhancing the online experience and
ing single points of failure, enhancing security, and granting stopping identity theft [32]. Dock DID (www.dock.io) and
users greater data control [2]. As a result, DApps provide Onyx (www.jpmorgan.com/onyx/index) are two examples of
an innovative level of openness, autonomy, and trust across decentralized identity management systems.
6
2.3.2. Non-Fungible Tokens 2.3.5. Somnium Space
Non-fungible tokens (NFTs) have emerged as a ground- Somnium Space (https://somniumspace.com/) is a virtual re-
breaking concept, reshaping the landscape of digital owner- ality platform where users can create, own, and exchange vir-
ship and creativity. They mark a significant change from es- tual land and assets. It allows users to build structures, host
tablished ownership structures and unique digital assets or to- events, and market content, enabling a vibrant virtual econ-
kens. These unique tokens leverage blockchain technology to omy. Users access the virtual world using VR headsets or web
certify the authenticity and ownership of digital assets, such browsers, exploring its vibrant sceneries and chatting with other
as art, collectibles, and virtual real estate [33]. NFTs trans- users. It’s available for PCs, mobile devices, and VR head-
form ownership in the digital era by offering monetization al- sets like Oculus [37]. The platform makes use of 3D interface
ternatives for creators and artists through smart contracts, royal- technology to deliver immersive experiences, allowing users to
ties, and transparent provenance. Some well-known examples interact with the environment and each other in a completely
of NFTs are SuperRare (www.superrare.com), Nifty Gateway adaptable environment. The details of the 3D interactive web
(www.niftygateway.com), and Async Art (www.async.art). for Web 3.0 are presented in Section 7.
High
Temperature
The physical version of the assets
Low
Temperature
Clean The physical world
Light Device
Smoke Slight Smoke
Audio device Sensor Networks
Heavy Smoke Smart Home Data Acquisition
Environment Device Video Device IoT Devices
x
Sensor Fusion
Normal Gas Gas Exhast Device Data Integration
Sensor Technology
Water Sprinkle Data Collection
Gas IoT Connectivity
Device
Abnormal Gas
Comfortable
Humidity
Distributed Database
Blockchain Technology
Decentralized Ledger
Smart Contracts
Data Integrity
Distributed Database Blockchain Web 3.0 Integration
Fig. 7: Illustration of a cutting-edge multi-layer cloud architecture in Web 3.0, showcasing IoT integration. Smart Home concept exemplifies the rising importance
in highly developed areas, overcoming challenges with distributed computing and blockchain [50].
3.3.3. Autonomous and Trustless Transactions allowing for the seamless addition of new devices and services
When IoT devices are combined with blockchain-based without extensive reconfiguration.
smart contracts, they facilitate autonomous and trustless trans-
actions [51] [52]. These self-executing agreements eliminate 3.3.5. Enhanced Security and Privacy
the need for intermediaries, simplifying procedures and low- Security and privacy are critical in Web 3.0, and IoT of-
ering transaction costs. This convergence improves efficiency, fers advantages in these areas. IoT devices can use end-to-
scalability, diversity, and reliability within the Web 3.0 frame- end encryption, anonymization, secure data transmission, and
work, introducing new possibilities for smooth and secure dig- blockchain’s tamper-proof ledger to protect sensitive data from
ital interactions across various applications. These applications unauthorized access and manipulation [54, 55, 56]. This in-
range from supply chain management, where real-time track- creased level of security gives users more assurance and faith
ing and transparency are critical, to financial services, where when engaging with the digital realm, even in scenarios where
transactions require enhanced security and trust. This critical individuals might consider trading their private data for re-
combination represents a significant advancement in the evolu- wards.
tion of the decentralized Internet, resulting in an upcoming age
of unforeseen possibilities for innovation and value creation. 3.4. Recent Research for Integrating IoT Technologies in Web
3.0
3.3.4. Interoperability and Standardization The conceptual framework depicted in Fig. 7 illustrates the
Interoperability and standardization are essential for Web 3.0 integration of IoT technologies to enhance the immersive expe-
development since they ensure easy communication and inte- rience of Web 3.0. In this framework, the immersive experience
gration across various IoT devices and platforms. As the num- of Web 3.0 is greatly enhanced by Internet of Things (IoT) de-
ber of IoT devices grows, each with its own set of protocols and vices, such as smoke alarms, home appliances, smart home ap-
standards, a uniform framework becomes increasingly impor- pliances, and environmental sensors (for temperature, humidity,
tant [51]. Standardization promotes interoperability across dis- and gas). These devices continuously monitor and respond to
parate devices, allowing them to collaborate peacefully within environmental changes, collecting real-time data on smoke lev-
the Web 3.0 ecosystem. This involves creating standard com- els, gas presence, humidity, and temperature. Distributed com-
munication protocols, data formats, and security mechanisms puting and artificial intelligence are then used to combine and
that all devices can adopt. Interoperability promotes a more co- interpret this data, allowing smart home automation and intelli-
herent and integrated experience for consumers, allowing data gent decision-making. Sensor fusion and connectivity ensure
and services to be readily exchanged and accessed across mul- a comprehensive view of the environment, while blockchain
tiple devices and platforms [53]. Standardization decreases the technology secures data transactions and ensures integrity. In-
complexity and costs involved with connecting diverse systems, tegrating the physical and digital worlds, IoT devices create dy-
boosting innovation and implementation. Additionally, it en- namic and interactive digital representations, making Web 3.0
hances the scalability and resilience of Web 3.0 applications by more realistic, responsive, and user-centric.
10
Table 3
Summary of Recent Research for Integrating IoT Technologies in Web 3.0
3.4.1. Enhancing interoperability amid IoT technologies in environment [63, 64, 44].
Web 3.0
A recent study on interoperability concepts, focusing on IoT 3.4.2. Blockchain enabled IoT and edge technologies in Web
technologies and the emergence of Web 3.0, was presented in 3.0
[57]. This work addressed challenges in achieving interoper- In IoT integration into Web 3.0, challenges with massive
ability in the modern IoT ecosystem, identifying organizational, IoT workloads were addressed by proposing Triastore, an ap-
semantic, syntactic, and technological interoperability as key proved blockchain framework with ML deployed the edge de-
obstacles. The proposed solution introduced an interoperabil- vices [7]. Triastore abstracted ML models into approved infor-
ity framework, facilitating cooperation from the device to the mation blocks, incorporating Blockchain Consensus and Proof
backend, enabling seamless interaction across IoT layers. Cat- of Federated Learning (PoFL) phases. The study’s practical as-
egorized into four levels, the framework ensures technological, sessment using MNIST data demonstrated high precision with
syntactic, semantic, and organizational interoperability, pro- minimal data integrity degradation. Additionally, the paper in-
moting seamless communication and collaboration. The pre- troduced a collaborative consensus mechanism, PoFL, enhanc-
sented practical roadmap can overcome integration challenges, ing user security and privacy by sharing parameters among dis-
aligning with standards and shared models. Implemented by tributed parties. The proposed approach was seamlessly im-
the EU-funded SEMIoTICS project, it stands as a robust re- plemented with the Fabric open-source platform, enhancing the
sponse to IoT and Web 3.0 interoperability issues. In addi- authenticity of blockchain assessments [7]. Semantic technolo-
tion, addressing interoperability challenges is crucial for the ef- gies contribute to addressing trust, security, and privacy chal-
ficient operation of a Web 3.0 platform handling multisensory lenges in IoT, enabling fine-grained control over data access
data from diverse IoT devices. These challenges, stemming and sharing by representing security policies, access controls,
from technical and organizational factors, encompass standard- and privacy preferences. Semantic reasoning aids in enforc-
ization, semantic technologies, data integration, and collabora- ing security, anomaly detection, and ensuring data integrity and
tion among stakeholders. A potential solution involves utilizing confidentiality in IoT deployments. However, applying seman-
standardized protocols and semantic web technologies, ensur- tic technologies to large-scale IoT deployments for Web 3.0 can
ing consistent communication and meaningful data interpreta- pose scalability challenges, requiring significant computational
tion. Adopting Linked Data principles and ontologies further resources and potentially introducing latency issues. Managing
enhances data sharing [62]. Industry standards like OPC-UA ontology consistency in dynamic IoT environments is difficult,
and PPMP provide platform-independent protocols, promoting but potential solutions include ontology design patterns, align-
real-time communication and uniform representation. Imple- ment and mapping, and ontology evolution management frame-
menting these protocols, along with technologies like WoT’s works. Overcoming these challenges necessitates collaborative
Thing Description, can enhance interoperability in a Web 3.0 efforts, standardization, optimization techniques, and advance-
11
ments in data quality. Interdisciplinary collaborations with AI • URLLC: URLLC represents an approach in 5G commu-
and distributed systems can drive the development of robust and nication which provides high reliability and low latency
efficient Web 3.0 technologies, considering the integration of services, thereby enhancing real-time data exchange and
blockchain and IoT technologies [58, 59, 50, 60, 61]. processing in technologies such as IoT, IoV, and smart city.
Following 3GPP, URLLC is required to transmit a packet
3.5. Insights and Summary with 99.999% for 32 bytes with a user plane latency of
1 ms [68]. The implementation of URLLC in Web 3.0
The rapid expansion of IoT devices, powered by advances
enables seamless and instantaneous communication, im-
in 5G, edge computing, AI, and blockchain, promises the be-
proving the real-time performance of Web 3.0 applications
ginning of a future in which billions of networked gadgets ex-
such as decentralized finance, industrial automation, and
change data autonomously. Standardization projects such as
autonomous vehicles.
SWeTI and WoT solve compatibility and interoperability is-
sues, allowing IoT devices and services to communicate seam- • mMTC: Massive Machine-Type Communication is an-
lessly. Semantic technologies, namely Thing Descriptions, play other 5G use case that simultaneously supports the connec-
an important role in facilitating this communication. The incor- tion of many devices. The requirements of these devices
poration of IoT technology into Web 3.0 has enormous promise, are low complexity and extended power consumption for
especially in terms of decentralized data ecosystems, improved data transmission [67]. Applying mMTC to Web 3.0 paves
security and privacy, user-centric interactions, and autonomous the way for a more interconnected and automated web.
and trustless transactions. IoT devices can employ blockchain- It mainly supports the physical layer of Web 3.0 which
based smart contracts to conduct transactions without the need contains several IoT devices, enhancing the functionality
for intermediaries, increasing efficiency, scalability, diversity, of applications e.g., smart city, environmental monitoring,
and dependability in the Web 3.0 framework. Current research supply chain management, etc.
efforts focus on tackling critical issues like scalability and in-
teroperability utilizing strategies such as Triastore, an edge- By utilizing the advantages of 5G, Web 3.0 can transmit enor-
deployed blockchain framework incorporating machine learn- mous amounts of data, thereby improving the user experience
ing, and the application of semantic technologies to ensure se- of existing applications and services. In practice, 5G has had
curity and privacy in IoT implementations as shown in Table 3. a major effect on human lives. For instance, industrial IoT is
In summary, recent research in integrating IoT technologies into the most popular technology that benefits from 5G. In this sce-
Web 3.0 mainly focuses on overcoming challenges through se- nario, 5G can be used to connect multiple sensors and machines
mantic information extraction and technologies. Collaborative to the Internet, which can help businesses expand efficiency and
efforts, standardization, and interdisciplinary collaborations are correctness [69]. Otherwise, the attributes of 5G can improve
crucial for advancing robust and efficient technologies, e.g., the upcoming applications such as ensuring safety by utilizing
blockchain, semantic web, 3D interactive, 5G, and IoT. low latency for real-time deployment of autonomous vehicles
and traffic management in smart cities [70]. However, 5G is
not a single technology. It combines various technologies and
4. 5G Technologies for Web 3.0
methods to create an advanced wireless communication system.
Below are some of the 5G key enabling technologies:
4.1. Background of 5G Technologies
5G is the fifth generation of wireless networks and it is be- • Network Slicing: Network slicing is another pivotal tech-
lieved to become a monumental leap in the area of connectivity. nology of 5G, which creates multiple virtual networks on a
Recent statistics illustrate that by the end of 2022, nearly 35% single physical infrastructure, catering to different types of
of the global population had accessed 5G and this figure is pro- services and users. Even though network slices share the
jected to reach 85% by 2028 [65]. Compared with the conven- same physical environment, they operate independently,
tional network generations, 5G can deliver faster, more reliable ensuring that the disruption or issues from one slice can-
and more efficient mobile communication. It is expected to pro- not interrupt others. Besides, resource management in net-
vide new applications and services with high data rates, low la- work slices depends on its service. This approach not only
tency, massive connectivity, enhanced bandwidth and seamless maximizes 5G core networks but also diversifies differ-
interconnectivity [66]. Typically, 5G technology can be defined ent quality of services, thereby making modern wireless
by three exemplary use cases [67]: networks more adaptable and user-centric [68]. In Web
3.0, network slicing provides tailored network segments
• eMBB: Enhanced Mobile Broadband is the primary ap- for diverse applications such as Metaverse and DeFi, en-
proach to mobile communication. It aims to provide com- suring optimal performance and security for the decentral-
munication with high data rates and large traffic volumes. ized web environment.
Leveraging eMBB, users can enable Web 3.0 services in-
cluding 3D videos, 4K streaming, and VR and AR [66]. • Edge Computing: Edge computing is a key technology of
As a result, it enhances user experiences in web environ- 5G that enables data to be processed at the edge of net-
ments significantly and promotes the development of new works instead of a centralized database. This approach
interactive 3D web applications. can minimize the data stream in wireless traffic, thereby
12
expanding the bandwidth usage and ensuring low latency. have already been crucial for the growth of IoT, AI, and ex-
Moreover, edge computing provides better security and tended reality, can significantly contribute to Web 3.0 develop-
privacy. As data is closer to its source, the transmis- ment [76]. The fusion of Web 3.0 and 5G has the potential to
sion of sensitive content is minimized [71]. This leads provide a more distributed, reliable, and efficient online web
to future wireless technologies being more decentralized, experience. Following that, users can participate in a web en-
faster, safer, and more responsive. By rendering and pro- vironment with instant data transmission, enhanced virtual in-
cessing data near the edge, edge computing can boost the teraction, and interconnected digital communication [15]. The
capabilities of augmented and virtual reality, delivering contributions of 5G technologies in Web 3.0 are outlined in the
immersive and seamless experiences in Web 3.0. following subsections.
• Massive MIMO: Massive MIMO plays a significant role
in 5G, as it utilizes an extensive array of antennas at 4.2.1. Enhancing decentralized communication
both the transmitter and receiver to enhance the capacity The main feature of Web 3.0 is the decentralized web en-
and performance of wireless networks without requiring vironment. By distributedly managing data, Web 3.0 provides
more spectrum. Following that, the enormous number of users with the ability to control their information. However,
antennas allows spatial multiplexing where base stations maintaining the distributed Internet over a vast number of nodes
can broadcast multiple data streams simultaneously to sin- presents significant challenges. In this context, 5G technolo-
gle or multiple recipients with the same frequency chan- gies play a pivotal role in deploying decentralization with low
nels [66]. As a result, by utilizing the potential of Massive latency and unparalleled bandwidth perspectives. Specifically,
MIMO, advanced technologies can be deployed in real- the ultra-high speed connectivity from 5G promises a deploy-
time with high spectral efficiency and throughput [66]. ment of a decentralized Internet web, which operates through
This technology is highly effective in enhancing mobile a network of devices, preventing data control by any single
augmented reality with a high data rate network, thereby server [76]. Furthermore, the specifications of 5G includ-
providing immersive content and real-time interaction in ing URLLC, eMBB, and mMTC ensure continual peer-to-peer
Web 3.0 [72]. communications which is the most important in Web 3.0. Tak-
ing beamforming technology as an example, advanced signal
• Beamforming: Beamforming is an essential 5G technique processing methods are applied to minimize the interference be-
that can effectively control the energy and direction of tween peer-to-peer nodes, therefore improving the performance
wireless signals. Rather than broadcasting signals uni- of data transmission in a cluster of decentralized communica-
formly in all directions, the beamforming technique can tion nodes [77].
adjust the amplitude and phase of the signal from each an-
tenna, thereby directing the energy of radio waves toward 4.2.2. Diversity and efficient data transmission
a specific direction or user. This not only enhances the Data transmission plays a significant role in the Web 3.0 en-
quality and range of the radio wave but also optimizes the
vironment in which various technologies are utilized. As Web
spectrum usage to adapt to the soaring number of wire-
3.0 requires the transmission of various data types across layers
less data [73]. By managing signal direction and strength,
that are directly linked to different technologies, 5G can offer
beamforming can ensure reliable connections for a wide significant benefits in this field [15]. By offering low latency
array of IoT devices, enabling instantaneous data collec- and high bandwidth from advanced wireless technologies like
tion and exchange for Web 3.0.
massive MIMO, URLLC, and beamforming, 5G enables Web
• Millimeter Wave: Millimeter wave (mmWave) refers to a 3.0 to operate more efficiently and ensures fluency in the data
specific part of the electromagnetic spectrum with wave- streams, thereby increasing the experience of users.
lengths ranging from 1 to 10 millimeters, corresponding
to frequencies between 30 and 300 GHz [74]. Such high 4.2.3. Immersive and interactive web content
radio frequencies allow 5G to broadcast data over wide Web content is a crucial aspect of Web 3.0 which enables
bandwidths and small wavelengths, resulting in a faster cy- AR/VR and 3D simulations to increase user experience. The
ber environment [75]. Utilizing the high-frequency capa- challenge in deploying such rich and complex technologies in
bilities of mmWave in wireless technologies can improve real-time requires reliable data transfer, and 5G technologies
the communication speed and throughput in Web 3.0, ad- can solve that problem. According to Insidetelecom [76], the
dressing the demand for high bandwidth and massive data necessity for rapid Internet in developing virtual technologies
transmission. in Web 3.0, including the Metaverse, makes 5G technologies
essential. Thanks to the ultra-low latency and massive data
4.2. Roles of 5G Technologies in Web 3.0 throughput of 5G, users can access virtual spaces with high
5G technologies provide unprecedented speed, low latency, quality [79]. Besides, edge computing enhances Web 3.0 by
and large simultaneous connection between devices [66]. enabling real-time, delay-free interactions through local data
Meanwhile, Web 3.0 requires an advanced network connection processing. Additionally, 5G’s network slicing method can
to support extensive communication among technologies like customize network allocations [35]. Therefore, the demanding
Blockchain, IoT, and the Metaverse. Thus, 5G networks, which web content becomes a priority with efficient resources.
13
and base stations. The digital twins obtain the real-time sta-
MetaverseTenants
... tuses of the base stations to estimate the reliability and latency.
MT1 MTm
MT2 MT3
Web 3.0 Environment
The status of base stations that are satisfied for latency require-
End Users
Request
MetaSlice Analyzer
Travel MetaSlice probability via different numbers of users, thereby improving
Update
4
1
Accept
the QoE of Web 3.0 with low latency communication.
Request Tier-2
Resource
Management
Education MetaSlice
Moreover, Metaverse is one of the exemplary applications of
Availability 3
2
Functions
Web 3.0, which offers users interactive and immersive 3D ex-
Allocation
Metaverse Tier-1
Meta-slice 1's
functions
periences. However, it faces significant challenges in resource
Shared
Infrastructure Meta-slice 2's
pacity of the channel and the accuracy of the received signal. of Metaverse to reduce the data collecting and offloading cost
In the context of Metaverse in Web 3.0, maintaining 3D data from the physical devices. In the suggested system, seman-
transmission between the physical environment and the digital tic communication is applied in UAVs, which is deployed by
world seamlessly throws a notable challenge [86]. In this sce- VSPs to reduce data traffic and computing costs. By leverag-
nario, semantic communication becomes a solution by employ- ing the convolutional neural network (CNN) in the RelTR tech-
ing deep learning-based end-to-end communication and natural nique, a CNN is combined with a feature encoder and entity de-
language processing techniques to enable the transmission of coder to generate the feature context and entity representation
the semantic content of messages [87]. This approach elimi- of the images captured by the UAV. It employs a Triplet De-
nates the need to transfer raw 3D data, leading to efficient data coder that utilizes attention mechanisms to classify and relate
transmission with low latency communication within Web 3.0, subjects, objects, and their predictive, effectively capturing the
thereby improving the experience of users. Hence, applying 5G relationships within the image. These relationships are struc-
and advanced wireless technologies to enable semantic com- tured into semantic triplets, including subject, predicate and ob-
munication in Web 3.0 is essential, thereby bridging the gap ject, via feedforward neural networks, translating raw data from
between user interaction and digital feedback. the physical world into a semantic symbol, therefore mitigat-
The authors in [82] proposed a semantic transmission frame- ing data transmission size from UAV to digital twins. The au-
work to transfer information from the physical world to the thors demonstrated that applying semantic communication can
Metaverse which can be illustrated in the Web 3.0 environ- reduce the offloading cost in the service providers, thereby en-
ment. The transmission cost and data storage can be improved abling the deployment of immersive 3D content in Web 3.0.
by utilizing semantic space in both transmitter and receiver, ow-
ing to the migration in transmitted sensing information. In the 4.3.3. Security and privacy in Web 3.0
considered framework, the transmitter focuses on semantic en- The integration of 5G into Web 3.0, while offering advanced
coding and transferring information following the calculation data transmission and connectivity, also introduces significant
of channel frequency response. Meanwhile, the receiver ex- security and privacy challenges that are essential for guaran-
tracts semantic features from the incoming signal in terms of teeing uninterrupted and secure massive data transmission in
channel decoding. Additionally, the receiver can also restore the web environment. Web 3.0, involves many technologies
the complete channel frequency power to facilitate other Meta- and intermediate systems, and thus it has many open interfaces
verse services. Besides, a theory reward mechanism is provided which are vulnerable to diverse attacks. For example, IoT de-
to incentivize the transmitter to send data with high frequency, vices at the physical layer can be disrupted by common com-
thereby increasing the user experience in the Metaverse. The munication and network attacks such as DDoS, Sybil, Replay,
numerical results showed that the proposed framework can re- etc, thereby decreasing the performance of Web 3.0 [88]. In ad-
duce the amount of transmitted data and effectively boost the dition, emerging applications like Metaverse also present sig-
transferred data in high frequency. nificant security risks which can negatively impact Web 3.0.
Alternatively, the authors in [83] deployed semantic com- For instance, by virtualizing real-world environments instan-
munication in virtual service providers (VSPs) in the context taneously, users can face malicious actions including virtual
15
stalking and spying, illegal tracking locations, digital asset hi- 5.1. Blockchain Fundamental
jacking, and deepfake events [89]. Consequently, security con-
Blockchain technology represents a fundamental aspect of
siderations are crucial in the integration of 5G with Web 3.0.
Web 3.0 that has gained significant attention as a groundbreak-
Recently, authors in [84] proposed a mechanism to ensure
ing concept. In the conventional database systems that central-
security and privacy in Web 3.0 in the context of IoV. In the
ize data storage management, making them susceptible to at-
considered system, an anomaly detection algorithm for edge
tacks and data breaches [3], blockchain functions as a decentral-
server placement is built based on zero-trust security and a non-
ized database spread across multiple decentralized nodes [22].
cooperative game model, thereby preventing cyber-attacks from
The fundamental idea behind blockchain is to establish a trans-
outliers to cloud servers in the IoV-based cloud edge comput-
parent, secure, and unalterable system for storing and verifying
ing in Web 3.0. All tasks and users’ requests are considered
transactions, making it highly challenging for any single entity
untrusted in the IoV environment and must be verified before
to modify or tamper with the data [90]. A blockchain system
accessing the system. As the anomalies are assumed to increase
encompasses three key attributes:
the workload and generate computational failure, the security
mechanism is based on the data size of tasks. The tasks are de-
• Decentralization: Decentralization plays a key role in
cided to be insecure if their data size is less than the multiply of
blockchains, as it distributes information across a net-
the coefficient and average of data sizes. The simulation results
work of nodes, ensuring that no single entity has full con-
showed that the proposed algorithm can effectively ensure the
trol [15]. This enhances security and resilience, while
security between the edge server and base stations, maintaining
eliminating any single points of failure or vulnerability.
undisrupted and low latency communication, thereby improv-
By leveraging blockchain technology, we can build decen-
ing the performance of Web 3.0 empowered by IoV.
tralized communication networks that are resistant to cen-
sorship and surveillance, providing users with increased
4.4. Insights and Summary
privacy and control over their data [91].
5G technologies play an essential role in the development of
Web 3.0 by providing ultra-low latency and highly reliable in- • Transparency: Transparency is another essential element
ternet connectivity. It facilitates the seamless communication of blockchain that shapes a decentralized and trustwor-
of advanced Web 3.0 applications, e.g., AR/VR and IoT de- thy environment where users can participate with con-
vices, which require massive data transmission and real-time fidence, knowing that their interactions are secure, au-
processes. The high data transfer rates and high bandwidth uti- ditable, and accountable. The blockchain ledger is acces-
lization of 5G ensure that Web 3.0 with intensive data can run sible to the public, allowing anyone to assess and verify
smoothly, fostering a more interconnected and responsive digi- network transactions. Users independently check the au-
tal environment. However, these combinations also bring with thenticity and integrity of transactions, ensuring that data
them new difficulties, especially when it comes to privacy and is correct and tamper-proof [92].
security. Considering Web 3.0 promotes a decentralized and
networked digital environment, it is necessary to handle poten- • Immutability: Immutability is another important aspect
tial vulnerabilities that arise from the wide variety of technolo- of blockchain, that ensures that the data stored on the
gies and user interfaces utilized. Thanks to 5G technologies, blockchain cannot be changed or erased by anyone.
which work as the foundation for Web 3.0’s decentralized, user- Blockchain creates digital signatures that link each block.
centric, and autonomous vision, enabling more dynamic and This guarantees that any modifications to a transaction
immersive online experiences. The seamless fusion of 5G’s must be granted by a majority of nodes, making the sys-
high-speed connectivity with edge computing’s real-time pro- tem very resistant to fraud and manipulation [93]. As a
cessing capabilities not only facilitates immersive virtual expe- result, immutability can ensure that the blockchain is se-
riences but also ensures efficient resource allocation and opti- cure, transparent, and trustworthy, as no one can manip-
mized data transmission. As researchers keep looking for new ulate or falsify the data. Furthermore, immutability also
ways to improve, the combination of 5G and Web 3.0 is set to improves efficiency and reduces the costs of various pro-
change the digital world in big ways. A summary of the 5G cesses that involve data recording and sharing, such as
technologies approaches for Web 3.0 is presented in Table 4. contracts, transactions, and audits by using hashing, dig-
ital signatures, and consensus mechanisms [93].
5. Blockchain Technology for Web 3.0
Consensus mechanisms play a crucial role in attaining agree-
This section delves into the fundamental concepts of ment among participants in a decentralized network regarding
blockchain technology, providing its essential components and the validity and order of transactions. They hold paramount
mechanisms. Following that, we investigate the important roles importance in upholding the integrity and security of the
of blockchain technology in Web 3.0. Furthermore, we exam- blockchain. Consensus mechanisms typically resolve mathe-
ine the most recent developments and technological advances matical problems or designate trusted nodes to verify transac-
in blockchain technology, highlighting significant studies and tions. Once consensus is achieved, the transactions are added to
findings that are contributing to the development of blockchain the blockchain, ensuring that all participants possess a consis-
into the foundation of Web 3.0. tent and mutually agreed-upon update of the ledger. Consensus
16
mechanism prevents fraud and double-spending attacks and en- ledger system [6]. In a blockchain network, numerous nodes
sures a shared understanding of the blockchain state[19, 94]. collaborate in validating and verifying transactions. A consen-
Proof of Work (PoW) and Proof of Stake (PoS) are the most sus protocol ensures that everyone agrees on the current state of
popular consensus mechanisms in blockchains. PoW requires the ledger [102]. This consensus is reached without the need of
miners to solve complex puzzles, ensuring the integrity and se- a central authority because each node autonomously maintains
curity of the blockchain through computational power. How- a copy of the entire blockchain. As a result, there is no sin-
ever, it is energy-intensive. PoS, on the other hand, selects gle point of control or failure, and data is securely distributed
validators based on their stakes (i.e., tokens) in the network, across the network, thereby eliminating the risk of data manipu-
making it more energy-efficient [95]. Both have strengths and lation, promoting a more equitable and resilient system in Web
weaknesses, and ongoing research explores hybrid approaches 3.0 [103].
to improve scalability and sustainability.
In addition to these mechanisms, there are also some other 5.2.2. Security and privacy
mechanisms, such as Proof-of-Elapsed Time (PoET), Proof- Security and privacy are another crucial part of the sus-
of-Authority (PoA), Proof-of-Authentication (PoAh), Proof-of- tainable development of Web 3.0. The structure and features
Property (PoP), Proof-of-Capacity (PoC), Proof-of-Burn (PoB) of blockchain technology bring a significant boost to security
and Proof-of-Weight (PoWeight) [6]. PoET is a consensus and privacy within Web 3.0. It provides users more power to
mechanism that utilizes a randomized waiting period for val- manage their own personal sensitive data, digital assets, and
idators in a blockchain network to compete for the creation identities. Data is securely kept in an immutable ledger on a
of the next block [96]. PoAh eliminates the reverse hashing blockchain network, guaranteeing that no one can access or al-
function in favor of a lightweight, resources block validation ter it without authorization [19]. Each transaction is encrypted
process [97]. PoA is a more effective consensus technique and connected to the one previous to it, producing an unbro-
that solves the concerns of PoW’s high latency, low transac- ken data chain [104]. This design makes it exceedingly difficult
tion rate, and power consumption [98]. Po-Activity combines for malicious actors to alter the information subsequently and
PoW and PoS to support authentic transactions and consensus minimizes the potential for malicious attacks such as personal
among miners [99]. PoP offers “proof” for blockchain informa- information disclosure and transaction records.
tion structure features, which permits nodes to reduce the quan-
tity of information required for each transaction [6]. PoB, PoC, 5.2.3. Tokenization
PoWeight, and PoL, each introduce a new approach to achieve
Tokenization is another significant concept in the Web 3.0
consensus. Each of these mechanisms has its own strengths and
ecosystem, which uses blockchain technology to encode phys-
weaknesses, and the choice of the consensus mechanism de-
ical or digital assets into unique tokens in a blockchain net-
pends on the specific requirements and goals of the blockchain
work [105]. These tokens are used to represent ownership, val-
network.
ues, and other advantages and features [106]. It also supports
transparency and efficient asset transfer by removing the need
5.2. Roles of Blockchain in Web 3.0 for a third-party and related expenses. Moreover, it is the key
The emergence of Web 3.0, with its notable focus on decen- element of the Web 3.0 ecosystem and has the potential to trans-
tralization, is a key driver in shaping an open and digital land- form ownership, value, and trade in the digital world.
scape. It gives users more power to control their data [6], [15].
Unlike conventional centralized applications where user data is 5.2.4. Digital Identity
controlled by a centralized datastore, blockchain technology en- Digital identity plays a vital role in ensuring secure and
ables secure, trustless DApps that are less susceptible to vulner- trusted interactions in Web 3.0. Online identity manage-
abilities and can execute tasks automatically using smart con- ment faces serious challenges such as security and privacy.
tracts [100]. Embracing blockchain in Web 3.0 yields several Blockchain technology could be utilized to address these prob-
advantages, including heightened security, scalability, trans- lems by offering a decentralized identifying system [107]. It
parency, and efficiency [101]. By incorporating blockchain enables users to keep their identities confidential and decentral-
technology, the risk of information leakage and threats can be ized. Blockchain technology provides cryptographic keys that
reduced, while transaction costs are minimized, and transaction allows web users to access and authorize themselves securely.
speeds are increased [22]. The roles of blockchain technology In this way, web users will have complete control over their
in Web 3.0 are presented in the following subsections. online interactions as well as their digital identities [108].
Cryptography Decentralization
Data Integrity
Scalability
Privacy Protection
Incentive mechanism
Quantum Blockchain
Scalability and
Quantum
Quantum Computing
Efficiency
Communication
Security
Quantum Key
Distribution Quantum Walk
Quantum
Decentralized DI-QKD, MDI-QKD
Hypergraph
automation organization Decentralized finance
Quantum Secure Quantum Random
Digital transform Communication Number Generator Digital transform
Technical
support
Fig. 9: The proposed quantum blockchain-driven Web 3.0 framework adopted from [114]. The framework includes core infrastructure, quantum cryptography
protocols, and services based on quantum blockchain technology to support a decentralized digital society in the quantum age.
opportunities [115]. Tokenization can address these issues by for the offered rewards, establishing a connection between op-
providing a standardized way of representing information and timizing funding incentives and user reward determination in
data organization in the virtual world [89]. the blockchain network. The authors showed that the proposed
framework can enhance security, and productivity and reduce
Recently, a token-based semantic exchange framework for
costs in the interaction between users and the blockchain net-
Web 3.0 was presented in [116]. The authors used NFTs, ZKP,
work in Web 3.0.
and semantic extraction to enhance the effectiveness of Web
3.0’s interactions. In the considered system, smart contracts 5.3.4. Decentralized identity management in Web 3.0
utilize tokens to play a vital role in facilitating data exchange.
Decentralized identification is another critical component of
Users effectively upload data to off-chain storage using the in-
Web 3.0, which uses blockchain technology to provide a se-
terplanetary file system (IPFS) to access metadata. Smart con-
cure decentralized user-controlled identity ecosystem. In the
tracts and blockchain technology are utilized to semantically
conventional identification system, maintaining and protecting
store data, generate NFT tokens, and distribute them to the net-
users’ digital identities online is a critical issue leading to seri-
work. This enables the exchange of off-chain semantic data and
ous concerns about privacy and data breaches [111]. However,
the profit potential. Subsequently, a Stackelberg game is em-
these challenges can be mitigated using decentralized identity
ployed to optimize semantic pricing strategies. The proposed
to ensure data privacy and security. The users can manage their
solution offers significant improvements to trust, transparency,
digital identities using decentralized identities without elimi-
and efficiency in Web 3.0. The framework is examined through
nating third-party service providers [15]. It enables the users
an urban planning case study and proven to be efficient and ef-
to create and maintain their digital identities, as well as control
fective.
their data and privacy. These identities are protected using se-
A similar token-based incentive mechanism for the Meta- cure keys and can be potentially used to identify users across
verse Web 3.0 application was proposed in [117]. However, platforms and services with accessible identity verification and
in this work, the authors focused more on the incentives entities authentication [118].
driving the development of the blockchain network. In particu- In [107] the authors proposed a decentralized-based user
lar, the blockchain network evaluates users’ ability to generate identity framework for Web 3.0. The proposed framework es-
incentive resources and provides contract opportunities to the tablishes a one-to-one link between decentralized identity ac-
users. Once the users accept the offer, the smart contract ana- counts (i.e., souls) and users, effectively representing human
lyzes user data, categorizes incentives, and distributes them to interactions and ensuring user privacy and anonymity. In par-
the users based on their performance. Furthermore, a reward ticular, the considered framework verifies users using facial
classification system guides the selection and terms of trade recognition and then authenticates users with ZKP. The authors
19
Table 5
Summary of Blockchain-Based Approaches for Web 3.0
Meaning
utilized a consensus mechanism to encode facial recognition
results and employ linkable ring signatures for user-account
Sender
mappings within decentralized identity. The system is com-
pletely decentralized, relies on smart contracts for verification, Experience
Context
and is tested on a practical blockchain network. The result illus- Receiver
Concept
trated that the proposed framework, incorporating decentralized
identity, offers a privacy-preserving solution enabling users to
es
re
fe
o
rs
mb
Experience
to
sy
Cryptography
SPARQL
edge representation in the semantic web can be constructed
Taxonomies: RDFS from low to high levels [120]. The first level defines an object,
e.g., web resource using characters and syntax formats, e.g.,
Data Interchange: RDF Extensible Markup Language (XML). This level corresponds
to the two bottom layers of the Semantic Web stack, as shown
Syntax: XML in Fig. 11. Then, the knowledge of the object (i.e., description)
is given in the second level, corresponding to the third layer in
Web Platform
Fig. 11. Finally, the third level, i.e., entire worlds, links knowl-
Identifiers: URI Character sets: Unicode
edge among objects using various technologies from different
types, such as Taxonomies, e.g., Resource Description Frame-
Fig. 11: The Semantic Web stack [122]. work Schema, Ontologies, e.g., Web Ontology Language, and
Rules, e.g., Rule Interchange Format. Generally, the semantic
sion to Web 2.0 [121]. This may lead to confusion between the web is developed based on this principle.
semantic web, and Web 3.0. They are sometimes used inter- The W3C, which is in charge of semantic web standardiza-
changeably; however, the semantic web is only a critical tech- tion, proposes the semantic web stack that groups the SWT into
nology used in Web 3.0 (in addition to other enabling technolo- different layers, as shown in Fig. 11. In this stack, a layer uses
gies like blockchain, AI, and IoT). Instead of explicitly pre- services from its lower layer and provides services to its upper
senting information in specific textual and graphical forms, the layer. As such, each layer is built based on its lower layer, and
semantic web technologies aim to provide meaning/facts of in- it tends to be more complex than its lower layers.
formation regardless of how it is presented by symbols. For ex-
6.1.1. Web platform and syntax layers
ample, the word “jaguar” can be represented by different sym-
These first two layers build the foundations for semantic web
bols in different languages, as shown in Fig. 10. Moreover, the
technologies. The web platform (the lowest layer) defines the
word can refer to various objects, such as animals, cars, and
web resources uniquely based on the Uniform Resource Identi-
versions of the operating system. This ability to express and
fier (URI) and a character set, e.g., Unicode. Then, the syntax
understand multiple meanings of words allows the web to do
layer defines the syntax/format of the data according to the Ex-
more meaningful work. To that end, the semantic web tech-
tensible Markup Language (XML). On the other hand, XML
nologies aim to provide intelligent data that machines can eas-
gives syntaxes for its upper layers, e.g., the Data Interchange,
ily and automatically search, retrieve, and process [122]. In
to describe information. Note that the bottom two layers’ tech-
other words, the goal of semantic web technologies is to make
nologies, e.g., URI, Unicode, and XML are well-defined and
web data machine-readable and define how knowledge is repre-
are the foundation for the semantic web. Thus, this stack shows
sented so that humans and machines can work in cooperation.
that the semantic web aims to extend (not replace) the current
In practice, enabling automatic machine processing can be web version.
accomplished in two ways [122]. The first approach aims to
build a smarter machine by teaching the machine to infer the 6.1.2. Data interchange layer
meaning of data, possibly accomplished by AI-based methods, Although XML is well-known for providing web document
such as natural language and image recognition. The second format, machines cannot understand it. As such, the Re-
approach, based on the semantic web technologies, focuses on source Description Framework (RDF) is proposed as a core
building smarter data by expressing data and its meaning in a data representation format for the semantic web [122]. The
standard format that machines can automatically “read”. In ad- RDF leverages URI to identify the resources (e.g., objects
dition, the semantic web technologies also enable decentraliz- and subjects on the web) and describe them in terms of their
ing data across the network. Thus, the semantic webs are ex- predicates (i.e., properties and values). Thus, the RDF can
pected to transform the web from the “web of documents” e.g., be considered as a simple language to describe things, e.g.,
Web 1.0 and Web 2.0 to the “web of data” [123]. This section expressing relationships among web resources. In partic-
first presents fundamental technologies supporting the seman- ular, RDF represents information by a triple, i.e., subject-
tic web, called Semantic Web Technologies (SWT). Then, the predicate-object, that forms a graph of data [124], as shown
state-of-the-art in SWT is surveyed. Finally, the current chal- in Fig. 12 (a). For example, the RDF triple of a state-
lenges of SWT are discussed. ment “Beau Doe has a homepage www.example.com/beau”
21
Subject Object sent knowledge, to enable the classification of concepts [120].
URI Predicate URI \ Lireral Specifically, the technologies of this layer, e.g., the RDF
Schema (RDFS), supply a vocabulary for describing classes and
URI properties of RDF-based resources. For that, the RDFS is also
called RDF Vocabulary Description Language. Let us return to
(a) The RDF triple (statement): Subject-Predicate- the previous examples illustrated in Fig. 12, Beau Does can be-
Object [124]
long to the person class, the predicate can be the property class,
Subject Object and both are sub-classes of the resource class. In RDFS, the
http://www.example.org/beau/ resource class is the foundation of all other classes.
Predicate http://www.example.org/beau
contact.rdf\#beaudoe
Pragmatic Layer
Pragmatic Layer
Semantic Channel Circulating semantic
Circulating semantic ecosystems
ecosystems
Encoding and decoding channels Channel Encoding Physical Channel Encoding and decoding
channels
Fig. 14: The framework proposed in [106] is based on the unified blockchain-semantic and enables Web 3.0.
ecosystem. This approach aims to enhance safety checking au- 7. 3D Interactive Web Technology
tomatically through the utilization of SPARQL-based reasoning
techniques [136]. The approach involves converting them into 7.1. Background of 3D Interactive Web Technology
integrated ontology instances, extracting threats from BIM and The emergence of 3D interactive web technology, sometimes
sensor information, and developing interconnected ontologies known as “Web3D” has brought in a new era of engaging and
for subway construction safety checking. In this way, the au- dynamic online experiences for users. It enables web users
tomation of converting text-based rules within checking rules to engage with immersive and dynamic 3D content. Further-
empowered by SPARQL-based can be achieved. As a result, more, it creates incredible new opportunities for online cre-
the proposed platform can improve automated safety checking ativity, communication, and engagement through the use of 3D
and knowledge sharing. images, by real-time interactivity [138]. The conventional 2D
web has limited contents, such as texts, photos, and videos,
6.3. Insights and Summary Therefore, the 3D interactive web offers direct access to im-
Semantic web technologies play a vital role in Web 3.0 for mersive worlds through web browsers by integrating Hyper-
a range of capabilities. These technologies can facilitate the text Markup Language version 5 (HTML5) www.html.com,
seamless integration of web services, ensuring high-quality ser- Web Extended Reality (WebXR) (www.immersiveweb.dev),
vice composition. They can cluster and manage web services Three.js (www.threejs.org), Babylon.js (www.babylonjs.com),
effectively, improving discoverability and utilization within PlayCanvas (www.playcanvas.com), and Extended 3D Tech-
Web 3.0 ecosystems. Semantic modeling and scene under- nology (X3D) (www.web3d.org). These cutting-edge technolo-
standing can enhance cooperative systems like multi-unmanned gies enable the 3D interactive web to be easily accessible on a
ground vehicle (UGV) systems for intelligent decision-making. wide range of platforms and devices. Fig. 15 illustrates a high-
Resource consumption challenges in Web 3.0 can be addressed level design for a 3D interactive web platform. The design in-
through semantic information analysis, reducing resource us- cludes a web editor, game assets, and semantics to assist in the
age while ensuring secure interactions. Additionally, heteroge- development of innovative 3D cultural worlds. This design thus
neous data integration and automated safety checking can be simplifies the development of interactive experiences and exhi-
achieved using semantic web technologies, improving knowl- bitions by curators and non-programmers who lack program-
edge sharing and real-time monitoring. Table 6 summarizes the ming expertise.
current state-of-the-art semantic web technologies tailored for Web graphics library (WebGL) enables the representation of
Web 3.0. It provides a condensed overview of the advance- interactive 3D graphics, visualizations, games, and virtual re-
ments, methodologies, or key findings in the field of semantic ality experiences directly in web browsers. It is crucial for
web technologies relevant to the context of Web 3.0. building engaging virtual worlds where users can participate in
24
Table 6
Summary of the State-of-the-Art in Semantic Web Technologies for Web 3.0
3D online experiences. The primary purpose of WebGL is to immerse themselves in virtual environments where they inter-
connect JavaScript and the computer’s GPU, allowing for rapid act with virtual items and explore in real-time by allowing 3D
real-time processing of complex 3D scenarios [139]. It uses experiences in web browsers [144]. This thus can fill the gap
custom shader programs written in OpenGL Shading Language between the virtual and real worlds, giving users personalized
(GLSL) to control how 3D objects look at the final output. It and exciting experiences in the Web 3.0 era. In short, the roles
also provides users to navigate and interact with a virtual world of 3D interactive web technologies in Web 3.0 are:
to explore objects and environments in real-time with 3D mate-
rials, that were previously restricted to the traditional web.
• Enhance web users’ experiences using 3D visuals, VR/AR
Fig. 16 illustrates the WebGL technology utilized in the 3D
headsets, haptic devices, and recognition sensors [145].
web platform. In particular, the figure consists of three lay-
These technologies have become essential for developing
ers, each layer playing a crucial role in enabling the creation
interactive worlds with an atmosphere of reality and im-
and rendering of 3D graphics in web applications. On the top
mersion. It improves the web experience for all users by
layer, the middleware layer plays a pivotal role by providing
making it more interesting and realistic.
developers with essential tools and libraries like three.js. This
layer acts as an interface, allowing developers to focus on cre-
ating 3D experiences. Moving to the middle layer, WebGL API • Enable the creation of new applications and services that
provides a rich JavaScript middleware ecosystem which is used make effective use of the web’s spatial and semantic fea-
to bridge the gap between the middleware and the rendering en- tures. These applications include virtual museums, gam-
gine to ensure an enjoyable browsing experience [141]. Finally, ing platforms, e-commerce solutions, real estate inter-
at the bottom layer, WebGL utilizes OpenGL, for translating faces, tourism platforms, and more [146]. Leveraging
high-level requests from the WebGL API into hardware-specific these semantic features enables the development of dy-
commands, ensuring 3D content across a variety of devices and namic and engaging experiences, providing users with a
systems seamlessly [142]. The next sub-section delves into an diversified and immersive online environment across sev-
exploration of the roles of 3D interactive web technology, and eral domains and industries.
how this innovative technology is revolutionizing user experi-
ences in Web 3.0. • Boost user and community involvement across a variety
of platforms and devices. Shared experiences and seam-
7.2. The Role of 3D Interactive Web Technology in Web 3.0 less engagement can be achieved using 3D avatars, social
The 3D interactive web is an essential component of the im- networks, live streaming, and related technology [147].
plementation of Web 3.0, creating its environment while ren- These technologies are essential to building a digital world
dering it a reality. It has a huge influence on the web’s growth where individuals can communicate, work together, and
toward Web 3.0, which is designed to be more immersive, in- develop connections anywhere within any device. Incor-
telligent, and decentralized [143]. Web 3.0 users are expected porating such components makes online engagement more
to experience dynamic and exciting information which is effi- dynamic and exciting, encouraging an atmosphere of com-
cient and can be achieved using 3D interactive web. Users can munity and shared engagement.
25
Server End User
2.8 Analytics
Devices
1. Web Browser Plugin
Web Browser
AR
Structure sensor
(Binary)
2.3 Parser
1.2 Reader-Writer 2.4 Semantic Module
External
Web-sites
3.1
Fig. 15: A high-level design for a server-based 3D interactive web platform for 3D cultural worlds [137]. The design is intended to facilitate the building of new
3D cultural worlds and comprises a web editor, gaming assets, and semantics, making it easier for curators and non-programmers to develop interactive experiences
and exhibitions without requiring extensive programming knowledge.
Fig. 17: The proposed 3D scene modeling and XR presentation of the cloud-edge-client architecture [155]. The process involves using point cloud-based 3D scene
perception and modeling, collaborative computing paradigm, and XR presentation. The different stages of the process work together to optimize task allocation,
ensure system openness, scalability, and controllability, and present the 3D digital twin model in an immersive and interactive way.
a body tracking software development kit (SDK) to replicate challenges arising from the integration of one or several tech-
patient movements to an avatar. The proposed framework en- nologies, such as blockchain, semantic web, 3D interactive, and
ables patients to access information, visualize training data, and IoT, as the infrastructure for Web 3.0.
make decisions regarding health conditions. Patients accessed
and completed training exercises through the 3D platform. The
authors assessed the effectiveness of the framework and encour- 8.1. Open Issues
aged users to follow physical rehabilitation goals using the use
of VR technology. 8.1.1. Security and privacy
Security and privacy are paramount in Web 3.0 due to its
7.4. Insights and Summary transformative nature as an advanced, decentralized, and vir-
3D web technology plays a crucial role in the evolution of tual Internet [162]. The integration of technologies such as
the internet into Web 3.0 by enhancing user experiences and blockchain, IoT, AI, 5G, semantic web, and interactive 3D web
enabling new functionalities. It enables the creation of immer- has transformed the internet environment, making it more vir-
sive environments in which people engage with digital mate- tual, decentralized, and interconnected. This transformative
rial in a more engaging and realistic way. This section focuses revolutionary Web 3.0 nature raises several security and pri-
on the application of 3D interactive technology in the devel- vacy issues such as smart contract vulnerabilities, data breaches
opment of Web 3.0 in the future. 3D web technology can dy- in IoT devices, and privacy infringements through AI-driven
namically improve the seamless integration of virtual reality ex- personalization[163]. To overcome these challenges, techni-
periences and enable high-quality immersion in virtual worlds. cal solutions must be developed and executed. Reliable cryp-
Despite of its advantages, it also presents challenges for de- tographic approaches, such as homomorphic encryption and
velopers, such as producing realistic and engaging 3D displays zero-knowledge proofs, can improve the security and privacy
for users and developing reliable and efficient algorithms for of Web 3.0 applications. Decentralized identity management
processing, presenting, and transmitting 3D data over the In- solutions based on blockchain technology can provide individ-
ternet. All these challenges will be carefully considered when uals with more control over their personal information and pri-
integrating enabling technologies (i.e. WebGL, HTML5, We- vacy settings. Furthermore, developments in federated learn-
bXR, Three.js, Babylon.js, and X3D) in Web 3.0 in the future. ing and differential privacy can reduce the privacy hazards con-
Researchers keep looking for new ways to improve, and the nected with AI-powered data processing. Furthermore, regu-
combination of 3D technology and Web 3.0 is set to change the latory policymakers must adapt current rules with new rules
digital world more interactively. A summary of the 3D interac- to reflect the distinct characteristics of decentralized systems.
tive approaches for Web 3.0 is presented in Table 7. To maintain accountability and defend user rights, compliance
with data protection laws, cybersecurity standards, and privacy
regulations is becoming essential. Additionally, information
8. Open Issues and Emerging Technologies exchange and the creation of industry standards depend heavily
on collaborative efforts among stakeholders, from developers
In this section, we discuss the inherent challenges of incor- to legislators. The reliability of data and transactions is piv-
porating emerging technologies to improve the performance of otal for the creative and innovative development of Web 3.0
Web 3.0. We also introduce ideas to address the complexities applications, ultimately enabling scalability, and efficiency, and
associated with these novel fusions. Our main focus centers on minimizing associated costs and risks.
28
Table 7
Summary of 3D Interactive Approaches for Web 3.0
8.1.2. Interoperability, scalability, and efficiency compelling reasons. Firstly, blockchain technology is well-
Interoperability, scalability, and efficiency are crucial for the known for its inherent energy-intensive characteristics. This is
success and adoption of Web 3.0, as they determine the practi- predominantly attributed to the multitude of nodes required for
cality and effectiveness of this new Internet era [57]. Interoper- transaction validation and ledger maintenance, each necessitat-
ability ensures that different blockchain networks and DApps ing substantial computational resources, consequently leading
can seamlessly communicate and transact with one another, to substantial energy consumption. Secondly, it is important
fostering a cohesive ecosystem rather than isolated platforms. to consider that IoT devices often operate on limited battery
Scalability is essential to accommodate the growing number power, necessitating prudent management of energy resources
of users and transactions on the network without compromis- to ensure sustained functionality. Integrating these IoT devices
ing performance, which is vital for real-time applications in the into blockchain networks could potentially deplete their power
Web 3.0 space. Efficiency in processing transactions and us- reserves, thus reducing their operational lifespan. Thirdly, Web
ing resources is key to making Web 3.0 both environmentally 3.0 is poised to encompass a multitude of diverse applications
sustainable and cost-effective for users. However, achieving and services, each entailing specific requirements for the in-
these objectives in a decentralized environment presents signif- volved blockchain and IoT devices. For example, certain ap-
icant challenges. Ensuring interoperability across diverse and plications within the Web 3.0 ecosystem may demand high-
often incompatible blockchain protocols is a complex task, re- performance capabilities, while others may prioritize energy
quiring standardized frameworks and technologies. Scalability efficiency. A skewed trade-off between energy consumption
poses difficulties as increasing the capacity of decentralized net- and performance could potentially lead to detrimental conse-
works often leads to challenges in maintaining security and de- quences for the advancement of Web 3.0. Excessive energy
centralization. Furthermore, enhancing efficiency, especially in consumption within blockchain networks may discourage user
consensus mechanisms like Proof-of-Work, which are energy- engagement and jeopardize the sustainability of Web 3.0. Addi-
intensive, is crucial to address environmental concerns and im- tionally, if IoT devices cannot effectively conserve energy, their
prove transaction speeds. Thus, while interoperability, scala- ability to participate in Web 3.0 applications and services could
bility, and efficiency are foundational for the functionality and be restricted.
growth of Web 3.0, they also represent some of the most signif-
icant technical hurdles that need to be overcome.
8.2. Emerging Technologies
8.1.3. Energy efficiency and performance optimization
Web 3.0’s computational and communicative capabilities de-
pend heavily on balancing the energy consumption and opera- The integration of cutting-edge technologies assumes a piv-
tional efficiency of blockchain and IoT devices, which are key otal role in shaping the trajectory of Web 3.0’s evolution. This
components of its computational and communicative functions. section delves into a spectrum of emerging technologies poised
This equilibrium presents a formidable challenge for several to significantly advance the development of Web 3.0.
29
8.2.1. WebAssembly (Wasm) 3.0, characterized by its decentralized nature and heightened
Web 3.0 is envisaged as a transformative force in shaping a focus on user privacy and data sovereignty, ZKPs offer im-
more intelligent, decentralized, and immersive online environ- mense potential. They enable the verification of transactions or
ment, as noted in a work on blockchain [164]. This evolution data authenticity within blockchain networks without exposing
necessitates web applications and services to augment their ef- the underlying data, thus maintaining privacy and confidential-
ficiency, resilience, and adaptability across diverse platforms ity. This is especially beneficial for DeFi, secure voting sys-
and devices. An instrumental solution to address these chal- tems, and identity verification processes, where the need to val-
lenges is WebAssembly [165], a binary instruction format for idate information without compromising privacy is paramount.
a virtual computer that can operate within web browsers. We- Moreover, ZKPs can enhance the scalability of blockchain net-
bAssembly liberates online programs and services from the lim- works by enabling more efficient data processing and reducing
itations imposed by intermediary layers of abstraction between the amount of information that needs to be stored on-chain. The
JavaScript and the CPU, allowing them to fully harness the ability to prove the correctness of transactions without revealing
computational capabilities of the CPU [165]. The implications their contents could greatly reduce the computational load and
of WebAssembly for the online platform are extensive, as it em- storage requirements, addressing some of the scalability chal-
powers web-based client applications that previously struggled lenges faced by current blockchain technologies. As Web 3.0
to attain such performance to execute code written in multi- continues to evolve, integrating ZKPs into its framework could
ple languages [166]. Importantly, WebAssembly is engineered significantly advance its capabilities in terms of privacy, secu-
to seamlessly coexist with JavaScript, facilitating the incorpo- rity, and efficiency, making it a key technology for the future
ration of WebAssembly modules into JavaScript applications development of the decentralized web.
through the use of WebAssembly JavaScript APIs. This inte-
gration enables users to leverage WebAssembly’s capabilities 8.2.4. Generative AI
while harnessing the versatility and adaptability of JavaScript Generative AI (GAI), a facet of AI capable of generating
within the same applications, even for those who may not be novel content spanning text, visuals, and music, assumes sub-
well-versed in writing WebAssembly code [166]. stantial importance within the development of Web 3.0. This
significance rests on a multitude of compelling rationales [169].
8.2.2. Quantum computing Firstly, it acts as a catalyst for the development of inventive
Quantum computing, considered an emerging technology, Web 3.0 applications. For instance, generative AI finds utility
provides both immense promise and significant challenges to in crafting applications that produce personalized content, aid-
Web 3.0. Leveraging the principles of quantum mechanics, ing users in the creation of their digital assets, and facilitating
quantum computers promise to exponentially increase compu- novel, immersive interactions within the digital domain. Sec-
tational power, enabling the processing of complex data sets ondly, generative AI contributes to the augmentation of Web
and the execution of advanced algorithms at unprecedented 3.0 applications’ performance and scalability. It plays a piv-
speeds. This capacity has the potential to transform Web 3.0 otal role in conceiving innovative data compression algorithms,
applications by improving data security using quantum encryp- streamlining the performance of Web 3.0 networks, and intro-
tion, streamlining decentralized networks, and enabling real- ducing advanced security features to fortify Web 3.0 applica-
time data analysis for immersive virtual experiences. How- tions. Thirdly, generative AI endeavors to simplify and enhance
ever, some challenges must be resolved before quantum com- the user experience in Web 3.0, manifesting through the cre-
puting can be completely incorporated into Web 3.0. These ation of intuitive tools and interfaces that streamline user inter-
include creating stable and scalable quantum hardware, de- actions with applications and services. As generative AI con-
veloping quantum-resistant cryptographic methods to protect tinues its evolution and maturation, its prominence within the
data from quantum incidents, and developing innovative pro- Web 3.0 ecosystem is bound to witness significant expansion.
gram concepts appropriate for quantum computing [114]. Ad-
ditionally, integrating quantum computing with conventional 9. Conclusion
web technologies creates major technical and interoperability
problems [167]. Consequently, researchers and developers are Web 3.0 is an emerging technology that has the potential to
actively investigating these areas, seeking to solve the chal- bring a tremendous revolution in various fields, such as finance,
lenges. Addressing these difficulties will be essential for quan- IoT, health informatics, education, distributed applications, and
tum computing’s effective integration into Web 3.0, allowing it supply chain management. In this article, we have presented
to achieve its full potential to transform the digital world and a comprehensive survey on how technologies can enable, em-
drive the next generation of web technologies. power, and revolutionize Web 3.0. Firstly, we have presented
an overview of Web 3.0, discussed its effectiveness, and high-
8.2.3. Zero-knowledge proofs (ZKPs) lighted a number of applications and recent industry standards
ZKPs are a revolutionary cryptographic method enabling one where the technologies were potentially deployed. Then, we
party to prove to another that a statement is true without re- have discussed and demonstrated various important technolo-
vealing any information beyond the validity of the statement gies that will play key roles in the future development of Web
itself [168]. This technology is particularly significant in the 3.0, (i.e., IoT, 5G, blockchain, semantic web, and 3D interac-
context of privacy and security in digital transactions. In Web tive web technologies). For each technology, we have provided
30
an overview, examined the state-of-the-art, and discussed how [20] W. Zhao, C. Jiang, H. Gao, S. Yang, X. Luo, Blockchain-enabled cyber-
it can be utilized in future development of Web 3.0 scenarios. physical systems: A Review, IEEE Internet of Things Journal 8 (6) (Mar.
2020) 4023–4034.
Finally, we have discussed open issues and some potential solu- [21] D. Chen, L. J. Xie, B. Kim, L. Wang, C. S. Hong, L.-C. Wang, Z. Han,
tions that will pave the way for the wide adoption and deploy- Federated learning based mobile edge computing for augmented reality
ment of Web 3.0 in the near future. applications, in: Proc. 2020 International Conference on Computing,
Networking and Communications (ICNC), 2020, pp. 767–773.
[22] F. A. Sunny, P. Hajek, M. Munk, M. Z. Abedin, M. S. Satu, M. I. A.
Efat, M. J. Islam, A systematic review of blockchain applications, IEEE
References Access 10 (Jun. 2022) 59155–59177.
[23] E. R. J. Frankenfield, S. Kvilhaug, 51% attack: Definition, who is at
[1] History of the web, https://webfoundation.org/about/vision/ risk, example, and cost, https://www.investopedia.com/terms/
history-of-the-web/. (2023). 1/51-attack.asp. (2023).
[2] S. Salim, B. Turnbull, N. Moustafa, A blockchain-enabled explainable [24] R. Gupta, An introduction to terminologies and lay-
federated learning for securing internet-of-things-based social media 3.0 ers in web3, https://techblog.geekyants.com/
networks, IEEE Transactions on Computational Social Systems (Dec. an-introduction-to-terminologies-and-layers-in-web3/.
2021) 1–17. (2022).
[3] K. Korkmaz, J. Bruneau-Queyreix, S. B. Mokhtar, L. Reveillere, [25] B. Lashkari, P. Musilek, A comprehensive review of blockchain consen-
ALDER: Unlocking blockchain performance by multiplexing consen- sus mechanisms, IEEE Access 9 (Mar. 2021) 43620–43652.
sus protocols, in: Proc. IEEE 21st International Symposium on Network [26] C. T. Nguyen, D. T. Hoang, D. N. Nguyen, D. Niyato, H. T.
Computing and Applications (NCA), Vol. 21, Jan. 2022, pp. 9–18. Nguyen, E. Dutkiewicz, Proof-of-stake consensus mechanisms for fu-
[4] W.-Y. Lin, X. Zhang, H. Song, K. Omori, Health information seeking in ture blockchain networks: Fundamentals, applications and opportuni-
the Web 2.0 age: Trust in social media, uncertainty reduction, and self- ties, IEEE Access 7 (Jun. 2019) 85727–85745.
disclosure, Computers in Human Behavior 56 (Mar. 2016) 289–294. [27] S. P. Choudary, Understanding the incentives for
[5] B. Stritter, F. Freiling, H. König, R. Rietz, S. Ullrich, A. von Gernler, web3, https://medium.com/bosonprotocol/
F. Erlacher, F. Dressler, Cleaning up web 2.0’s security mess-at least understanding-the-incentives-for-web3-ca15ec6b30f7/.
partly, IEEE Security & Privacy 14 (2) (Apr. 2016) 48–57. (2021).
[6] J. Zarrin, H. Wen Phang, L. Babu Saheer, B. Zarrin, Blockchain for [28] X. Liu, Z. Tang, P. Li, S. Guo, X. Fan, J. Zhang, A graph learn-
decentralization of Internet: prospects, trends, and challenges, Cluster ing based approach for identity inference in Dapp platform blockchain,
Computing 24 (4) (May, 2021) 2841–2866. IEEE Transactions on Emerging Topics in Computing 10 (1) (Sep. 2020)
[7] P. Drakatos, E. Demetriou, S. Koumou, A. Konstantinidis, 438–449.
D. Zeinalipour-Yazti, Triastore: A Web 3.0 blockchain datastore [29] K. Yue, Y. Zhang, Y. Chen, Y. Li, L. Zhao, C. Rong, L. Chen, A survey
for massive IoT workloads, in: Proc. 2021 22nd IEEE International of decentralizing applications via blockchain: The 5G and beyond per-
Conference on Mobile Data Management (MDM), 2021, pp. 187–192. spective, IEEE Communications Surveys & Tutorials 23 (4) (Sep. 2021)
[8] X. Zhang, G. Min, T. Li, Z. Ma, X. Cao, S. Wang, AI and Blockchain 2191–2217.
Empowered Metaverse for Web 3.0: Vision, Architecture, and Future [30] G. Weston, Blockchain for Decentralized Finance (DeFi), https://
Directions, IEEE Communications Magazine 61 (8) (Jun. 2023) 60–66. 101blockchains.com/web3-guide/. (2022).
[9] X. Ren, M. Xu, D. Niyato, J. Kang, Z. Xiong, C. Qiu, X. Wang, Build- [31] W. Ding, J. Hou, J. Li, C. Guo, J. Qin, R. Kozma, F.-Y. Wang, De-
ing Resilient Web 3.0 with Quantum Information Technologies and Sci based on Web3 and DAO: A comprehensive overview and reference
Blockchain: An Ambilateral View, arXiv:2303.13050 (Mar. 2023). model, IEEE Transactions on Computational Social Systems 9 (5) (Sep.
[10] S. Salim, B. Turnbull, N. Moustafa, Data analytics of social media 3.0: 2022) 1563–1573.
Privacy protection perspectives for integrating social media and Inter- [32] S. Cucko, M. Turkanovic, Decentralized and self-sovereign identity:
net of Things (SM-IoT) systems, Ad Hoc Networks 128 (Apr. 2022) Systematic mapping study, IEEE Access 9 (Oct. 2021) 139009–139027.
102786–102801. [33] Q. Wang, R. Li, Q. Wang, S. Chen, Non-fungible token (NFT):
[11] R. Z. Cabada, M. L. B. Estrada, F. G. Hernández, R. O. Bustillos, C. A. Overview, evaluation, opportunities and challenges, arXiv:2105.07447
Reyes-Garcı́a, An affective and web 3.0-based learning environment for (Oct. 2021).
a programming language, Telematics and Informatics 35 (3) (2018) 611– [34] D. T. Hoang, D. N. Nguyen, C. T. Nguyen, E. Hossain, D. Niyato, Meta-
628. verse Communication and Computing Networks: Applications, Tech-
[12] F. Bashir, N. F. Warraich, Systematic literature review of semantic web nologies, and Approaches, IEEE-Wiley (2023).
for distance learning, Interactive Learning Environments 31 (1) (Aug. [35] Y.-J. Liu, H. Du, D. Niyato, G. Feng, J. Kang, Z. Xiong, Slicing4Meta:
2023) 527–543. An Intelligent Integration Architecture with Multi-dimensional Network
[13] A. N. Turi, A. N. Turi, Currency under the web 3.0 economy, Tech- Resources for Metaverse-as-a-Service in Web 3.0, IEEE Communica-
nologies for Modern Digital Entrepreneurship: Understanding Emerg- tions Magazine 61 (8) (Aug. 2023) 438–449.
ing Tech at the Cutting-Edge of the Web 3.0 Economy (2020) 155–186. [36] semantic, Semantic mediawiki, https://www.
[14] C. Chen, L. Zhang, Y. Li, T. Liao, S. Zhao, Z. Zheng, H. Huang, J. Wu, semantic-mediawiki.org/wiki/Semantic_MediaWiki. (2023).
When digital economy meets Web 3.0: Applications and challenges, [37] Ivan Cryptoslav, Somnium space tokenomics,
IEEE Open Journal of the Computer Society 3 (Oct. 2022) 233–245. https://coinmarketcap.com/academy/article/
[15] P. P. Ray, Web3: A comprehensive review on background, technologies, what-is-somnium-space. (2023).
applications, zero-trust architectures, challenges and future directions, [38] M. McFadden, Web 3.0 and standards, https://dnsrf.org/blog/
Internet of Things and Cyber-Physical Systems (May, 2023) 213–248. web-3-0-and-standards/index.html (2023).
[16] P. Singh, R. Garg, P. Nagrath, A survey on web 3.0 security issues and [39] Consensys, A detailed guide on web 3.0, https://consensys.net/
financial supply chain risk based on neural networks and blockchain, in: blockchain-use-cases/decentralized-finance/. (2023).
Computational Intelligence for Engineering and Management Applica- [40] Ericsson, IoT connections forecast - Mobility Report, https://www.
tions: Select Proceedings of CIEMA 2022, Springer, 2023, pp. 547–559. ericsson.com/en/reports-and-papers/mobility-report/
[17] T. Issa, Artificial intelligence technologies and the evolution of Web 3.0, dataforecasts/iot-connections-outlook/. (2023).
Pennsylvania, United States, IGI Global, 2015. [41] X. Wang, J. Yang, J. Han, W. Wang, F.-Y. Wang, Metaverses and
[18] O. Adedugbe, E. Benkhelifa, R. Campion, F. Al-Obeidat, A. Bani Hani, DeMetaverses: From digital twins in CPS to parallel intelligence in
U. Jayawickrama, Leveraging cloud computing for the semantic web: CPSS, IEEE Intelligent Systems 37 (4) (Sep. 2022) 97–102.
Review and trends, Soft Computing 24 (Nov. 2020) 5999–6014. [42] O. Novo, M. D. Francesco, Semantic interoperability in the IoT: ex-
[19] S. Tanwar, Blockchain revolution from 1.0 to 5.0: technological perspec- tending the web of things architecture, ACM Transactions on Internet of
tive, in: Blockchain Technology: From Theory to Practice, Singapore, Things 1 (1) (Mar. 2020) 1–25.
Springer, 2022, pp. 43–61.
31
[43] P. Patel, M. I. Ali, A. Sheth, From raw data to smart manufacturing: AI [64] S. Ferber, Production performance management,
and semantic web of things for industry 4.0, IEEE Intelligent Systems https://iot.eclipse.org/adopters/testbeds/
33 (4) (Oct. 2018) 79–86. production-performance-management/. (2012).
[44] W. Group, Web of things (wot) architecture, https://w3c.github. [65] Ericsson, 5G network coverage outlook-Mobility Report,
io/wot-architecture/. (2023). https://www.ericsson.com/en/reports-and-papers/
[45] H. Jethva, JSON A Brief Background, https://www.alibabacloud. mobility-report/dataforecasts/network-coverage/.
com/blog/basics-of-working-with-json-in-sql-server_ (2023).
597409. (2023). [66] X. Lin, N. Lee, Introduction to 5G and Beyond, 5G and Beyond: Fun-
[46] T. L. Koreshoff, T. W. Leong, T. Robertson, Approaching a human- damentals and Standards (Aug. 2021) 1–25.
centred internet of things, in: Proc. of the 25th Australian Computer- [67] A. Weissberger, IMT vision–Framework and overall objectives of the
Human Interaction Conference: Augmentation, Application, Innova- future development of IMT for 2020 and beyond, Recommendation ITU
tion, Collaboration, 2013, pp. 363–366. 2083 (0) (Jan. 2015).
[47] S. M. Oteafy, H. S. Hassanein, Iot in the fog: A roadmap for data-centric [68] 3GPP, System architecture for the 5G system (5GS), 3GPP
iot development, IEEE Communications Magazine 56 (3) (Mar. 2018) TS23.501, https://2020.standict.eu/standards-watch/
157–163. system-architecture-5g-system/. (2022).
[48] Q. Wu, G. Ding, Y. Xu, S. Feng, Z. Du, J. Wang, K. Long, Cognitive [69] L. Chettri, R. Bera, A Comprehensive Survey on Internet of Things (IoT)
Internet of Things: a new paradigm beyond connection, IEEE Internet Toward 5G Wireless Systems, IEEE Internet of Things Journal 7 (1)
of Things Journal 1 (2) (Mar. 2014) 129–143. (Oct. 2019) 16–32.
[49] M. Yannuzzi, R. Milito, R. Serral-Gracià, D. Montero, M. Nemirovsky, [70] S. Hakak, T. R. Gadekallu, P. K. R. Maddikunta, S. P. Ramu, P. M, C. De
Key ingredients in an iot recipe: Fog computing, cloud computing, and Alwis, M. Liyanage, Autonomous vehicles in 5G and beyond: A survey,
more fog computing, in: Proc. 2014 IEEE 19th International Workshop Vehicular Communications 39 (Feb. 2023) 100551–100582.
on Computer Aided Modeling and Design of Communication Links and [71] N. Abbas, Y. Zhang, A. Taherkordi, T. Skeie, Mobile edge computing:
Networks (CAMAD), 2014, pp. 325–329. A survey, IEEE Internet of Things Journal 5 (1) (Sep. 2018) 450–465.
[50] M. Tao, J. Zuo, Z. Liu, A. Castiglione, F. Palmieri, Multi-layer cloud [72] Y. Siriwardhana, P. Porambage, M. Liyanage, M. Ylianttila, A survey on
architectural model and ontology-based security service framework for mobile augmented reality with 5G mobile edge computing: Architec-
iot-based smart homes, Future Generation Computer Systems 78 (Jan. tures, applications, and technical aspects, IEEE Communications Sur-
2018) 1040–1051. veys & Tutorials 23 (2) (Feb. 2021) 1160–1192.
[51] S. Wang, L. Ouyang, Y. Yuan, X. Ni, X. Han, F.-Y. Wang, Blockchain- [73] I. Ahmed, H. Khammari, A. Shahid, A. Musa, K. S. Kim, E. De Poorter,
enabled smart contracts: architecture, applications, and future trends, I. Moerman, A Survey on Hybrid Beamforming Techniques in 5G: Ar-
IEEE Transactions on Systems, Man, and Cybernetics: Systems 49 (11) chitecture and System Model Perspectives, IEEE Communications Sur-
(Feb. 2019) 2266–2277. veys and Tutorials 20 (4) (Jun. 2018) 3060–3097.
[52] T. M. Fernández-Caramés, P. Fraga-Lamas, A review on the use of [74] M. Mezzavilla, M. Zhang, M. Polese, R. Ford, S. Dutta, S. Rangan,
blockchain for the internet of things, IEEE Access 6 (May, 2018) 32979– M. Zorzi, End-to-end simulation of 5G mmWave networks, IEEE Com-
33001. munications Surveys & Tutorials 20 (3) (Apr. 2018) 2237–2263.
[53] B. Bhushan, C. Sahoo, P. Sinha, A. Khamparia, Unification of [75] T. S. Rappaport, G. R. MacCartney, M. K. Samimi, S. Sun, Wide-
blockchain and internet of things (biot): requirements, working model, band millimeter-wave propagation measurements and channel models
challenges and future directions, Wireless Networks 27 (Aug. 2021) 55– for future wireless communication system design, IEEE Transactions on
90. Communications 63 (9) (May, 2015) 3029–3056.
[54] M. A. Rahman, M. S. Hossain, M. S. Islam, N. A. Alrajeh, G. Muham- [76] A. Kayyali, Web3, 5G, and the Metaverse: The Un-
mad, Secure and provenance enhanced Internet of health things frame- derlying Technology, https://insidetelecom.com/
work: A blockchain managed federated learning approach, IEEE Access web3-5g-and-the-metaverse-the-underlying-technology/.
8 (Nov. 2020) 205071–205087. (2023).
[55] S. Saxena, B. Bhushan, M. A. Ahad, Blockchain based solutions to se- [77] Y. Cheng, M. Pesavento, Joint optimization of source power alloca-
cure IoT: Background, integration trends and a way forward, Journal of tion and distributed relay beamforming in multiuser peer-to-peer relay
Network and Computer Applications 181 (May, 2021) 103050. networks, IEEE Transactions on Signal Processing 60 (6) (Feb. 2012)
[56] B. Farahani, F. Firouzi, M. Luecking, The convergence of IoT and dis- 2962–2973.
tributed ledger technologies (DLT): Opportunities, challenges, and solu- [78] N. H. Chu, D. T. Hoang, D. N. Nguyen, K. T. Phan, E. Dutkiewicz,
tions, Journal of Network and Computer Applications 177 (Mar. 2021) D. Niyato, T. Shu, Metaslicing: A novel resource allocation framework
102936. for metaverse, IEEE Transactions on Mobile Computing (2023) 1–18.
[57] G. Hatzivasilis, I. Askoxylakis, G. Alexandris, D. Anicic, A. Bror- [79] Q. Wang, P. Wang, W. Sun, Y. Zhang, Low-Latency Communications
ing, V. Kulkarni, K. Fysarakis, G. Spanoudakis, The Interoperability of for Digital Twin Empowered Web 3.0, IEEE Network, Early Access,
Things: Interoperable solutions as an enabler for IoT and Web 3.0, in: doi: 10.1109/MNET.2023.3319380 (Oct. 2023).
Proc. 2018 IEEE 23rd International Workshop on Computer Aided Mod- [80] A.-S. Bana, E. de Carvalho, B. Soret, T. Abrao, J. C. Marinello, E. G.
eling and Design of Communication Links and Networks (CAMAD), Larsson, P. Popovski, Massive MIMO for Internet of Things (IoT) con-
Nov. 2018, pp. 1–7. nectivity, Physical Communication 37 (Dec. 2019) 100859–100866.
[58] C. Choi, J. Choi, Ontology-based security context reasoning for power [81] P. Fang, T. Wolf, Implementing Virtual Network Functions in Named
IoT-cloud security service, IEEE Access 7 (Aug. 2019) 110510–110517. Data Networking and Web 3.0, in: Proc. 2023 International Confer-
[59] B. A. Mozzaquatro, C. Agostinho, D. Goncalves, J. Martins, R. Jardim- ence on Computing, Networking and Communications (ICNC), 2023,
Goncalves, An ontology-based cybersecurity framework for the Internet pp. 117–123.
of Things, Sensors 18 (9) (Sep. 2018) 3053. [82] J. Wang, H. Du, Z. Tian, D. Niyato, J. Kang, X. Shen, Semantic-aware
[60] M. Gheisari, H. E. Najafabadi, J. A. Alzubi, J. Gao, G. Wang, A. A. Ab- sensing information transmission for metaverse: A contest theoretic ap-
basi, A. Castiglione, OBPP: An ontology-based framework for privacy- proach, IEEE Transactions on Wireless Communications 22 (8) (Jan.
preserving in IoT-based smart city, Future Generation Computer Sys- 2023) 5214–5228.
tems 123 (Oct. 2021) 1–13. [83] N. C. Luong, T. L. Van, S. Feng, H. Du, D. Niyato, D. I. Kim, Edge
[61] I. Szilagyi, P. Wira, Ontologies and semantic web for the internet of computing for metaverse: Incentive mechanism versus semantic com-
things-a survey, in: Proc. IECON 2016-42nd Annual Conference of the munication, IEEE Transactions on Mobile Computing (2023) 1–17.
IEEE Industrial Electronics Society, 2016, pp. 6949–6954. [84] Z. Liu, X. Xu, F. Han, Q. Zhao, L. Qi, W. Dou, X. Zhou, Secure Edge
[62] World Wide Web Consortium (W3C), Linked data, https://www.w3. Server Placement with Non-Cooperative Game for Internet of Vehicles
org/DesignIssues/LinkedData.html/. (2006). in Web 3.0, IEEE Transactions on Network Science and Engineering,
[63] V. Shevchuk, Unified architecture, https://opcfoundation.org/ Early Access (Oct. 2023) 1–12.
about/opc-technologies/opc-ua/. (2008). [85] X. Luo, H.-H. Chen, Q. Guo, Semantic communications: Overview,
32
open issues, and future research directions, IEEE Wireless Communi- enabled Web 3.0, IEEE Wireless Communications, Early Access, doi:
cations 29 (1) (Jan. 2022) 210–219. 10.1109/MWC.018.2200568 (Mar. 2023).
[86] H. Ning, H. Wang, Y. Lin, W. Wang, S. Dhelim, F. Farha, J. Ding, [107] T. Wang, S. Zhang, S. C. Liew, Linking Souls to Humans with ZKBID:
M. Daneshmand, A survey on the metaverse: The state-of-the-art, tech- Accountable Anonymous Blockchain Accounts for Web 3.0 Decentral-
nologies, applications, and challenges, IEEE Internet of Things Journal ized Identity, arXiv:2301.02102 (Jan. 2023).
10 (16) (Aug. 2023) 14671–14688. [108] A. Furfaro, L. Argento, D. Saccá, F. Angiulli, F. Fassetti, An infrastruc-
[87] H. Xie, Z. Qin, G. Y. Li, B.-H. Juang, Deep learning enabled seman- ture for service accountability based on digital identity and blockchain
tic communication systems, IEEE Transactions on Signal Processing 69 3.0, in: Proc. IEEE INFOCOM 2019-IEEE Conference on Computer
(Apr. 2021) 2663–2675. Communications Workshops (INFOCOM WKSHPS), 2019, pp. 632–
[88] W. H. Hassan, et al., Current research on Internet of Things (IoT) secu- 637.
rity: A survey, Computer Networks 148 (Jan. 2019) 283–294. [109] W. Zou, D. Lo, P. S. Kochhar, X.-B. D. Le, X. Xia, Y. Feng, Z. Chen,
[89] Y. Wang, Z. Su, N. Zhang, R. Xing, D. Liu, T. H. Luan, X. Shen, A B. Xu, Smart contract development: Challenges and opportunities, IEEE
survey on metaverse: Fundamentals, security, and privacy, IEEE Com- Transactions on Software Engineering 47 (10) (Sep. 2019) 2084–2106.
munications Surveys and Tutorials 25 (1) (Jan. 2023) 319–352. [110] C. Wu, J. Xiong, H. Xiong, Y. Zhao, W. Yi, A review on recent progress
[90] J. Al-Jaroodi, N. Mohamed, Blockchain in industries: A survey, IEEE of smart contract in blockchain, IEEE Access 10 (May, 2022) 50839–
Access 7 (Mar. 2019) 36500–36515. 50863.
[91] R. Yang, F. R. Yu, P. Si, Z. Yang, Y. Zhang, Integrated blockchain [111] X. Jia, W. Xu, P. Deng, S. Gao, L. Tang, Y. Wang, M. Zhang,
and edge computing systems: A survey, some research issues and chal- L. Bao, D. Lin, Cross-organisational data sharing framework based on
lenges, IEEE Communications Surveys & Tutorials 21 (2) (Jan. 2019) blockchain-probes, IET Networks 12 (2) (Jul. 2023) 77–85.
1508–1532. [112] R. Sheldon, B. Posey, 7 decentralized data storage networks com-
[92] M. I. Khalid, I. Ehsan, A. K. Al-Ani, J. Iqbal, S. Hussain, S. S. Ullah, pared, https://www.techtarget.com/searchstorage/tip/
et al., A comprehensive survey on blockchain-based decentralized stor- Comparing-4-decentralized-data-storage-offerings/.
age networks, IEEE Access 11 (Jan. 2023) 10995–11015. (2023).
[93] A. A. Monrat, O. Schelen, K. Andersson, A survey of blockchain from [113] F. Casino, E. Politou, E. Alepis, C. Patsakis, Immutability and decen-
the perspectives of applications, challenges, and opportunities, IEEE Ac- tralized storage: An analysis of emerging threats, IEEE Access 8 (Dec.
cess 7 (Aug. 2019) 117134–117151. 2019) 4737–4744.
[94] C. T. Nguyen, D. T. Hoang, D. N. Nguyen, Y. Xiao, H.-A. Pham, [114] M. Xu, X. Ren, D. Niyato, J. Kang, C. Qiu, Z. Xiong, X. Wang, V. C. Le-
E. Dutkiewicz, N. H. Tuong, Fedchain: Secure proof-of-stake-based ung, When quantum information technologies meet blockchain in Web
framework for federated-blockchain systems, IEEE Transactions on Ser- 3.0, IEEE Network, Early Access, doi: 10.1109/MNET.134.2200578
vices Computing 16 (4) (Jan. 2023) 2642–2656. (May, 2023) 1–8.
[95] S. Yan, Analysis on blockchain consensus mechanism based on proof [115] L. Cao, Decentralized AI: Edge intelligence and smart blockchain,
of work and proof of stake, in: Proc. 2022 International Conference Metaverse, Web3, and DeSci, IEEE Intelligent Systems 37 (3) (May-
on Data Analytics, Computing and Artificial Intelligence (ICDACAI), Jun. 2022) 6–19.
2022, pp. 464–467. [116] Y. Lin, Z. Gao, Y. Tu, H. Du, D. Niyato, J. Kang, H. Yang, A Blockchain-
[96] L. Chen, L. Xu, N. Shah, Z. Gao, Y. Lu, W. Shi, On security analysis of based Semantic Exchange Framework for Web 3.0 toward Participatory
proof-of-elapsed-time (poet), in: Proc. Stabilization, Safety, and Secu- Economy, IEEE Communications Magazine 61 (8) (Jun. 2023) 94–100.
rity of Distributed Systems: 19th International Symposium, SSS 2017, [117] D. M. Doe, J. Li, N. Dusit, Z. Gao, J. Li, Z. Han, Promoting the Sustain-
November 5–8, 2017, Proceedings 19, 2017, pp. 282–297. ability of Blockchain in Web 3.0 and the Metaverse Through Diversified
[97] D. Puthal, S. P. Mohanty, V. P. Yanambaka, E. Kougianos, PoAh: A Incentive Mechanism Design, IEEE Open Journal of the Computer So-
novel consensus algorithm for fast scalable private blockchain for large- ciety 4 (Mar. 2023) 171–184.
scale IoT frameworks, arXiv:2001.07297 (Jan. 2020). [118] O. Avellaneda, A. Bachmann, A. Barbir, J. Brenan, P. Dingle, K. H.
[98] X. Liu, G. Zhao, X. Wang, Y. Lin, Z. Zhou, H. Tang, B. Chen, Mdp- Duffy, E. Maler, D. Reed, M. Sporny, Decentralized identity: Where did
based quantitative analysis framework for proof of authority, in: Proc. it come from and where is it going?, IEEE Communications Standards
2019 International Conference on Cyber-Enabled Distributed Comput- Magazine 3 (4) (Dec. 2019) 10–13.
ing and Knowledge Discovery (CyberC), Jan. 2019, pp. 227–236. [119] Q. Wang, R. Li, Q. Wang, S. Chen, M. Ryan, T. Hardjono, Exploring
[99] Z. Liu, S. Tang, S. S. Chow, Z. Liu, Y. Long, Fork-free hybrid consensus Web3 from the view of blockchain, arXiv:2206.08821 (Jun. 2022).
with flexible proof-of-activity, Future Generation Computer Systems 96 [120] P. Hitzler, M. Krotzsch, S. Rudolph, Foundations of Semantic web tech-
(Jul. 2019) 515–524. nologies, Boca Raton, London, New York, CRC press, 2009.
[100] T. M. Hewa, Y. Hu, M. Liyanage, S. S. Kanhare, M. Ylianttila, Survey on [121] T. Berners-Lee, J. Hendler, O. Lassila, The Semantic web, Scientific
blockchain-based smart contracts: Technical aspects and future research, American 284 (5) (May 2001) 34–43.
IEEE Access 9 (Mar. 2021) 87643–87662. [122] S. Bratt, Semantic Web, and Other W3C Technologies to Watch,
[101] Z. Liu, Y. Xiang, J. Shi, P. Gao, H. Wang, X. Xiao, B. Wen, Q. Li, Y.-C. https://www.w3.org/2007/Talks/0130-sb-W3CTechSemWeb/
Hu, Make Web3.0 Connected, IEEE Transactions on Dependable and 0130-sb-W3CTechSemWeb.pdf/. (2023).
Secure Computing 19 (5) (May, 2022) 2965–2981. [123] Semantic web, https://www.w3.org/standards/semanticweb/.
[102] W. Wang, D. T. Hoang, P. Hu, Z. Xiong, D. Niyato, P. Wang, Y. Wen, (2023).
D. I. Kim, A survey on consensus mechanisms and mining strategy man- [124] RDF 1.1 concepts and abstract syntax, https://www.w3.org/TR/
agement in blockchain networks, IEEE Access 7 (Jan. 2019) 22328– rdf11-concepts/. (2023).
22370. [125] RDF Schema 1.1, https://www.w3.org/TR/rdf-schema/. (2023).
[103] A. Singh, K. Click, R. M. Parizi, Q. Zhang, A. Dehghantanha, K.-K. R. [126] T. R. Gruber, A translation approach to portable ontology specifications,
Choo, Sidechain technologies in blockchain networks: An examination Knowledge Acquisition 5 (2) (Sep. 1993) 199–220.
and state-of-the-art review, Journal of Network and Computer Applica- [127] J. Lehmann, et al., DBpedia–a large-scale, multilingual knowledge base
tions 149 (Jan. 2020) 102471–102487. extracted from wikipedia, Semantic Web 6 (2) (2015) 167–195.
[104] W. Chen, Y. Chen, X. Chen, Z. Zheng, Toward secure data sharing for [128] E. Sandhaus, Semantic technology at the new york times: Lessons
the iov: A quality-driven incentive mechanism with on-chain and off- learned and future directions, in: Proc. Semantic Web–ISWC 2010: 9th
chain guarantees, IEEE Internet of Things Journal 7 (3) (Oct. 2019) International Semantic Web Conference, ISWC 2010, November 7-11,
1625–1640. 2010, Revised Selected Papers, Part II 9, Springer, 2010, pp. 355–355.
[105] T. Zhou, X. Li, H. Zhao, Dlattice: A permission-less blockchain based [129] J. Weaver, P. Tarjan, Facebook linked data via the graph API, Semantic
on dpos-ba-dag consensus for data tokenization, IEEE Access 7 (Mar. Web 4 (3) (2013) 245–250.
2019) 39273–39287. [130] N. Noy, Y. Gao, A. Jain, A. Narayanan, A. Patterson, J. Taylor, Industry-
[106] Y. Lin, Z. Gao, H. Du, D. Niyato, J. Kang, R. Deng, X. S. Shen, A scale knowledge graphs: Lessons and challenges, Queue 17 (2) (Jul.
unified blockchain-semantic framework for wireless edge intelligence 2019) 48–75.
33
[131] P. Hitzler, A review of the semantic web field, Communications of the bile web 3d based on animation data separation and on-demand loading,
ACM 64 (2) (Feb. 2021) 76–83. IEEE Access 8 (May, 2020) 88474–88486.
[132] C. Wang, H. Ma, G. Chen, S. Hartmann, Using an estimation of dis- [154] H. Fan, G. Kong, C. Zhang, An Interactive platform for low-cost 3D
tribution algorithm to achieve multitasking semantic web service com- building modeling from VGI data using convolutional neural network,
position, IEEE Transactions on Evolutionary Computation 27 (3) (Apr. Big Earth Data 5 (1) (Apr. 2021) 49–65.
2022) 490–504. [155] H. Wu, H. Zhang, J. Cheng, J. Guo, W. Chen, Perspectives on point
[133] G. Kang, J. Liu, Y. Xiao, Y. Cao, B. Cao, M. Shi, Web services cluster- cloud-based 3D scene modeling and XR presentation within the cloud-
ing via exploring unified content and structural semantic representation, edge-client architecture, Visual Informatics 7 (3) (Sep. 2023) 59–64.
IEEE Transactions on Network and Service Management 19 (4) (Aug. [156] R. Tabarés, Html5 and the evolution of html; tracing the origins of digital
2022) 4082–4096. platforms, Technology in Society 65 (Feb, 2021) 1–8.
[134] G. Zou, Z. Qin, Q. He, P. Wang, B. Zhang, Y. Gan, DeepWSC: Clus- [157] Z. Lei, H. Zhou, W. Hu, G.-P. Liu, Q. Deng, D. Zhou, Z.-W. Liu, X. Gao,
tering web services via integrating service composability into deep se- Unified 3-d interactive human-centered system for online experimenta-
mantic features, IEEE Transactions on Services Computing 15 (4) (Sep. tion: Current deployment and future perspectives, IEEE Transactions on
2020) 1940–1953. Industrial Informatics 17 (7) (Aug. 2020) 4777–4787.
[135] W. Pang, H. Li, X. Ma, H. Zhang, A semantic-centered cloud control [158] K. Hanfati, S. Sukaridhoto, D. K. Basuki, R. P. N. Budiarti, E. D. Fa-
framework for autonomous unmanned system, Journal of Systems En- jrianti, I. A. Al Hafidz, Design and Implementation of WebXR Health
gineering and Electronics 33 (4) (Aug. 2022) 771–784. Learning Module Application, in: Proc. 2022 International Electronics
[136] X. Li, D. Yang, J. Yuan, A. Donkers, X. Liu, Bim-enabled semantic Symposium (IES), 2022, pp. 632–637.
web for automated safety checks in subway construction, Automation in [159] B. D. S. Gonccalves, O. Postolache, J. M. D. Pereira, Gait rehabilita-
Construction 141 (Sep. 2022) 104454. tion in virtual reality serious game interactive scenarios, in: Proc. 2022
[137] S. N. D. Ververidis, E. Anastasovitis, Architecture and interface design, International Conference and Exposition on Electrical And Power Engi-
https://www.researchgate.net/publication/322655519_ neering (EPE), 2022, pp. 672–676.
D61_-_DigiArt_-_Architecture_and_Interface_Design/. [160] B. Maclntyre, T. F. Smith, Thoughts on the Future of WebXR and the Im-
(2016). mersive Web, in: Proc. 2018 IEEE International Symposium on Mixed
[138] D. Patterson, Interactive 3D web applications for visualization of world and Augmented Reality Adjunct (ISMAR-Adjunct), 2018, pp. 338–342.
health organization data, in: Proc. of the Australasian Computer Science [161] X. Guo, I. Mogra, Using web 3D and WebXR game to enhance en-
Week Multiconference, 2016, pp. 1–8. gagement in primary school learning, in: Proc. 2022 IEEE International
[139] R. Baruah, AR and VR using the WebXR API: learn to create immer- Symposium on Multimedia (ISM), 2022, pp. 181–184.
sive content with WebGL, Three. js, and A-Frame, Singapore, Springer, [162] P. Winter, A. H. Lorimer, P. Snyder, B. Livshits, What’s in your wallet?
2021. privacy and security issues in Web 3.0, arXiv:2109.06836 (Feb. 2021).
[140] V. Munday, Introduction to web 3d technolo- [163] The Interconnection Between Blockchain, AI, and Personal
gies, https://medium.com/varvara.munday/ Data Privacy, https://medium.com/@metasecond.ai/
introduction-to-web-3d-technologies-a26b1dc68454/. metasecond-ai-use-case-story-ai-in-personal-data-privacy/
(2019). . (2023).
[141] D. Fan, T. Liang, H. He, M. Guo, M. Wang, Large-scale oceanic dy- [164] M. Ragnedda, G. Destefanis, Blockchain and Web 3.0, London: Rout-
namic field visualization based on webgl, IEEE Access 11 (Aug. 2021) ledge, Taylor and Francis Group, 2019.
82816–82829. [165] M. Grieco, Webassembly tutorial, https://www.youtube.com/
[142] L. Stemkoski, M. Pascale, Developing Graphics Frameworks with watch?v=_8T9T6MQ1fU/. (2022).
Python and OpenGL, Netherlands, Taylor & Francis, 2021. [166] Mozilla Developer Network, Webassembly, https://developer.
[143] Z. Mateusz, M. Cezary, Web 3d programming: Past, present and mozilla.org/en-US/docs/WebAssembly/. (2023).
future, https://emphie.com/insights/web-3d-programming5/ [167] T. Hollebeek, Quantum computing is coming out of the shad-
. (2023). ows. Web3 should be scared, https://forkast.news/
[144] S. Discher, R. Richter, J. Döllner, Concepts and techniques for web- web3-quantum-computing-fears/. (2023).
based visualization and processing of massive 3d point clouds with se- [168] X. Sun, F. R. Yu, P. Zhang, Z. Sun, W. Xie, X. Peng, A survey on Zero-
mantics, Graphical Models 104 (Jul. 2019) 101036–101048. Knowledge-Proof in blockchain, IEEE Network 35 (4) (Aug. 2021)
[145] Opc, The 4 technologies that will make web 3.0 a reality, https:// 198–205.
www.makeuseof.com/technologies-web-3-0/. (2021). [169] M. Shen, Z. Tan, D. Niyato, Y. Liu, J. Kang, Z. Xiong, L. Zhu, W. Wang,
[146] P. Plex, Everything you need to know about web 3.0 and its impact on et al., Artificial intelligence for web 3.0: A comprehensive survey,
your business, https://pixelplex.io/blog/what-is-web-3-0/ arXiv:2309.09972 (Aug. 2023).
. (2023).
[147] C. et al., The Spatial Web and Web 3.0, https://www2.deloitte.
com/us/en/insights/topics/digital-transformation/
web-3-0-technologies-in-business.html/. (2020).
[148] S. Van Nguyen, S. T. Le, M. K. Tran, H. M. Tran, Reconstruction of 3D
digital heritage objects for VR and AR applications, Journal of Informa-
tion and Telecommunication 6 (3) (Dec. 2022) 254–269.
[149] J. Flotynski, D. Brutzman, F. G. Hamza-Lup, A. Malamos, N. Polys,
L. F. Sikos, K. Walczak, The semantic web3d: towards comprehensive
representation of 3D content on the semantic web, in: Proc. 2019 Inter-
national Conference on 3D Immersion (IC3D), 2019, pp. 1–9.
[150] F. Qin, S. Gao, X. Yang, M. Li, J. Bai, An ontology-based semantic
retrieval approach for heterogeneous 3d cad models, Advanced Engi-
neering Informatics 30 (4) (Oct. 2016) 751–768.
[151] S. E. Kim, M. W. Lee, C. H. Jung, C. S. Park, J. M. Kim, S. P. Lee,
Representation of vr-based health information for smart city, in: Proc.
25th International Conference on 3D Web Technology, 2020, pp. 1–7.
[152] Z. Ma, Y. Ding, P. Yue, L. Zhang, Y. Liang, Y. Deng, Research and ap-
plication of 3D visualization technology of borehole data based on We-
bGL, in: Proc. 2021 IEEE Conference on Telecommunications, Optics
and Computer Science (TOCS), Dec. 2021, pp. 978–983.
[153] L. Li, X. Qiao, Q. Lu, P. Ren, R. Lin, Rendering optimization for mo-
34
Author Biography
Md Arif Hassan received his B.Sc. in Network Technology and Cyber Security
from Lincoln University College, Malaysia, in 2018; and his master’s degree in
cyber security from the National University of Malaysia in 2021. He is currently
pursuing a Ph.D. degree at the School of Electrical and Data Engineering at the
University of Technology Sydney (UTS), Australia. His research interests include
cyber security, Fintech security, blockchain technology, and Web 3.0.
Mohammad (Behdad) Jamshidi (M'12, SM'23) is a distinguished scientist
recognized by Stanford University for his contributions to AI and communication
technologies 3 times (2022-2024). He is the Chair of the IEEE-SB at the
University of Technology Sydney, Australia. He has been recognized as a Highly
Skilled Tech Developer by 25 EU countries through the Blue Card Program since
2022. He made significant research contributions to aerospace components of
NASA's PCoE across international institutions (2017-2021). Behdad has
authored 60+ papers, including several Highly Cited papers in prestigious
journals and IEEE conferences. Additionally, he has authored two book chapters
and holds five IR patents.
Dinh Thai Hoang (M’16, SM’22) is currently a faculty member at the School of
Electrical and Data Engineering, University of Technology Sydney, Australia. He
received his Ph.D. in Computer Science and Engineering from the Nanyang
Technological University, Singapore 2016. His research interests include
emerging wireless communications and networking topics, especially machine
learning applications in networking, edge computing, and cybersecurity. He has
received several precious awards, including the Australian Research Council
Discovery Early Career Researcher Award, IEEE TCSC Award for Excellence in
Scalable Computing for Contributions on “Intelligent Mobile Edge Computing
Systems” (Early Career Researcher), IEEE Asia-Pacific Board (APB)
Outstanding Paper Award 2022, and IEEE Communications Society Best Survey
Paper Award 2023. He is currently an Editor of IEEE TMC, IEEE TWC, and
IEEE TNSE.
Nguyen Quang Hieu received the B.E. degree in Hanoi University of Science
Technology, Vietnam in 2018. He is currently a Ph.D. student at School of
Electrical and Data Engineering, University of Technology (UTS), Sydney,
Australia. Before joining UTS, he was a research assistant at School of Computer
Science and Engineering, Nanyang Technological University, Singapore. His
research interest includes wireless communications and machine learning.
Bui Duc Manh received a Bachelor's in Electronic and Communication
Engineering from VNU-University of Engineering Technology in 2023. He is
currently a M.Sc research student at the School of Electrical and Data
Engineering, University of Technology Sydney (UTS), Sydney, Australia.
Despite e being a very young researcher, Mr Manh received two research awards
for prospective research students at Vietnam National University (1st ranking in
Vietnam) for his significant work in the field of cybersecurity in 2023. His
research interests include cybersecurity and privacy-preserving machine learning.
Chi-Hieu Nguyen received his B.E. degree in Information Systems and his M.S.
degree in Computer Science from the Hanoi University of Science and
Technology, Vietnam, in 2020 and 2022, respectively. He is currently pursuing a
Ph.D. degree at the School of Electrical and Data Engineering at the University
of Technology Sydney (UTS), Australia. His research interests include privacy-
preserving deep learning, deep reinforcement learning, mobile edge computing,
and IoT networks.
Nam H. Chu received the Ph.D. degree in Electrical and Computer Engineering
from the University of Technology Sydney, Australia. He is currently with the
School of Electrical and Data Engineering, UTS. He is also a Faculty Member of
the Department of Telecommunications Engineering, University of Transport and
Communications, Hanoi, Vietnam. His research interests include applying
advanced machine learning and optimization methods for wireless
communications. He was the co-recipient of the Computer Networks 2021 Best
Paper Award.
Nguyen Van Huynh (Member, IEEE) received the Ph.D. Degree in Electrical
and Computer Engineering from the University of Technology Sydney (UTS),
Australia in 2022. He is currently a Lecturer at the Department of Electrical
Engineering and Electronics, University of Liverpool, Liverpool, L69 3GJ,
United Kingdom. Before joining UoL, he was a Postdoctoral Research Associate
in the Department of Electrical and Electronic Engineering, Imperial College
London, United Kingdom. His research interests include mobile computing,
5G/6G, IoT, and machine learning. He is currently an Associate Editor of IEEE
Transactions on Vehicular Technology.
Declaration of interests
☒The authors declare that they have no known competing financial interests or personal relationships
that could have appeared to influence the work reported in this paper.
☐The authors declare the following financial interests/personal relationships which may be considered
as potential competing interests: