0% found this document useful (0 votes)
18 views50 pages

Comnet S 24 04092

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views50 pages

Comnet S 24 04092

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 50

Computer Networks

Enabling Technologies for Web 3.0: A Comprehensive Survey


--Manuscript Draft--

Manuscript Number:

Article Type: Survey Paper

Keywords: Web 3.0; Internet of Things; 5G; Blockchain; Semantic Web; Artificial Intelligence;
Decentralized
Networks

Corresponding Author: Cong Nguyen


Duy Tan University
VIET NAM

First Author: Arif Hassan

Order of Authors: Arif Hassan

Mohammad Jamshidi

Manh Bui

Nam Chu

Chi-Hieu Nguyen

Hieu Quang Nguyen

Cong Nguyen

Hoang Thai Dinh

Diep Nguyen

Huynh Van Nguyen

Mohammad Abu Alsheikh

Eryk Dutkiewicz

Abstract: Web 3.0 represents the next stage of Internet evolution, aiming to empower users with
increased autonomy, efficiency, quality, security, and privacy. This evolution can
potentially democratize content access by utilizing the latest developments in enabling
technologies. In this paper, we conduct an in-depth survey of enabling technologies in
the context of Web 3.0, such as blockchain, semantic web, 3D interactive web,
Metaverse, Virtual Reality/Augmented Reality, Internet of Things (IoT) technology, and
their roles in shaping Web 3.0. We commence by providing a comprehensive
background of Web 3.0, including its concept, basic architecture, potential applications,
and industry adoption. Subsequently, we examine recent breakthroughs in IoT, 5G,
and blockchain technologies that are pivotal to Web 3.0 development. Following that,
other enabling technologies, including AI, semantic web, and 3D interactive web, are
discussed. Utilizing these technologies can effectively address the critical challenges in
realizing Web 3.0, such as ensuring decentralized identity, platform interoperability,
data transparency, reducing latency, and enhancing the system's scalability. Finally,
we highlight significant challenges associated with Web 3.0 implementation,
emphasizing potential solutions and providing insights into future research directions in
this field.

Suggested Reviewers: Hoc Vu


[email protected]

Duy Tran
[email protected]

Powered by Editorial Manager® and ProduXion Manager® from Aries Systems Corporation
Manuscript File (Word or PDF file only) Click here to view linked References

Enabling Technologies for Web 3.0: A Comprehensive Survey

Md Arif Hassana , Mohammad (Behdad) Jamshidia , Bui Duc Manha , Nam H. Chua , Chi-Hieu Nguyena , Nguyen Quang Hieua ,
Cong T. Nguyenb,c , Dinh Thai Hoanga , Diep N. Nguyena , Nguyen Van Huynhd , Mohammad Abu Alsheikhe , Eryk Dutkiewicza
a School of Electrical and Data Engineering, University of Technology Sydney, , Sydney, 2007, NSW, Australia
b Instituteof Fundamental and Applied Sciences, Duy Tan University, , Da Nang, 70000, , Vietnam
c Faculty of Information Technology, Duy Tan University, , Da Nang, 55000, , Vietnam
d Department of Electrical Engineering and Electronics, University of Liverpool, , Liverpool, L69 3BX, , United Kingdom
e Faculty of Science and Technology, University of Canberra, , Canberra, 2601, ACT, Australia

Abstract
Web 3.0 represents the next stage of Internet evolution, aiming to empower users with increased autonomy, efficiency, quality,
security, and privacy. This evolution can potentially democratize content access by utilizing the latest developments in enabling
technologies. In this paper, we conduct an in-depth survey of enabling technologies in the context of Web 3.0, such as blockchain,
semantic web, 3D interactive web, Metaverse, Virtual Reality/Augmented Reality, Internet of Things (IoT) technology, and their
roles in shaping Web 3.0. We commence by providing a comprehensive background of Web 3.0, including its concept, basic archi-
tecture, potential applications, and industry adoption. Subsequently, we examine recent breakthroughs in IoT, 5G, and blockchain
technologies that are pivotal to Web 3.0 development. Following that, other enabling technologies, including AI, semantic web, and
3D interactive web, are discussed. Utilizing these technologies can effectively address the critical challenges in realizing Web 3.0,
such as ensuring decentralized identity, platform interoperability, data transparency, reducing latency, and enhancing the system’s
scalability. Finally, we highlight significant challenges associated with Web 3.0 implementation, emphasizing potential solutions
and providing insights into future research directions in this field.
Keywords: Web 3.0, Internet of Things, 5G, Blockchain, Semantic Web, Metaverse, Artificial Intelligence, Decentralized
Networks, Security, Privacy

1. Introduction privacy breaches, disinformation spreading, and the concentra-


tion of power in the hands of big companies, which demand
The World Wide Web (WWW) has undergone significant serious consideration and solutions [4, 5]. Failure to address
transformations since its launch in 1989[1]. Initially, the first these issues can cause serious consequences on users as well as
generation of WWW (Web 1.0) aimed to provide users with ac- society in general.
cess to static data, e.g., pictures and text on non-interactive web Web 3.0 has been recently introduced as a breakthrough tech-
pages. Then, the advent of Web 2.0 in the early 2000s intro- nology to overcome the limitations of Web 2.0, creating a more
duced innovative components such as interactive tools and dy- intelligent, decentralized, and user-centric web. One significant
namic content to websites. This helped to transform the WWW benefit of Web 3.0 is the enhanced security and privacy it of-
from a read-only, static presentation of information to an inter- fers users. Unlike Web 2.0, where user data is often centralized
active and continuously evolving platform. This transformation on servers controlled by large corporations, Web 3.0 operates
enables users to not only read but also create and share content on decentralized networks, ensuring data integrity and reduc-
via blogs, social media, and online collaborative platforms [2]. ing the risk of data breaches. This also gives users authority
As a result, Web 2.0 brings significant benefits, ranging from over their generated content and data, thereby mitigating issues
higher interactivity and online collaborations to new business related to content manipulation and the censorship of informa-
opportunities and the availability of online education. tion [6, 7]. Moreover, Web 3.0 is expected to provide a more
Despite those significant advantages, Web 2.0 is also fac- intelligent and personalized experience for users through decen-
ing many technical challenges. First, Web 2.0 still relies on tralized applications [8]. Despite its significant potential, the
centralized platforms with significant control over users’ con- development of Web 3.0 is still in a nascent stage, facing seri-
tent, which can be manipulated or monetized without user con- ous challenges in its adoption. One key challenge stems from
sent. Moreover, trust and privacy are primary concerns as users the decentralized management of data. Particularly, decentral-
must rely on intermediaries, thereby exposing themselves to cy- ized networks often struggle with scalability issues, leading to
ber security risks. Web 2.0 also struggles with limited intelli- slower processing time and higher costs. Improving scalabil-
gence and connectivity through keyword-based search and al- ity while maintaining decentralization is a complex problem
gorithms, often delivering irrelevant or biased results [3]. In that requires innovative solutions. Moreover, privacy and se-
practice, Web 2.0 is currently facing serious issues with data curity are serious concerns due to the decentralized architec-
Preprint submitted to Computer Networks October 8, 2024
I. Introduction ogy enables the automatic and smart processing of data on a
Motivations and Related Works semantic level, thereby enhancing the efficiency of information
Our Survey Organization processing. Semantic technology and 3D web interactive tech-
II. The Fundamental of Web 3.0 nology can also be combined to enhance users’ experiences by
Background of Web 3.0
improving Web 3.0 personalized services and immersive visu-
The Architecture of Web 3.0 alization.
Potential Applications and Services of Web 3.0 This paper aims to provide an in-depth and comprehensive
Current Standards and Industry Development
survey on enabling technologies for Web 3.0. Particularly, we
III. IoT Technologies for Web 3.0 first provide a fundamental background on Web 3.0, including
Background
key concepts, basic architecture, potential applications, as well
Established Framework and Standarlization
as current standards and industry development. Then, a com-
The Roles of IoT Technologies for Future Development of Web 3.0
prehensive survey on the enabling technologies of Web 3.0 is
Recent Research for Integrating IoT Technologies in Web 3.0 presented, including IoT, 5G, blockchain, semantic web, and
3D interactive web. For each technology, we first provide a
IV. 5G Technologies for Web 3.0
quick overview of the fundamental concepts, discuss the role of
Background of 5G Technologies the technologies in Web 3.0, and survey the recent research and
Roles of 5G Technologies in Web 3.0 development of the technologies for Web 3.0. Then, we dis-
Recent Research on 5G Technologies for Web 3.0 cuss the open issues that Web 3.0 is currently facing along with
V. Blockchain Technology for Web 3.0 their potential solutions. Finally, promising future research di-
rections are presented.
Blockchain Fundamental
Roles of Blockchain in Web 3.0 There are a few surveys related to Web 3.0 with different fo-
Recent Research on the Development of Blockchain Technology cuses as shown in Table 1. Particularly, [11] and [12] investigate
for Web 3.0
the applications of Web 3.0 for e-learning, while [13] and [14]
VI. The Semantic Web Technologies discuss the digital currency and economy in Web 3.0. In [16],
Semantic Web Technology Stack the authors focus on security in the supply chain using a fuzzy
State-of-the-art in Semantic WebT Technologies neural network (FNN) and blockchain. [6] and [9] introduce
the role of blockchain technology in Web 3.0, and [15] focuses
VII. 3D Interactive Web Technology
mainly on applications of Web 3.0. However, to the best of our
Background of 3D Interactive Web Technology knowledge, there is no comprehensive survey that thoroughly
The Role of 3D Interactive Web Technology in Web 3.0 examines the enabling technologies for Web 3.0. Given the ex-
Recent Development on 3D Interactive Web Technology plosive growth of attention to the development of Web 3.0 and
the indisputable roles of cutting-edge technologies, such as IoT,
VIII. Open Issues and Emerging Technologies
5G, blockchain, semantic web, and 3D interactive web. This
Open Issues paper aims to fill the current gap in the literature by providing a
Emerging Technologies comprehensive overview of the Web 3.0 architecture and facil-
IX. Conclusion itating further research, innovation, open issues, and adoption
of emerging technologies for the development of Web 3.0.
Fig. 1: The organization of this paper. As shown in Fig. 1, the rest of this article is organized as fol-
lows. Section 2 covers the fundamentals of Web 3.0, including
ture and the expected huge number of connected users and de- concepts, architecture, applications, and current industry stan-
vices. The decentralized and massive connectivity of Web 3.0, dards and services. Then, the core enabling technologies, such
coupled with the potentially diverse decentralized applications, as blockchain, 5G, semantic web, 3D interactive web, and IoT,
also lead to high demands in communication and computing are discussed from Section 3 to Section 7. After that, open is-
resources [9, 10]. sues and emerging technologies for future development are dis-
To address those challenges, technologies including Internet cussed in Section 8. Finally, Section 9 concludes the paper. The
of Things (IoT), Artificial Intelligence (AI), 5G, blockchain, se- abbreviations used in this article are summarized in Table 2.
mantic web, and 3D interactive web offer promising solutions.
For example, the integration of AI and IoT can make Web 3.0
more intelligent and responsive to improve personalized expe- 2. The Fundamentals of Web 3.0
riences toward a highly efficient web ecosystem. Moreover,
blockchain technology can play a pivotal role in enabling de- 2.1. Background of Web 3.0
centralized information management and providing users with
greater control over their own data. In this way, we can not In recent years, we have envisioned the reborn interest of
only address issues related to data ownership and censorship Web 3.0, which was previously named “Semantic Web” or “De-
but also pave the way for a number of new services for users centralize Web”. Although the concepts of semantic web and
and providers, such as decentralized finance (DeFi) and Non- decentralized web date back to the early 2000s, technological
Fungible Tokens (NFTs). Alternatively, semantic web technol- advancements at that time made it difficult to fully realize Web
2
Table 1
Comparison of this work with existing surveys

Ref. Application Domain Differences


[6] Network Infrastructure Focus on consensus algorithms and potential decentralized Internet.
[9] Quantum Information Technologies Focus on quantum blockchain for Web 3.0 infrastructure.
[11] E-learning Emphasizes programming language learning environments built on Web 3.0.
[12] Distance Learning Examines the e-learning scenario through Semantic Web technology.
[13] Digital Currency Concentrates on the digital economy, particularly digital currencies.
[14] Digital Economy Discusses Web 3.0 in relation to the digital economy, addressing various challenges and develop-
ments in finance.
[15] Multiple Domains Investigates decentralized finance, autonomous systems, tokenization, supply chain management,
and zero-trust architecture for Web 3.0.
[16] Supply Chain Focuses on security in the supply chain using a fuzzy neural network (FNN) and blockchain.
Our Survey Enabling Technologies of Web 3.0 We provide an overview of the Web 3.0 concept, architecture, applications, and industry use cases.
This survey examines key technologies, including IoT, 5G, blockchain, the semantic web, and the
3D web. Furthermore, we discuss the main challenges facing Web 3.0, propose potential solutions,
and highlight future research directions.

Table 2
List of Abbreviations
ence, overcoming the information overload issue [14]. With
recent advances in natural language processing, e.g., via large
Abbreviation Description language models, AI-empowered agents, e.g., AI-based Decen-
AR Augmented Reality tralized autonomous organizations (DAOs), and AI-based VR
BTC Bitcoin interactive interfaces, are increasingly becoming a vital part of
DAO Decentralized Autonomous Organization
DApps Decentralized Application
the future Web 3.0. Additionally, the decentralization aspect
ETH Ethereum of Web 3.0 aims to reduce reliance on centralization, enhance
FL File Inclusion security, and provide users with more control over their own
Intel SGX Intel Software Guard Extensions data. For instance, blockchain technology can be implemented
IoT Internet of Things to ensure secure and transparent storage and sharing of personal
IPFS Interplanetary File System
JSON JavaScript Object Notation data, giving users more ownership of their data [9] [19]. It al-
ML Machine Learning lows the users to control their information, countering central-
MIMO Multiple-Input Multiple-Output ized companies that currently dominate the majority of the web
NFT Non-fungible Tokens we use and interact with [20].
OWL Web Ontology Language
PoS Proof of Stake
Web 3.0 provides many benefits and advancements over its
PoW Proof-of-Work predecessor, (i.e., Web 2.0, as shown in Fig. 2). The key im-
QIT Quantum Information Technology provements of Web 3.0 are described as follows:
RDF Resource Description Framework
SMW Social Media Web • Semantic understanding and contextualization: Web 3.0
SWT Semantic Web Technologies
Turtle Terse RDF Triple Language
introduces semantic technologies that enable computers to
3D Three Dimensional understand the context and meaning of data. Unlike Web
URI Universal Resource Identifier 2.0 where semantic understanding is limited to the key-
VR Virtual Reality words and metadata associated with a type of content, se-
WWW World Wide Web mantic knowledge in Web 3.0 is more sophisticated. The
WebGL Web Graphics Library
W3C World Wide Web Consortium
deeper understanding of data is achieved through AI and
Machine learning (ML) algorithms, e.g., through large
language models. This allows the web engine to make
better outcomes and search results. The recent break-
3.0. Fortunately, the recently ever-increasing technological in-
throughs of large language models like OpenAI’s Chat-
novations bring back the interest of Web 3.0. The core tech-
GPT and Google’s Bard are the emerging applications of
nologies that will be expected as building blocks of Web 3.0 in-
such semantic understanding based on the web’s language,
clude blockchain for decentralization, IoT and 5G for commu-
in which the search engine can understand the user’s intent
nications, semantic extraction of web content, and extended re-
and return more relevant results.
ality for immersive human-computer experiences, as illustrated
in Fig. 2. The convergence of decentralization, semantic extrac- • Decentralization and data ownership: Unlike the central-
tion, and extended reality toward Web 3.0 is closer to reality ization of Web 2.0 platforms, Web 3.0 emphasizes decen-
than ever, thanks to the development of emerging technologies, tralization using blockchain technology such as Ethereum.
such as AI, blockchain, Virtual reality (VR)/Augmented reality This reduces the control of large corporations and gives
(AR), 5G, IoT, and edge computing [6, 17, 18, 7]. users more ownership and control over their data. For ex-
AI-driven algorithms can provide users with personalized ample, NFTs can be utilized as unique digital assets to rep-
and relevant information based on their behavior and prefer- resent ownership of digital goods, e.g., digital arts, tickets,
3
Web 1.0 Web 2.0 Web 3.0

Static read-only web pages Information-centric and intractive User-centric, decentralized, private,
and secure

ADS

ADS

Read-only Read and write Read, write, and own


Basic Web pages Global Internet access Semantic web
HTML Web apps, blogs, social media Metaverse (AR & VR)
E-commerce Data monetization Blockchains
Java and Javascript High-speed communication Artificial intelligence
Dedicated infrastructure User-generated content Interoperability
Banner ads Cloud computing Edge computing
Centralized data IoT

EOS

Ethlance Akasha

1989 - 1999 2006 - 2012 2012 - Present

Fig. 2: The evolution of the web


.
and memberships. nisms with blockchain networks can engage the data own-
ers to share and join the system, thus enhancing the bene-
• AI-driven decision making: With semantic understand- fits of the entire decentralized community.
ing and AI integration, Web 3.0 supports innovative in-
teractive applications based on VR/XR in which the user • Privacy and security: Web 3.0’s decentralized concept
quality of experience can be optimized via learning al- significantly enhances user and data security, reducing
gorithms, e.g., deep reinforcement learning [8]. For ex- the vulnerabilities connected to centralized data reposito-
ample, an edge computing server running Web 3.0 ser- ries [15]. By leveraging technologies like blockchain, Web
vices adaptively controls the average bitrate, rebuffering 3.0 decentralizes control, mitigating single points of fail-
time, and inter-quality variation based on feedback from ure and reducing the risk of data breaches [22]. It provides
the users, resulting in higher resource utilization. Collabo- individuals control over their data using self-sovereign
rative training among edge servers, such as through feder- identities, which reduces identity theft and privacy con-
ated learning, can enhance secure and personalized infor- cerns. Secure cryptography technologies such as encryp-
mation exchange between users [21]. tion, hash functions, and zero-knowledge proofs (ZKPs)
enable them to interact with decentralized applications
• Interconnected devices and IoT: Web 3.0 extends beyond while preserving privacy. The openness of blockchain’s
traditional web browsers to include IoT devices where immutable ledger assists in fraud prevention, while smart
the IoT devices are increasingly becoming a part of the contracts provide trust and security by automating and ac-
Web 3.0 ecosystem. The IoT smart devices, such as curately fostering trust and security [23].
smartwatches, VR/XR controllers, and smart home access
points, provide data collection at a large scale in a decen- 2.2. The Architecture of Web 3.0
tralized manner. Furthermore, IoT devices can be used to The architecture of Web 3.0 represents an evolution in the
automate tasks in Web 3.0 such as executing smart con- design and functionality of the Internet in which the Internet
tracts or managing resource distribution. is founded on decentralization and powered by emerging tech-
nologies. In this work, we propose a comprehensive architec-
• Data interoperability: Semantic technologies of Web 3.0 ture for Web 3.0 with five layers as illustrated in Fig. 3.
can facilitate data interoperability, allowing heterogeneous
systems and platforms to communicate and share infor- 2.2.1. Physical Layer
mation. The interoperability can be achieved by various The physical layer is one of the important layers of Web 3.0
approaches, such as Thing Description, which will be de- architecture which is responsible for data collection and inter-
scribed in detail in Section 3. Further incentive mecha- action. A vast collection of smart devices and industrial motors
4
Application 3D interactive web
layer technologies
Abstraction for
decision making Chatbot Dashboard Extended reality Dapps

Semantic Semantic web


layer technologies
Machine Cloud-based Semantic
Analytics extraction
learning algorithms

Blockchain & smart contract Domain knowledge


source

Network Supply chain Blockchain


layer technologies

Incentive mechanisms

Communication 5G
MQTT
layer technologies
Gateways Storage & analytics

IoT
Physical
layer
technologies
Industrial Smart
motors devices

Fig. 3: The architecture of Web 3.0 with five main layers. The data is communicated from the physical layer to the application layer through intermediate layers,
i.e., the communication layer, network layer, and semantic layer. Each layer can be realized by corresponding technologies that are IoT, 5G, blockchain, semantic
web, and 3D interactive web technologies.

are utilized at this layer to collect a wide range of data from the security by integrating blockchain technology and smart con-
real environment. These devices allow the seamless integra- tracts. Moreover, security is maintained using consensus mech-
tion of real-world data into the digital sphere, hence improv- anisms, ensuring that all nodes in the network agree on the state
ing knowledge of different platforms and environments by effi- of the network eliminating the dependency on centralized au-
ciently collecting, processing, and transmitting data [7]. More thority [25] [26]. In addition, incentive mechanisms can be
details about IoT technologies used in Web 3.0 will be dis- deployed at this layer to compensate users for their contribu-
cussed in Section 3. tions, such as data storage or transaction validation [27]. This
layer aims to foster trust and transparency by reducing fraudu-
2.2.2. Communication Layer lent activities. Furthermore, it builds a strong network platform
The communication layer connects multiple nodes using var- resistant to censorship and single points of failure, resulting in
ious protocols that allow decentralized and peer-to-peer data a more open and trustworthy online environment. Blockchain
transmissions. It determines how data is packetized, addressed, technologies used in Web 3.0 will be discussed in more detail
transferred, routed, and retrieved [24]. It includes critical com- in Section 5.
ponents like network propagation and validation protocols, net-
work security, privacy, and trust mechanisms. It efficiently 2.2.4. Semantic Layer
shares data via propagation protocols and maintains data in-
The semantic layer is responsible for analyzing and process-
tegrity through validation protocols. Network security mea-
ing data. It is used to make predictions based on user activities
sures defend against illegal access and assaults, while privacy
that can be used to improve the user experience [10]. Several
controls provide users with the ownership of their personal in-
strategies and operations are available for the semantic layer.
formation. These components provide a solid infrastructure
The operations can be cloud-based algorithms, machine learn-
that allows secure, efficient, and trustworthy data transfer in a
ing, analytics, and semantic extraction. These approaches are
Web 3.0 environment. To reliably deploy Web 3.0 in existing
all used to gather information from various sources, such as
infrastructures like the 5G networks, several requirements of
IoT devices. For example, it can enhance users personalizing
the communication layer need to match the 5G standards, such
by providing recommendations based on user preferences, be-
as network slicing, edge computing, and massive Multiple-
havior, and interests. At this layer, semantic web technologies
Input Multiple-Output (MIMO). Further discussion about the
play the key role, and they will be discussed in more detail in
5G technologies for Web 3.0 will be presented in Section 4.
Section 6.
2.2.3. Network Layer
The network layer is one of the most important layers of 2.2.5. Application Layer
the Web 3.0 architecture which provides a decentralized, se- The application layer is the topmost layer of the Web 3.0 ar-
cure, and intelligent web. It improves data decentralization chitecture which creates a user interface for decentralized appli-
and trustless transactions while maintaining data integrity and cations (DApps) that run on top of blockchain networks. DApps
5
various industries. For instance, social media platforms of-
fer decentralized alternatives, prioritizing user autonomy and
Decentralized data privacy through DApps. Steemit (www.steemit.com), and
Finance Sapien (www.sapien.network) are a few notable examples of
Metaverse decentralized social media applications. Similarly, decentral-
Decentralized
Applications ized gaming platforms transform user interactions by securing
ownership of in-game assets via blockchain, ensuring trans-
Non-Fungible parent transactions. Examples of decentralized Web 3.0 gam-
Tokens
ing applications include Decentraland (www.decentraland.org)
Supply Chain and RaceFi (www.racefi.io). In healthcare, DApps introduce
Management
transformative changes by integrating advanced technologies
and decentralized networks, promoting seamless data sharing,
Decentralized Decentralized
Autonomous Identity securing patient control over health records, and improving
Organizations
interoperability among providers. AiGIA (www.aigia.health)
and DeHealth (www.dehealth.world) as some notable ex-
Fig. 4: Potential applications of Web 3.0. amples. Decentralized education platforms empower users
with personalized, secure ownership learning environments,
are more secure and efficient than traditional centralized appli-
ensuring privacy and ownership guarantees the authenticity
cations [28]. It is built on open protocols and standards, allow-
of certificates and credentials, reducing the risk of falsifi-
ing users to engage directly with services without the need for
cation. BitDegree (www.bitdegree.org) and TeachMePlease
a third-party [29]. The application layer in Web 3.0 provides
(www.teachmeplease.co.uk) are two examples of decentralized
users with improved control over their data and digital identi-
learning applications.
ties. Through user-centric design and decentralized architec-
Additionally, DeFi revolutionizes traditional financial sys-
ture, it enables personalized experiences, enhanced AI-driven
tems, offering various instruments like borrowing and lend-
services, and faster transactions, while simultaneously encour-
ing without third party. It employs blockchain technology to
aging better privacy and security. At this layer, interactive 3D
establish an open and permissionless financial services envi-
technologies play a key role in enhancing users’ experiences
ronment based on smart contracts, allowing for direct peer-
and engagement in Web 3.0, and this will be discussed in more
to-peer transactions. Uniswap (www.uniswap.org), and Aave
detail in Section 7.
(www.aave.com), are among many examples of applications of
The architecture of Web 3.0 marks significant changes from
DeFi. Decentralized Autonomous Organizations (DAOs) intro-
conventional client-server paradigms. Its emphasis on decen-
duce a novel approach to organization and governance, operat-
tralization, semantic data comprehension, open standards, user
ing without centralized authorities, and fostering efficiency and
empowerment, and smart contract integration establishes the
global collaboration. Unlike centralized systems, it allows users
foundations for a more inclusive, interconnected, secured In-
to make collective choices and regulate the organization’s oper-
ternet environment [30]. As Web 3.0 continues to develop, it
ations without the need for third-party which promotes open-
has the potential to transform industries and open up new op-
ness, eliminates complexity, and increases inclusion. It im-
portunities and applications for innovations and engagement.
proves efficiency, reduces corruption, and fosters global col-
The next section explores the diverse applications of Web 3.0.
laboration, improving governance standards [31]. Some of
DAO’s applications are MolochDAO (www.molochdao.com),
2.3. Potential Applications and Services of Web 3.0 USDT (www.kucoin.com/trade/DAO-USDT), and MakerDAO
(www.makerdao.com/en).
Although Web 3.0 is still in its initial stages, its technological
Furthermore, decentralized supply chains offer transpar-
foundation is rich. By leveraging cutting-edge technologies,
ent and traceable monitoring of items from source to con-
Web 3.0 can offer numerous novel applications and services to
sumer. It decreases fraud, ensures product authenticity, and
build a more decentralized, secure, and user-centric Internet.
improves overall efficiency granting greater control over their
This subsection discusses potential applications and services of
supply chain. Notable decentralized supply chain applica-
Web 3.0 as shown in Fig. 4.
tions include VeChain (www.vechain.org), and Provenance
(www.provenance.io). Similarly, decentralized identity man-
2.3.1. Decentralized Applications (DApps) agement, including self-sovereign identity, empowers users
Decentralized Applications (DApps) leverage decentraliza- with ownership and control over personal information without
tion to revolutionize user engagement with online resources, de- intermediaries. It makes user data more secure and reduces
parting from traditional apps reliant on centralized servers [28]. the chance of being stolen, enhancing security, and identity
DApps operate on blockchain networks, distributing data and verification. It also removes the necessity for multiple user-
functionalities across a network of nodes, thereby mitigat- names and passwords, enhancing the online experience and
ing single points of failure, enhancing security, and granting stopping identity theft [32]. Dock DID (www.dock.io) and
users greater data control [2]. As a result, DApps provide Onyx (www.jpmorgan.com/onyx/index) are two examples of
an innovative level of openness, autonomy, and trust across decentralized identity management systems.
6
2.3.2. Non-Fungible Tokens 2.3.5. Somnium Space
Non-fungible tokens (NFTs) have emerged as a ground- Somnium Space (https://somniumspace.com/) is a virtual re-
breaking concept, reshaping the landscape of digital owner- ality platform where users can create, own, and exchange vir-
ship and creativity. They mark a significant change from es- tual land and assets. It allows users to build structures, host
tablished ownership structures and unique digital assets or to- events, and market content, enabling a vibrant virtual econ-
kens. These unique tokens leverage blockchain technology to omy. Users access the virtual world using VR headsets or web
certify the authenticity and ownership of digital assets, such browsers, exploring its vibrant sceneries and chatting with other
as art, collectibles, and virtual real estate [33]. NFTs trans- users. It’s available for PCs, mobile devices, and VR head-
form ownership in the digital era by offering monetization al- sets like Oculus [37]. The platform makes use of 3D interface
ternatives for creators and artists through smart contracts, royal- technology to deliver immersive experiences, allowing users to
ties, and transparent provenance. Some well-known examples interact with the environment and each other in a completely
of NFTs are SuperRare (www.superrare.com), Nifty Gateway adaptable environment. The details of the 3D interactive web
(www.niftygateway.com), and Async Art (www.async.art). for Web 3.0 are presented in Section 7.

2.4. Current Standards and Industry Development


2.3.3. The Metaverse
Many international companies and organizations are actively
This is a new platform transforming the connected digital developing standards toward Web 3.0.
world. It offers a fully immersive, interactive, and digital world
that is connected via the Internet and accessible through VR
2.4.1. World Wide Web Consortium (W3C)
and AR devices. The Metaverse enables seamless transitions
between the physical and digital worlds, thus fostering cre- W3C (www.w3.org) is an international organization that has
ative expression and immersive interactions [34]. In the con- been developing open standards for the WWW, such as HTML,
ventional virtual world concept, the user data is often stored in CSS, and XML, and it continues to play an important role in
a centralized database, possibly leading to the point-of-failure Web 3.0. Currently, W3C is working towards developing stan-
problem. In this context, Web 3.0 technology can transform dards for Web 3.0, including a new transport protocol for the
the Metaverse into a decentralized network, e.g., Decentra- web named HTTP/3 [38]. Most of the published standards re-
land (www.decentraland.org). Web 3.0, via its core technolo- lated to Web 3.0 are about semantic web and decentralized iden-
gies including blockchain, semantic, and interactive 3D web, tities (https://www.w3.org/standards).
can play a pivotal role in ensuring that digital assets, iden-
tities, and transactions are secure, verifiable, and owned by 2.4.2. ConsenSys
the users themselves [35]. Decentraland and Somnium Space ConsenSys (www.consensys.io) is one of the leading
(www.somniumspace.com) are a few well-known examples of blockchain and Web 3.0 software companies. ConsenSys cur-
Web 3.0-enabled Metaverse systems. rently offers a wide range of products for Web 3.0, including
digital identities and assets management tools for users and
developing tools and platforms for developers. Most of the
2.3.4. Semantic MediaWiki (SMW) products are based on the technologies of Ethereum. Consen-
Semantic MediaWiki (SMW) is a version of MediaWiki Sys also takes part in several other initiatives that are pushing
(www.mediawiki.org) that makes it a sophisticated semantic the development of Web 3.0. For example, it focused on its
knowledge management tool. It uses Web 3.0 technologies in- business of building DeFi apps, which are financial solutions
cluding RDF (Resource Description Framework), OWL (Web based on blockchain technology. ConsenSys is also interested
Ontology Language), and SPARQL (SPARQL Protocol and in developing NFTs, unique digital assets that cannot be repro-
RDF Query Language) to improve data organization and re- duced [39].
trieval [36]. RDF is used to describe semantic data, OWL
simplifies complex data modeling and inference, and SPARQL 2.4.3. Solid Project
enables advanced querying. By embedding semantic annota- Solid Project (www.solidproject.org) provides a unique plat-
tions in wiki pages, SMW makes data both machine-readable form for data storage and management through decentralized
and queryable, facilitating the integration of internal and ex- data stores called Pods. These Pods allow users to securely
ternal databases. Users can perform complex searches based store their data, maintain full control over it, decide what to
on semantic linkages and visualize data through dynamic re- share and with whom, and revoke access at any time. Solid
ports and graphics. This capability enhances knowledge man- utilizes standard, open, and interoperable data formats and pro-
agement, research cooperation, and extensive documentation. tocols, enabling different applications to work with the same
By facilitating richer data integration, better data retrieval, and data. It also provides robust authentication and authorization
more meaningful linkages, semantic technologies can improve systems for data access control. Furthermore, Solid offers de-
standard web applications and transform them into more intelli- veloper tools and libraries to facilitate the creation of applica-
gent, contextually aware systems. The details of semantic web tions that can store and access data in Pods using the Solid Pro-
technologies are presented in Section 6. tocol.
7
2.4.4. Industry Development Web 3.0 has the potential to provide users with a more human-
Web 3.0 is bringing in a new age of industrial growth, marked centric and seamless experience. The ubiquity of IoT devices
by innovative technologies and decentralized frameworks that also presents opportunities for innovative applications, such as
are transforming traditional industries. This transformative rev- digital twins and the Metaverse, thereby fostering future cyber-
olution is through the integration of blockchain, smart con- physical systems [41].
tracts, and DApps, which enhance security, and efficiency in
various industries. The following are the most recent Web 3.0
industry developments: User Interface and Applications

• Everledger: Everledger (www.everledger.io) is a Web 3.0


Discovery Mechanism:
concept that provides technical solutions to promote open-
Thing Directory

Security: JWT, DTLS


ness in global supply chains. It supports tracing an item’s
Querying:
use throughout the entire cycle of the global supply chain. Information Exchange:
SPARQL
For authenticity verification, customers can scan the label. Thing Description
The Everledger software establishes a significant mile-
stone in web security by offering fraud protection without Data Formats: JSON-LD
the need for sensitive personal information or challenging
passwords. Identifier: URI Character Set: UNICODE

• Storj: Storj (www.storj.io) is a decentralized web storage


system uses blockchain technology to allows users to store Fig. 5: An overview of the W3C’s Web of Things (WoT) architecture [42].
information securely while also assuring both redundancy The architecture hinges on key components: Things, encompassing physical
and fault tolerance. The most notable advantage of Storj and virtual entities, detailed by Thing Descriptions that standardize capabilities
and interactions. The Thing Directory facilitates efficient discovery and access
Web is the ability to do limitless uploads and downloads to Things through URIs. SPARQL enhances querying capabilities, while the
at any time. Another notable aspect of the Storj Web is its JSON-LD data format ensures interoperability and semantic understanding.
currency, which supports the Storj decentralized storage
infrastructure. However, the continuous development of the IoT ecosystem
has led to increased complexity in data compatibility and sys-
• The Uniswap: Uniswap (www.uniswap.org) is a Web 3.0 tem interoperability. This complexity arises from the wide va-
exchange mechanism that employs an open and decentral- riety of IoT devices, sensing data, and deployment contexts,
ized network protocol to provide users ownership. It en- which are categorized by different manufacturers and service
ables users to exchange any Ethereum request for token providers. Additionally, the scale in both volume and het-
with no extra fees, or verification of identity. It also al- erogeneity across various application fields continues to grow,
lows users to supply stability to the marketplace and re- further limiting the autonomous exchange of data and service
ceive fees in exchange. interactions between different IoT systems. Addressing these
• Axie Infinity: Axie Infinity (www.axieinfinity.com) is an challenges requires the establishment of standardized protocols
innovative Web 3.0 gaming platform that encourages play- and frameworks that enable seamless communication and col-
ers to participate in games, earn rewards, and exchange laboration between diverse IoT devices and service providers.
NFT-based game assets. To utilize these services, users Such standardization processes would facilitate the integration
must go through a multi-step procedure that includes es- of new devices and applications, improve data security, and en-
tablishing an account and syncing their wallet for quick hance the overall performance of IoT systems, making them
access. more reliable and efficient.

3.2. Established Frameworks and Standardization


3. IoT Technologies for Web 3.0
Several standardization organizations have developed new
3.1. Background protocols and platforms to integrate the semantic web and IoT
The IoT has experienced exponential growth due to advance- technology. For example, a Semantic Web of Things for Indus-
ments in cutting-edge technologies, such as 5G, edge com- try 4.0 (SWeTI) architecture is proposed in [43]. The SWeTI
puting, AI, and blockchain. According to current projections, architecture with several layers to enable interoperability across
approximately 34.7 billion IoT devices will be commercially IoT devices and services. In this way, the semantic information
launched by 2028, with an anticipated annual growth rate of can be extracted from lower layers, e.g., the physical layer, and
around 18% [40]. These interconnected and heterogeneous de- utilized by upper layers, e.g., the semantic layer and applica-
vices autonomously generate and exchange vast amounts of tion layer. Other approaches have been proposed to standard-
data without manual intervention. The integration of IoT tech- ize architecture for Web 3.0-based IoT technologies. The Web
nology into Web 3.0 is expected to revolutionize the digital en- of Things (WoT) is a concept established by the W3C to en-
vironment, enhancing its connectivity and intelligence. By in- able interoperability across IoT devices and systems [44]. The
corporating real-life data from various types of IoT devices, in- WoT utilizes and extends existing web technologies for sim-
cluding smart appliances, smart vehicles, and wearable sensors, plifying the development of IoT services and applications. In
8
general, WoT presents a basic interaction abstraction that re- the JSON-LD format for Linked Data. The use of JSON-LD
lies on IoT devices’ properties, events, and actions. This ab- format can facilitate semantic processing by converting a TD
straction provides a universal reference point for applications into RDF triples, performing semantic inference, and execut-
to obtain metadata for an IoT service and to comprehend how ing tasks based on ontological terms. This enhanced processing
to access the data and functions of the IoT service. The WoT ability can promote greater autonomy among clients.
also enables linked data-based semantic annotations that pro- A repository for TD instances, called Thing Directory, en-
vide robust search and inference capabilities, thereby providing ables registering, updating, and removing TDs, as well as per-
a platform for establishing a more integrated and interoperable forming lookup operations through SPARQL queries. When a
IoT ecosystem. device retrieves the TD of another IoT device from a Thing Di-
rectory, it must interpret and comprehend the information con-
1 {
tained in the TD to establish a successful interaction. Once this
2 "@context": "https://www.w3.org/2022/wot/td/v1.1",
3
4
id: "urn:uuid:0804d572-cce8-422a-bb7c-4412fcd56f06",
title: "MyLampThing",
the context for interpreting
the JSON structure
is achieved, the devices can communicate with each other au-
5
6
securityDefinitions: {
basic_sc: {scheme: "basic", in: "header"}
tonomously without requiring any human intervention.
10 },
11 Security: "basic_sc",
12 properties: { Properties of the Thing
13
14
status: {
type: "string",
3.3. The Roles of IoT Technologies in the Future Development
15 forms: [{href: "https://mylamp.example.com/status"}]
16 } of Web 3.0
17 },
18 actions: {
19 toggle: {
What can be performed on the Thing
The IoT is a widely recognized concept referring to a net-
20 forms: [{href: "https://mylamp.example.com/toggle"}]
21
22 },
}
Accessible
work of infrastructures that connect embedded devices and ob-
23 events: { What the Thing can emit
24 overheating: {
via a URL
jects, such as sensors, vehicles, and appliances, via the Internet.
25 data: {type: "string"},
26
27 }
forms: [{href: "https://mylamp.example.com/oh", subprotocol: "longpoll"}] This connectivity enables the exchange and processing of data.
28 }
29 } When combined with Web 3.0, IoT technology significantly
transforms our interactions with devices, data management and
Fig. 6: A sample JSON structure of a TD [45].
utilization, and overall digital experience. These transforma-
tions have resulted in more adaptable processes within an open
environment that promotes collaboration, shared services, and
3.2.1. Semantic Technologies in the WoT group decision-making.
The WoT framework utilizes the semantic web technology
standards to enable communication capabilities for IoT devices. 3.3.1. Decentralized Data Ecosystem
An overview of the W3C’s WoT architecture is illustrated in Web 3.0 is built on the principle of creating a decentralized
Fig. 5 [42]. In this architecture, Thing Description (TD) is a data ecosystem. This vision aims to empower users by grant-
key component that enables interoperability and communica- ing them more control over their data and enabling direct in-
tion between IoT devices and applications. The TD is not tied teractions with applications and services. To achieve this, de-
to any particular configuration, communication protocol, or ap- centralized solutions play a crucial role in providing scalability
plication domain. TDs provide a standardized way of describ- benefits and addressing the vulnerabilities associated with rely-
ing the metadata and interfaces of Things (i.e., IoT devices) in ing on single points of failure. IoT devices are key contributors
a machine-readable format, making it easier for other smart de- to this vision as they generate vast amounts of real-time data
vices and applications to discover and interact with them. TDs at the network’s edge. By integrating IoT-generated data into
typically contain information about the device’s properties, ac- blockchain networks, the ownership and control of data are dis-
tions, events, and interactions, as well as the data schemas, tributed among users, leading to a more transparent and reliable
communication protocols, and formats. In particular, properties digital environment.
specify the state of Things, e.g., temperature or luminance value
of a sensor. Actions define the functions that IoT devices can 3.3.2. Empowering User-Centric Interactions
perform to manipulate their states such as changing a control IoT plays a crucial role in fostering user-centric interactions
heating/cooling strategy or toggling a light switch. Events de- within Web 3.0. It enables personalized, context-aware, and au-
scribe event conditions that asynchronously push notifications tonomous experiences. A human-centric IoT design focuses on
and event data to a group of subscribed clients, e.g., overheating users’ requirements in terms of functionalities and interaction
warnings or low lighting levels. modalities [46]. This shift towards user-initiated adoption of
The underlying data format for the TD is the Resource de- near-edge fog architectures for computation and storage [47].
scription framework (RDF), which is the basic metadata format Through IoT-enabled smart devices, users can seamlessly inter-
for data exchange in the semantic web. By default, TDs are act with their digital environment. Whether it is a smart home
encoded in JavaScript object notation (JSON) format. Fig. 6 adjusting temperature based on occupancy or a wearable device
illustrates a sample JSON structure of a TD. It includes the tracking fitness data, IoT empowers users to engage with tech-
Thing’s name, a unique identifier, a human-readable title, secu- nology naturally and intelligently [48]. This trend extends to
rity configurations (i.e., for authentication, authorization, etc.), personalized IoT systems for smart cities under fog computing
all the interactions that the Thing can support, and an optional architecture. This leads to improved service latency, reduced
description. To allow extensions and extensive semantic anal- functional mismatches, better resource visibility, and lower en-
ysis, the JSON serialization of TDs also supports the syntax of ergy consumption [49].
9
Home Device
Clean
IoT Sensors and Devices
Slight Smoke
Common
Home Device Heavy Smoke

High
Temperature
The physical version of the assets
Low
Temperature
Clean The physical world
Light Device
Smoke Slight Smoke
Audio device Sensor Networks
Heavy Smoke Smart Home Data Acquisition
Environment Device Video Device IoT Devices
x
Sensor Fusion
Normal Gas Gas Exhast Device Data Integration
Sensor Technology
Water Sprinkle Data Collection
Gas IoT Connectivity
Device

Abnormal Gas
Comfortable
Humidity

Humidity High Humidity Distributed Systems


Parallel Computing
Low Humidity Decentralized AI
Edge Computing
High
Cloud-based AI
Temperature
Distributed computing &AI Distributed Algorithms
Temperature
Low Collaborative AI
Temperature

Distributed Database
Blockchain Technology
Decentralized Ledger
Smart Contracts
Data Integrity
Distributed Database Blockchain Web 3.0 Integration

The digital version of the assets in Web 3.0

Fig. 7: Illustration of a cutting-edge multi-layer cloud architecture in Web 3.0, showcasing IoT integration. Smart Home concept exemplifies the rising importance
in highly developed areas, overcoming challenges with distributed computing and blockchain [50].

3.3.3. Autonomous and Trustless Transactions allowing for the seamless addition of new devices and services
When IoT devices are combined with blockchain-based without extensive reconfiguration.
smart contracts, they facilitate autonomous and trustless trans-
actions [51] [52]. These self-executing agreements eliminate 3.3.5. Enhanced Security and Privacy
the need for intermediaries, simplifying procedures and low- Security and privacy are critical in Web 3.0, and IoT of-
ering transaction costs. This convergence improves efficiency, fers advantages in these areas. IoT devices can use end-to-
scalability, diversity, and reliability within the Web 3.0 frame- end encryption, anonymization, secure data transmission, and
work, introducing new possibilities for smooth and secure dig- blockchain’s tamper-proof ledger to protect sensitive data from
ital interactions across various applications. These applications unauthorized access and manipulation [54, 55, 56]. This in-
range from supply chain management, where real-time track- creased level of security gives users more assurance and faith
ing and transparency are critical, to financial services, where when engaging with the digital realm, even in scenarios where
transactions require enhanced security and trust. This critical individuals might consider trading their private data for re-
combination represents a significant advancement in the evolu- wards.
tion of the decentralized Internet, resulting in an upcoming age
of unforeseen possibilities for innovation and value creation. 3.4. Recent Research for Integrating IoT Technologies in Web
3.0
3.3.4. Interoperability and Standardization The conceptual framework depicted in Fig. 7 illustrates the
Interoperability and standardization are essential for Web 3.0 integration of IoT technologies to enhance the immersive expe-
development since they ensure easy communication and inte- rience of Web 3.0. In this framework, the immersive experience
gration across various IoT devices and platforms. As the num- of Web 3.0 is greatly enhanced by Internet of Things (IoT) de-
ber of IoT devices grows, each with its own set of protocols and vices, such as smoke alarms, home appliances, smart home ap-
standards, a uniform framework becomes increasingly impor- pliances, and environmental sensors (for temperature, humidity,
tant [51]. Standardization promotes interoperability across dis- and gas). These devices continuously monitor and respond to
parate devices, allowing them to collaborate peacefully within environmental changes, collecting real-time data on smoke lev-
the Web 3.0 ecosystem. This involves creating standard com- els, gas presence, humidity, and temperature. Distributed com-
munication protocols, data formats, and security mechanisms puting and artificial intelligence are then used to combine and
that all devices can adopt. Interoperability promotes a more co- interpret this data, allowing smart home automation and intelli-
herent and integrated experience for consumers, allowing data gent decision-making. Sensor fusion and connectivity ensure
and services to be readily exchanged and accessed across mul- a comprehensive view of the environment, while blockchain
tiple devices and platforms [53]. Standardization decreases the technology secures data transactions and ensures integrity. In-
complexity and costs involved with connecting diverse systems, tegrating the physical and digital worlds, IoT devices create dy-
boosting innovation and implementation. Additionally, it en- namic and interactive digital representations, making Web 3.0
hances the scalability and resilience of Web 3.0 applications by more realistic, responsive, and user-centric.
10
Table 3
Summary of Recent Research for Integrating IoT Technologies in Web 3.0

Ref. Application Research Problem Solution Result


[7] Smart City Addressing massive data Blockchain data storage using federated Significantly increased data quality, performance,
workload issues on Web learning and storage security resulting in high accuracy
3.0 (95%) and minimal learning loss (10%).
[50] Smart Home Heterogeneity in devices, A multi-layer cloud architectural model Average response times without loads range from
services, and standards for IoT-based smart homes improves in- 23.68 ms to 52.36 ms; the security framework ef-
hinders IoT-based smart teractions and interoperations between fectively prevents various known attacks.
home applications heterogeneous devices and services
[57] General IoT Semantic IoT integration Semantic technologies and collabora- SEMiOTICS adoption enhances IoT and Web 3.0,
Application challenges: scalability and tion for IoT integration challenges fostering interoperability despite diverse vendor
consistency issues product usage.
[58] IoT-Cloud Detecting and preventing Develop an intelligent security frame- The proposed framework includes ontology, infer-
Security security vulnerabilities in work for power IoT-Cloud systems uti- ence rules, and effective attack detection for power
Service for power systems lizing ontology reasoning, semantic- IoT-Cloud systems.
Power Sys- web technologies, and advanced intru-
tems sion detection methods
[59] General IoT IoT exposes sensitive data An ontology-based cybersecurity frame- Introduced an ontology-based IoT cybersecurity
Applications to cyber threats, demand- work using knowledge reasoning for framework validated with an industrial scenario,
ing enhanced cybersecu- IoT, including a dynamic method for se- revealing strengths, challenges, and valuable con-
rity curity services and real-time monitoring tributions for improvement.
[60] Smart City Heterogeneity and privacy A three-module framework addressing OBPP resists data attacks in 2.5 seconds, computa-
preservation for IoT data heterogeneity while preserving the pri- tional cost ¡10%, complexity O(n) with a 4x coef-
vacy of IoT devices ficient, applicable to smart cities.
[61] General IoT Growing number of IoT Review of Semantic Web technologies Integration of semantic technologies (inter-
Applications devices and their diversity used in IoT systems and well-accepted pretation layer, processing layer, and ser-
ontologies for developing applications vices/applications layer) with adapted machine
and services learning algorithms will produce a smarter IoT.

3.4.1. Enhancing interoperability amid IoT technologies in environment [63, 64, 44].
Web 3.0
A recent study on interoperability concepts, focusing on IoT 3.4.2. Blockchain enabled IoT and edge technologies in Web
technologies and the emergence of Web 3.0, was presented in 3.0
[57]. This work addressed challenges in achieving interoper- In IoT integration into Web 3.0, challenges with massive
ability in the modern IoT ecosystem, identifying organizational, IoT workloads were addressed by proposing Triastore, an ap-
semantic, syntactic, and technological interoperability as key proved blockchain framework with ML deployed the edge de-
obstacles. The proposed solution introduced an interoperabil- vices [7]. Triastore abstracted ML models into approved infor-
ity framework, facilitating cooperation from the device to the mation blocks, incorporating Blockchain Consensus and Proof
backend, enabling seamless interaction across IoT layers. Cat- of Federated Learning (PoFL) phases. The study’s practical as-
egorized into four levels, the framework ensures technological, sessment using MNIST data demonstrated high precision with
syntactic, semantic, and organizational interoperability, pro- minimal data integrity degradation. Additionally, the paper in-
moting seamless communication and collaboration. The pre- troduced a collaborative consensus mechanism, PoFL, enhanc-
sented practical roadmap can overcome integration challenges, ing user security and privacy by sharing parameters among dis-
aligning with standards and shared models. Implemented by tributed parties. The proposed approach was seamlessly im-
the EU-funded SEMIoTICS project, it stands as a robust re- plemented with the Fabric open-source platform, enhancing the
sponse to IoT and Web 3.0 interoperability issues. In addi- authenticity of blockchain assessments [7]. Semantic technolo-
tion, addressing interoperability challenges is crucial for the ef- gies contribute to addressing trust, security, and privacy chal-
ficient operation of a Web 3.0 platform handling multisensory lenges in IoT, enabling fine-grained control over data access
data from diverse IoT devices. These challenges, stemming and sharing by representing security policies, access controls,
from technical and organizational factors, encompass standard- and privacy preferences. Semantic reasoning aids in enforc-
ization, semantic technologies, data integration, and collabora- ing security, anomaly detection, and ensuring data integrity and
tion among stakeholders. A potential solution involves utilizing confidentiality in IoT deployments. However, applying seman-
standardized protocols and semantic web technologies, ensur- tic technologies to large-scale IoT deployments for Web 3.0 can
ing consistent communication and meaningful data interpreta- pose scalability challenges, requiring significant computational
tion. Adopting Linked Data principles and ontologies further resources and potentially introducing latency issues. Managing
enhances data sharing [62]. Industry standards like OPC-UA ontology consistency in dynamic IoT environments is difficult,
and PPMP provide platform-independent protocols, promoting but potential solutions include ontology design patterns, align-
real-time communication and uniform representation. Imple- ment and mapping, and ontology evolution management frame-
menting these protocols, along with technologies like WoT’s works. Overcoming these challenges necessitates collaborative
Thing Description, can enhance interoperability in a Web 3.0 efforts, standardization, optimization techniques, and advance-
11
ments in data quality. Interdisciplinary collaborations with AI • URLLC: URLLC represents an approach in 5G commu-
and distributed systems can drive the development of robust and nication which provides high reliability and low latency
efficient Web 3.0 technologies, considering the integration of services, thereby enhancing real-time data exchange and
blockchain and IoT technologies [58, 59, 50, 60, 61]. processing in technologies such as IoT, IoV, and smart city.
Following 3GPP, URLLC is required to transmit a packet
3.5. Insights and Summary with 99.999% for 32 bytes with a user plane latency of
1 ms [68]. The implementation of URLLC in Web 3.0
The rapid expansion of IoT devices, powered by advances
enables seamless and instantaneous communication, im-
in 5G, edge computing, AI, and blockchain, promises the be-
proving the real-time performance of Web 3.0 applications
ginning of a future in which billions of networked gadgets ex-
such as decentralized finance, industrial automation, and
change data autonomously. Standardization projects such as
autonomous vehicles.
SWeTI and WoT solve compatibility and interoperability is-
sues, allowing IoT devices and services to communicate seam- • mMTC: Massive Machine-Type Communication is an-
lessly. Semantic technologies, namely Thing Descriptions, play other 5G use case that simultaneously supports the connec-
an important role in facilitating this communication. The incor- tion of many devices. The requirements of these devices
poration of IoT technology into Web 3.0 has enormous promise, are low complexity and extended power consumption for
especially in terms of decentralized data ecosystems, improved data transmission [67]. Applying mMTC to Web 3.0 paves
security and privacy, user-centric interactions, and autonomous the way for a more interconnected and automated web.
and trustless transactions. IoT devices can employ blockchain- It mainly supports the physical layer of Web 3.0 which
based smart contracts to conduct transactions without the need contains several IoT devices, enhancing the functionality
for intermediaries, increasing efficiency, scalability, diversity, of applications e.g., smart city, environmental monitoring,
and dependability in the Web 3.0 framework. Current research supply chain management, etc.
efforts focus on tackling critical issues like scalability and in-
teroperability utilizing strategies such as Triastore, an edge- By utilizing the advantages of 5G, Web 3.0 can transmit enor-
deployed blockchain framework incorporating machine learn- mous amounts of data, thereby improving the user experience
ing, and the application of semantic technologies to ensure se- of existing applications and services. In practice, 5G has had
curity and privacy in IoT implementations as shown in Table 3. a major effect on human lives. For instance, industrial IoT is
In summary, recent research in integrating IoT technologies into the most popular technology that benefits from 5G. In this sce-
Web 3.0 mainly focuses on overcoming challenges through se- nario, 5G can be used to connect multiple sensors and machines
mantic information extraction and technologies. Collaborative to the Internet, which can help businesses expand efficiency and
efforts, standardization, and interdisciplinary collaborations are correctness [69]. Otherwise, the attributes of 5G can improve
crucial for advancing robust and efficient technologies, e.g., the upcoming applications such as ensuring safety by utilizing
blockchain, semantic web, 3D interactive, 5G, and IoT. low latency for real-time deployment of autonomous vehicles
and traffic management in smart cities [70]. However, 5G is
not a single technology. It combines various technologies and
4. 5G Technologies for Web 3.0
methods to create an advanced wireless communication system.
Below are some of the 5G key enabling technologies:
4.1. Background of 5G Technologies
5G is the fifth generation of wireless networks and it is be- • Network Slicing: Network slicing is another pivotal tech-
lieved to become a monumental leap in the area of connectivity. nology of 5G, which creates multiple virtual networks on a
Recent statistics illustrate that by the end of 2022, nearly 35% single physical infrastructure, catering to different types of
of the global population had accessed 5G and this figure is pro- services and users. Even though network slices share the
jected to reach 85% by 2028 [65]. Compared with the conven- same physical environment, they operate independently,
tional network generations, 5G can deliver faster, more reliable ensuring that the disruption or issues from one slice can-
and more efficient mobile communication. It is expected to pro- not interrupt others. Besides, resource management in net-
vide new applications and services with high data rates, low la- work slices depends on its service. This approach not only
tency, massive connectivity, enhanced bandwidth and seamless maximizes 5G core networks but also diversifies differ-
interconnectivity [66]. Typically, 5G technology can be defined ent quality of services, thereby making modern wireless
by three exemplary use cases [67]: networks more adaptable and user-centric [68]. In Web
3.0, network slicing provides tailored network segments
• eMBB: Enhanced Mobile Broadband is the primary ap- for diverse applications such as Metaverse and DeFi, en-
proach to mobile communication. It aims to provide com- suring optimal performance and security for the decentral-
munication with high data rates and large traffic volumes. ized web environment.
Leveraging eMBB, users can enable Web 3.0 services in-
cluding 3D videos, 4K streaming, and VR and AR [66]. • Edge Computing: Edge computing is a key technology of
As a result, it enhances user experiences in web environ- 5G that enables data to be processed at the edge of net-
ments significantly and promotes the development of new works instead of a centralized database. This approach
interactive 3D web applications. can minimize the data stream in wireless traffic, thereby
12
expanding the bandwidth usage and ensuring low latency. have already been crucial for the growth of IoT, AI, and ex-
Moreover, edge computing provides better security and tended reality, can significantly contribute to Web 3.0 develop-
privacy. As data is closer to its source, the transmis- ment [76]. The fusion of Web 3.0 and 5G has the potential to
sion of sensitive content is minimized [71]. This leads provide a more distributed, reliable, and efficient online web
to future wireless technologies being more decentralized, experience. Following that, users can participate in a web en-
faster, safer, and more responsive. By rendering and pro- vironment with instant data transmission, enhanced virtual in-
cessing data near the edge, edge computing can boost the teraction, and interconnected digital communication [15]. The
capabilities of augmented and virtual reality, delivering contributions of 5G technologies in Web 3.0 are outlined in the
immersive and seamless experiences in Web 3.0. following subsections.
• Massive MIMO: Massive MIMO plays a significant role
in 5G, as it utilizes an extensive array of antennas at 4.2.1. Enhancing decentralized communication
both the transmitter and receiver to enhance the capacity The main feature of Web 3.0 is the decentralized web en-
and performance of wireless networks without requiring vironment. By distributedly managing data, Web 3.0 provides
more spectrum. Following that, the enormous number of users with the ability to control their information. However,
antennas allows spatial multiplexing where base stations maintaining the distributed Internet over a vast number of nodes
can broadcast multiple data streams simultaneously to sin- presents significant challenges. In this context, 5G technolo-
gle or multiple recipients with the same frequency chan- gies play a pivotal role in deploying decentralization with low
nels [66]. As a result, by utilizing the potential of Massive latency and unparalleled bandwidth perspectives. Specifically,
MIMO, advanced technologies can be deployed in real- the ultra-high speed connectivity from 5G promises a deploy-
time with high spectral efficiency and throughput [66]. ment of a decentralized Internet web, which operates through
This technology is highly effective in enhancing mobile a network of devices, preventing data control by any single
augmented reality with a high data rate network, thereby server [76]. Furthermore, the specifications of 5G includ-
providing immersive content and real-time interaction in ing URLLC, eMBB, and mMTC ensure continual peer-to-peer
Web 3.0 [72]. communications which is the most important in Web 3.0. Tak-
ing beamforming technology as an example, advanced signal
• Beamforming: Beamforming is an essential 5G technique processing methods are applied to minimize the interference be-
that can effectively control the energy and direction of tween peer-to-peer nodes, therefore improving the performance
wireless signals. Rather than broadcasting signals uni- of data transmission in a cluster of decentralized communica-
formly in all directions, the beamforming technique can tion nodes [77].
adjust the amplitude and phase of the signal from each an-
tenna, thereby directing the energy of radio waves toward 4.2.2. Diversity and efficient data transmission
a specific direction or user. This not only enhances the Data transmission plays a significant role in the Web 3.0 en-
quality and range of the radio wave but also optimizes the
vironment in which various technologies are utilized. As Web
spectrum usage to adapt to the soaring number of wire-
3.0 requires the transmission of various data types across layers
less data [73]. By managing signal direction and strength,
that are directly linked to different technologies, 5G can offer
beamforming can ensure reliable connections for a wide significant benefits in this field [15]. By offering low latency
array of IoT devices, enabling instantaneous data collec- and high bandwidth from advanced wireless technologies like
tion and exchange for Web 3.0.
massive MIMO, URLLC, and beamforming, 5G enables Web
• Millimeter Wave: Millimeter wave (mmWave) refers to a 3.0 to operate more efficiently and ensures fluency in the data
specific part of the electromagnetic spectrum with wave- streams, thereby increasing the experience of users.
lengths ranging from 1 to 10 millimeters, corresponding
to frequencies between 30 and 300 GHz [74]. Such high 4.2.3. Immersive and interactive web content
radio frequencies allow 5G to broadcast data over wide Web content is a crucial aspect of Web 3.0 which enables
bandwidths and small wavelengths, resulting in a faster cy- AR/VR and 3D simulations to increase user experience. The
ber environment [75]. Utilizing the high-frequency capa- challenge in deploying such rich and complex technologies in
bilities of mmWave in wireless technologies can improve real-time requires reliable data transfer, and 5G technologies
the communication speed and throughput in Web 3.0, ad- can solve that problem. According to Insidetelecom [76], the
dressing the demand for high bandwidth and massive data necessity for rapid Internet in developing virtual technologies
transmission. in Web 3.0, including the Metaverse, makes 5G technologies
essential. Thanks to the ultra-low latency and massive data
4.2. Roles of 5G Technologies in Web 3.0 throughput of 5G, users can access virtual spaces with high
5G technologies provide unprecedented speed, low latency, quality [79]. Besides, edge computing enhances Web 3.0 by
and large simultaneous connection between devices [66]. enabling real-time, delay-free interactions through local data
Meanwhile, Web 3.0 requires an advanced network connection processing. Additionally, 5G’s network slicing method can
to support extensive communication among technologies like customize network allocations [35]. Therefore, the demanding
Blockchain, IoT, and the Metaverse. Thus, 5G networks, which web content becomes a priority with efficient resources.
13
and base stations. The digital twins obtain the real-time sta-
MetaverseTenants
... tuses of the base stations to estimate the reliability and latency.
MT1 MTm
MT2 MT3
Web 3.0 Environment
The status of base stations that are satisfied for latency require-
End Users
Request

ments is the input of a Deep Q-Network to explore and exe-


Decomposed Navigation MetaSlice
MetaSlices cute the offloading decision. The numerical results showed that
Admission Management
Admission the proposed architecture could provide successful offloading
Controller Tier-N

MetaSlice Analyzer
Travel MetaSlice probability via different numbers of users, thereby improving
Update
4
1
Accept
the QoE of Web 3.0 with low latency communication.
Request Tier-2
Resource
Management
Education MetaSlice
Moreover, Metaverse is one of the exemplary applications of
Availability 3
2
Functions
Web 3.0, which offers users interactive and immersive 3D ex-
Allocation

Metaverse Tier-1
Meta-slice 1's
functions
periences. However, it faces significant challenges in resource
Shared
Infrastructure Meta-slice 2's

Service Provider Multi-tier Resource


functions Functions
Meta-slice 3's
Metaverse allocation, which requires enormous resources, including com-
functions
Architecture
MetaInstance puting, storage and network resources, to support extended real-
MetaSlicing Framework
ity and ensure reliable and low-latency communication. There-
Fig. 8: The proposed architecture in [78] aims to provide intelligence Metaverse fore, the authors in [78] proposed a novel resource allocation
application management based on the decomposition of each application and framework for Metaverse called MetaSlicing, which is illus-
requests processing by deep reinforcement learning. trated in Fig. 8. In particular, the Metaverse applications are
4.2.4. Massive connectivity first decomposed into multiple functions, each of which can be
independently initialized and positioned at a different comput-
5G technologies play a significant role in empowering the
ing tier to utilize all the network resources. The applications
connectivity of Web 3.0. It enables Web 3.0 to create a more
with common functions are then grouped into clusters called
decentralized, intelligent, and diverse environment with the ad-
MetaInstances, allowing these functions to be shared across the
vanced methods of 5G as the backbones. Leveraging such tech-
layers. After that, a semi-Markov decision process integrated
nologies as Massive MIMO, edge computing, and network slic-
with a deep reinforcement learning technique is proposed in the
ing allows the deployment of a massive number of devices from
service provider to find an optimal admission control policy for
IoT sensors to autonomous vehicles [80]. These devices can op-
the Metaverse, thereby satisfying the high dynamic of resource
erate with high-data processing and provide real-time feedback
requests and real-time response. The authors also highlighted
to users with extremely low latency. This opens many new use
that the proposed MetaSlicing can improve the performance of
cases like smart cities, remote surgery, intelligent transporta-
a Metaverse system, paving the way for dynamic resource al-
tion, online learning, and live streaming, which can make Web
location and interoperability between different MetaSlices in
3.0 more immersive. It not only improves IoT connectivity but
Metaverse, thereby boosting efficiency in Web 3.0.
also fosters new possibilities in DApps, augmented reality, and
In the Web 3.0 ecosystem, conventional end-to-end systems
virtual reality. Consequently, the integration of 5G connectiv-
are not effective due to the complexity of data processing within
ity and edge computing can facilitate real-time processing for
a decentralized network. This complexity comes from its re-
millions of devices, supporting data-intensive applications that
liance on information-centric networking and peer-to-peer data
utilize augmented and virtual reality [76]. This leads to the
storage in which data is content-addressed. Therefore, the im-
enhancement of user experiences with swift connections and
plementation of Named Data Network Functions (NDNF) is
consistent machine-to-machine interaction.
presented in [81], enabling virtual network functions on data
requests in NDN, which can be potentially applied to Web 3.0.
4.3. Recent Research on 5G Technologies for Web 3.0 In NDNF, network functions are encoded as part of the re-
quested content name, and NDN mechanisms are applied to en-
4.3.1. Performance improvement for Web 3.0 sure network function execution in the node during data trans-
5G is a cutting-edge wireless technology that enables faster mission. The authors showed a comprehensive simulation of
and more reliable communication for various applications. It NDNF with various network function configurations in a gate-
has three critical use cases: URLLC, eMBB, and mMTC which way router. The simulation results indicated the feasibility and
aim to improve the quality of experience (QoE) for users by re- practicality of NDNF not only in small-scale networks but also
ducing latency and increasing bandwidth [67]. Therefore, 5G in complex ones with multiple request and network function
can enhance the performance of Web 3.0 to create a more effi- services, thereby allowing the deployment of Web 3.0 with an
cient and responsive, user experience. information-centric and decentralized web environment.
As Web 3.0 offers user-centric, intelligent and autonomous
service, it is expected to have high communication and compu- 4.3.2. Semantic communications for Web 3.0 using 5G and be-
tation capabilities. This poses substantial challenges in achiev- yond
ing ubiquitous and low-latency communication given the het- Semantic communication is a new paradigm of wireless com-
erogeneity and dynamics of current networks. To solve this munication that focuses on the transmission of the meaning
problem, the authors in [79] illustrated an intelligent offload- (or the semantic information) of the source rather than the ex-
ing communication. Deep reinforcement learning is adopted act bits or symbols [85]. It aims to overcome the limitations
to explore the optimal data transmission between digital twins of the Shannon theory, which is based on the physical ca-
14
Table 4
Summary of Integrating 5G Technologies in Web 3.0

Ref. Application Research Problem Solution Result


[78] Metaverse Resource allocation Multi-tier computing and network Enhanced resource management with rewards up to
functions for resource allocation, 80% greater than existing works.
with deep reinforcement learning
for admission control
[79] General Web 3.0 Dynamic perception Digital twins for estimating latency Achieved low-latency communication (less than 0.2
Application and intelligent decision- and deep reinforcement learning for ms) and efficient offloading decisions (up to 40%).
making task offloading decisions in Web 3.0
[81] General Web 3.0 Information-centric and Network functions for content re- Successfully processed multiple requests and ser-
Application content-addressed data on quests and named data networking vices with data names included in transmitted data.
Web 3.0 for data transmission
[82] Metaverse Efficient sensing informa- Semantic transmission for both Improved data transmission with a reduction in data
tion transmission from IoT transmitter and receiver amount by up to 27.87% after semantic encoding.
devices
[83] Metaverse Distribution and trading of Deep reinforcement learning Enhanced offloading tasks by translating raw im-
computing resources (DRL) to maximize revenue for ages (3.59 Mbytes) to semantic symbols (up to 0.65
service providers, and semantic Mbytes).
communication to reduce collected
data and offloading costs
[84] Internet of Vehi- Detecting and preventing Zero-trust security for anomaly de- Ensured security while maintaining low latency in
cles malicious computing of- tection and a game model to en- IoV communication.
floading tasks hance security and optimize system
performance

pacity of the channel and the accuracy of the received signal. of Metaverse to reduce the data collecting and offloading cost
In the context of Metaverse in Web 3.0, maintaining 3D data from the physical devices. In the suggested system, seman-
transmission between the physical environment and the digital tic communication is applied in UAVs, which is deployed by
world seamlessly throws a notable challenge [86]. In this sce- VSPs to reduce data traffic and computing costs. By leverag-
nario, semantic communication becomes a solution by employ- ing the convolutional neural network (CNN) in the RelTR tech-
ing deep learning-based end-to-end communication and natural nique, a CNN is combined with a feature encoder and entity de-
language processing techniques to enable the transmission of coder to generate the feature context and entity representation
the semantic content of messages [87]. This approach elimi- of the images captured by the UAV. It employs a Triplet De-
nates the need to transfer raw 3D data, leading to efficient data coder that utilizes attention mechanisms to classify and relate
transmission with low latency communication within Web 3.0, subjects, objects, and their predictive, effectively capturing the
thereby improving the experience of users. Hence, applying 5G relationships within the image. These relationships are struc-
and advanced wireless technologies to enable semantic com- tured into semantic triplets, including subject, predicate and ob-
munication in Web 3.0 is essential, thereby bridging the gap ject, via feedforward neural networks, translating raw data from
between user interaction and digital feedback. the physical world into a semantic symbol, therefore mitigat-
The authors in [82] proposed a semantic transmission frame- ing data transmission size from UAV to digital twins. The au-
work to transfer information from the physical world to the thors demonstrated that applying semantic communication can
Metaverse which can be illustrated in the Web 3.0 environ- reduce the offloading cost in the service providers, thereby en-
ment. The transmission cost and data storage can be improved abling the deployment of immersive 3D content in Web 3.0.
by utilizing semantic space in both transmitter and receiver, ow-
ing to the migration in transmitted sensing information. In the 4.3.3. Security and privacy in Web 3.0
considered framework, the transmitter focuses on semantic en- The integration of 5G into Web 3.0, while offering advanced
coding and transferring information following the calculation data transmission and connectivity, also introduces significant
of channel frequency response. Meanwhile, the receiver ex- security and privacy challenges that are essential for guaran-
tracts semantic features from the incoming signal in terms of teeing uninterrupted and secure massive data transmission in
channel decoding. Additionally, the receiver can also restore the web environment. Web 3.0, involves many technologies
the complete channel frequency power to facilitate other Meta- and intermediate systems, and thus it has many open interfaces
verse services. Besides, a theory reward mechanism is provided which are vulnerable to diverse attacks. For example, IoT de-
to incentivize the transmitter to send data with high frequency, vices at the physical layer can be disrupted by common com-
thereby increasing the user experience in the Metaverse. The munication and network attacks such as DDoS, Sybil, Replay,
numerical results showed that the proposed framework can re- etc, thereby decreasing the performance of Web 3.0 [88]. In ad-
duce the amount of transmitted data and effectively boost the dition, emerging applications like Metaverse also present sig-
transferred data in high frequency. nificant security risks which can negatively impact Web 3.0.
Alternatively, the authors in [83] deployed semantic com- For instance, by virtualizing real-world environments instan-
munication in virtual service providers (VSPs) in the context taneously, users can face malicious actions including virtual
15
stalking and spying, illegal tracking locations, digital asset hi- 5.1. Blockchain Fundamental
jacking, and deepfake events [89]. Consequently, security con-
Blockchain technology represents a fundamental aspect of
siderations are crucial in the integration of 5G with Web 3.0.
Web 3.0 that has gained significant attention as a groundbreak-
Recently, authors in [84] proposed a mechanism to ensure
ing concept. In the conventional database systems that central-
security and privacy in Web 3.0 in the context of IoV. In the
ize data storage management, making them susceptible to at-
considered system, an anomaly detection algorithm for edge
tacks and data breaches [3], blockchain functions as a decentral-
server placement is built based on zero-trust security and a non-
ized database spread across multiple decentralized nodes [22].
cooperative game model, thereby preventing cyber-attacks from
The fundamental idea behind blockchain is to establish a trans-
outliers to cloud servers in the IoV-based cloud edge comput-
parent, secure, and unalterable system for storing and verifying
ing in Web 3.0. All tasks and users’ requests are considered
transactions, making it highly challenging for any single entity
untrusted in the IoV environment and must be verified before
to modify or tamper with the data [90]. A blockchain system
accessing the system. As the anomalies are assumed to increase
encompasses three key attributes:
the workload and generate computational failure, the security
mechanism is based on the data size of tasks. The tasks are de-
• Decentralization: Decentralization plays a key role in
cided to be insecure if their data size is less than the multiply of
blockchains, as it distributes information across a net-
the coefficient and average of data sizes. The simulation results
work of nodes, ensuring that no single entity has full con-
showed that the proposed algorithm can effectively ensure the
trol [15]. This enhances security and resilience, while
security between the edge server and base stations, maintaining
eliminating any single points of failure or vulnerability.
undisrupted and low latency communication, thereby improv-
By leveraging blockchain technology, we can build decen-
ing the performance of Web 3.0 empowered by IoV.
tralized communication networks that are resistant to cen-
sorship and surveillance, providing users with increased
4.4. Insights and Summary
privacy and control over their data [91].
5G technologies play an essential role in the development of
Web 3.0 by providing ultra-low latency and highly reliable in- • Transparency: Transparency is another essential element
ternet connectivity. It facilitates the seamless communication of blockchain that shapes a decentralized and trustwor-
of advanced Web 3.0 applications, e.g., AR/VR and IoT de- thy environment where users can participate with con-
vices, which require massive data transmission and real-time fidence, knowing that their interactions are secure, au-
processes. The high data transfer rates and high bandwidth uti- ditable, and accountable. The blockchain ledger is acces-
lization of 5G ensure that Web 3.0 with intensive data can run sible to the public, allowing anyone to assess and verify
smoothly, fostering a more interconnected and responsive digi- network transactions. Users independently check the au-
tal environment. However, these combinations also bring with thenticity and integrity of transactions, ensuring that data
them new difficulties, especially when it comes to privacy and is correct and tamper-proof [92].
security. Considering Web 3.0 promotes a decentralized and
networked digital environment, it is necessary to handle poten- • Immutability: Immutability is another important aspect
tial vulnerabilities that arise from the wide variety of technolo- of blockchain, that ensures that the data stored on the
gies and user interfaces utilized. Thanks to 5G technologies, blockchain cannot be changed or erased by anyone.
which work as the foundation for Web 3.0’s decentralized, user- Blockchain creates digital signatures that link each block.
centric, and autonomous vision, enabling more dynamic and This guarantees that any modifications to a transaction
immersive online experiences. The seamless fusion of 5G’s must be granted by a majority of nodes, making the sys-
high-speed connectivity with edge computing’s real-time pro- tem very resistant to fraud and manipulation [93]. As a
cessing capabilities not only facilitates immersive virtual expe- result, immutability can ensure that the blockchain is se-
riences but also ensures efficient resource allocation and opti- cure, transparent, and trustworthy, as no one can manip-
mized data transmission. As researchers keep looking for new ulate or falsify the data. Furthermore, immutability also
ways to improve, the combination of 5G and Web 3.0 is set to improves efficiency and reduces the costs of various pro-
change the digital world in big ways. A summary of the 5G cesses that involve data recording and sharing, such as
technologies approaches for Web 3.0 is presented in Table 4. contracts, transactions, and audits by using hashing, dig-
ital signatures, and consensus mechanisms [93].
5. Blockchain Technology for Web 3.0
Consensus mechanisms play a crucial role in attaining agree-
This section delves into the fundamental concepts of ment among participants in a decentralized network regarding
blockchain technology, providing its essential components and the validity and order of transactions. They hold paramount
mechanisms. Following that, we investigate the important roles importance in upholding the integrity and security of the
of blockchain technology in Web 3.0. Furthermore, we exam- blockchain. Consensus mechanisms typically resolve mathe-
ine the most recent developments and technological advances matical problems or designate trusted nodes to verify transac-
in blockchain technology, highlighting significant studies and tions. Once consensus is achieved, the transactions are added to
findings that are contributing to the development of blockchain the blockchain, ensuring that all participants possess a consis-
into the foundation of Web 3.0. tent and mutually agreed-upon update of the ledger. Consensus
16
mechanism prevents fraud and double-spending attacks and en- ledger system [6]. In a blockchain network, numerous nodes
sures a shared understanding of the blockchain state[19, 94]. collaborate in validating and verifying transactions. A consen-
Proof of Work (PoW) and Proof of Stake (PoS) are the most sus protocol ensures that everyone agrees on the current state of
popular consensus mechanisms in blockchains. PoW requires the ledger [102]. This consensus is reached without the need of
miners to solve complex puzzles, ensuring the integrity and se- a central authority because each node autonomously maintains
curity of the blockchain through computational power. How- a copy of the entire blockchain. As a result, there is no sin-
ever, it is energy-intensive. PoS, on the other hand, selects gle point of control or failure, and data is securely distributed
validators based on their stakes (i.e., tokens) in the network, across the network, thereby eliminating the risk of data manipu-
making it more energy-efficient [95]. Both have strengths and lation, promoting a more equitable and resilient system in Web
weaknesses, and ongoing research explores hybrid approaches 3.0 [103].
to improve scalability and sustainability.
In addition to these mechanisms, there are also some other 5.2.2. Security and privacy
mechanisms, such as Proof-of-Elapsed Time (PoET), Proof- Security and privacy are another crucial part of the sus-
of-Authority (PoA), Proof-of-Authentication (PoAh), Proof-of- tainable development of Web 3.0. The structure and features
Property (PoP), Proof-of-Capacity (PoC), Proof-of-Burn (PoB) of blockchain technology bring a significant boost to security
and Proof-of-Weight (PoWeight) [6]. PoET is a consensus and privacy within Web 3.0. It provides users more power to
mechanism that utilizes a randomized waiting period for val- manage their own personal sensitive data, digital assets, and
idators in a blockchain network to compete for the creation identities. Data is securely kept in an immutable ledger on a
of the next block [96]. PoAh eliminates the reverse hashing blockchain network, guaranteeing that no one can access or al-
function in favor of a lightweight, resources block validation ter it without authorization [19]. Each transaction is encrypted
process [97]. PoA is a more effective consensus technique and connected to the one previous to it, producing an unbro-
that solves the concerns of PoW’s high latency, low transac- ken data chain [104]. This design makes it exceedingly difficult
tion rate, and power consumption [98]. Po-Activity combines for malicious actors to alter the information subsequently and
PoW and PoS to support authentic transactions and consensus minimizes the potential for malicious attacks such as personal
among miners [99]. PoP offers “proof” for blockchain informa- information disclosure and transaction records.
tion structure features, which permits nodes to reduce the quan-
tity of information required for each transaction [6]. PoB, PoC, 5.2.3. Tokenization
PoWeight, and PoL, each introduce a new approach to achieve
Tokenization is another significant concept in the Web 3.0
consensus. Each of these mechanisms has its own strengths and
ecosystem, which uses blockchain technology to encode phys-
weaknesses, and the choice of the consensus mechanism de-
ical or digital assets into unique tokens in a blockchain net-
pends on the specific requirements and goals of the blockchain
work [105]. These tokens are used to represent ownership, val-
network.
ues, and other advantages and features [106]. It also supports
transparency and efficient asset transfer by removing the need
5.2. Roles of Blockchain in Web 3.0 for a third-party and related expenses. Moreover, it is the key
The emergence of Web 3.0, with its notable focus on decen- element of the Web 3.0 ecosystem and has the potential to trans-
tralization, is a key driver in shaping an open and digital land- form ownership, value, and trade in the digital world.
scape. It gives users more power to control their data [6], [15].
Unlike conventional centralized applications where user data is 5.2.4. Digital Identity
controlled by a centralized datastore, blockchain technology en- Digital identity plays a vital role in ensuring secure and
ables secure, trustless DApps that are less susceptible to vulner- trusted interactions in Web 3.0. Online identity manage-
abilities and can execute tasks automatically using smart con- ment faces serious challenges such as security and privacy.
tracts [100]. Embracing blockchain in Web 3.0 yields several Blockchain technology could be utilized to address these prob-
advantages, including heightened security, scalability, trans- lems by offering a decentralized identifying system [107]. It
parency, and efficiency [101]. By incorporating blockchain enables users to keep their identities confidential and decentral-
technology, the risk of information leakage and threats can be ized. Blockchain technology provides cryptographic keys that
reduced, while transaction costs are minimized, and transaction allows web users to access and authorize themselves securely.
speeds are increased [22]. The roles of blockchain technology In this way, web users will have complete control over their
in Web 3.0 are presented in the following subsections. online interactions as well as their digital identities [108].

5.2.1. Decentralization of data and services 5.2.5. Transparency and immutability


Decentralization has been transforming how online systems Transparency and immutability are among the most impor-
work by spreading out data and applications across a network. tant foundations of Web 3.0. Blockchain technology plays a
The primary goal of Web 3.0 is to build an intelligent net- pivotal role in upholding these principles. Transparency ensures
work that does not fully rely on a single authority. Blockchain openness and accessibility of data by providing a shared record
technology plays a significant role in achieving decentraliza- of all transactions and actions, allowing users to independently
tion thanks to its unique consensus mechanism and distributed verify data without relying on intermediaries [6]. This ensures
17
the integrity and provenance of unique digital assets or data se- the authors proposed blockchain-based decentralized storage
cured. On the other hand, immutability guarantees that once in smart cities for Web 3.0. The proposed framework sim-
the data is recorded in the blockchain, it cannot be modified or plifies machine learning by using storage blocks to store the
changed. Blockchain ensures this by using decentralized con- shared database and nodes to handle querying and updating the
sensus methods and cryptographic hashing, making it nearly blockchain ledger. In particular, the users stream and share their
impossible to manipulate data [19]. Together, transparency and locally trained models to decentralized nodes, which are then
immutability bring a secure and trustworthy environment digi- stored as transactions in the distributed ledger. The previous
tal landscape in Web 3.0. round’s node winner creates blocks with transactions using a
dual consensus protocol. Users participating in the blockchain
5.3. Recent Research on the Development of Blockchain Tech- procedure receive training currencies as rewards based on their
nology for Web 3.0 performance. A peacemaker entity ensures protocol compli-
5.3.1. Smart contracts for transactions management in Web 3.0 ance and prevents fraudulent behavior. It claims coins as a re-
Smart contracts are self-executing contracts encoded in com- ward for ensuring protocol correctness, and all these steps are
puter code [9]. When the predefined circumstances are satis- recorded in decentralized storage.
fied, these contracts automatically execute conditions between A similar decentralized data storage for semantic verifica-
parties in a blockchain network [109]. Smart contracts elimi- tion/communication was proposed in [106]. In the considered
nate the third-party, reduce expenses, and ensure secure trans- system, users collect data using wearable devices from Web 3.0
actions on the blockchain network [110]. It provides control applications. This data is sent to the system for encryption.
over users’ sensitive data and privacy in Web 3.0 by offering Edge servers then encrypt the data based on request. The server
a secure and transparent way of storing and executing agree- searches for local or shared knowledge to identify elements in-
ments between devices, and ensuring that information is only volving storage, verification, and communication operations.
distributed to legitimate parties [9]. This keeps users’ data pri- The exchanged data is then actively recorded on the blockchain
vate and secure, reducing the risk of illegal access or manipula- through smart contracts after being retained off-chain by edge
tion. servers. Physical channels are used to transmit the data and
The authors in [2] proposed an effective privacy framework facilitate interaction between data producers and consumers to
that enables IoT devices (i.e., participants) to share data with a avoid overloading data improving interaction efficiency in Web
Social media 3.0 (SMW3) service provider while maintaining 3.0. The authors showed that the proposed framework signifi-
their privacy. In the considered system, the task requirements cantly enhanced semantic communication, data processing, and
from the SMW3 service providers are sent to the blockchain efficiency compared to the existing work.
system via smart contracts. The task requirements are then Moreover, decentralized storage can be used for Web 3.0
broadcast to the participants (i.e., IoT devices). If an IoT de- Metaverse applications that provide reliable, secure, storage so-
vice has relevant data to a request, it accepts the smart con- lutions for data transmitted within virtual worlds and immersive
tract and initiates the training process. Note that the participants environments [35]. For example, the authors in [8] proposed a
only need to share their trained models (i.e., knowledge learned decentralized storage system for Web 3.0 Metaverse applica-
from their data via the training process) instead of sharing tions. In the considered framework, physical world data, such
their raw data with the service providers. The authors showed as videos, are gathered through sensors and uploaded to the vir-
that the proposed framework can protect the privacy of partici- tual space to construct digital avatars and environments. The
pants with various criteria for utility and privacy. Alternatively, virtual world interacts with user data from the physical world
the proposed framework can facilitate secured and automatic and provides feedback. The data is collected from the system
transactions among, participants, SMW3 service providers, and and stored on decentralized storage to ensure privacy, protect
blockchain networks, facilitated by the implementation of smart data ownership, and enable transactions without third parties.
contracts. Smart contracts are used to secure data transactions and verifi-
cation within the blockchain network. The authors showed that
5.3.2. Decentralized data storage management in Web 3.0 the suggested framework boosts the productivity of Metaverse
Decentralized storage is an essential component of Web 3.0 video transmission and effectively ensures secure data storage.
which offers a novel alternative to conventional centralized data
storage systems. In centralized storage, data stored on servers, 5.3.3. Tokenization and digital asset management in Web 3.0
which are controlled by a single entity, sometimes encounter Tokenization and digital assets open up new opportunities
storage and privacy problems [111]. Thankfully, decentralized for developing DApps and new business models in Web 3.0
storage can address this problem by offering secure data stor- by transforming real-world assets (e.g., land, avatars, and vir-
age workflows that dramatically speed up the management of tual goods) into digital tokens on a blockchain network [105].
data [6]. By using cutting-edge blockchain technology, decen- Users can easily purchase, sell, and trade these assets as to-
tralized storage creates distributed networks of nodes that offer kens on a blockchain by eliminating the need for thirdparty. It
several advantages such as redundancy, enhanced security, and also verifies the ownership records, and transaction histories are
resistance to censorship [112]. This distributed decentralized securely preserved and validated, thereby addressing the limi-
nature makes it challenging for attackers to steal data, ensur- tations of traditional information systems such as high transac-
ing a more robust and tamper-resistant system [113]. In [7] tion costs, lack of transparency, and limited access to rewards
18
Internal mechanism External Performance

Cryptography Decentralization

Data Integrity
Scalability

Privacy Protection
Incentive mechanism

Smart Contract Lightweight

Decentralized digital identity Consensus Protocol Economics Non fungible token

Quantum Blockchain

Scalability and
Quantum
Quantum Computing

Efficiency
Communication

Security
Quantum Key
Distribution Quantum Walk

Quantum
Decentralized DI-QKD, MDI-QKD
Hypergraph
automation organization Decentralized finance
Quantum Secure Quantum Random
Digital transform Communication Number Generator Digital transform

Internal mechanism Quantum Identity Quantum


Authentication Consensus
Blockchain External Performance
Quantum
Quantum Communication Blockchain Quantum Block Quantum Block
Verification Propagation
Quantum Quantum Computing
Integration

Enabling Infrastructure of Web 3.0


Resource Efficiency
Scalability Data Integrity
Trading
and Security

Technical
support

Blockchain Computing force networking Distributed data storage

Fig. 9: The proposed quantum blockchain-driven Web 3.0 framework adopted from [114]. The framework includes core infrastructure, quantum cryptography
protocols, and services based on quantum blockchain technology to support a decentralized digital society in the quantum age.

opportunities [115]. Tokenization can address these issues by for the offered rewards, establishing a connection between op-
providing a standardized way of representing information and timizing funding incentives and user reward determination in
data organization in the virtual world [89]. the blockchain network. The authors showed that the proposed
framework can enhance security, and productivity and reduce
Recently, a token-based semantic exchange framework for
costs in the interaction between users and the blockchain net-
Web 3.0 was presented in [116]. The authors used NFTs, ZKP,
work in Web 3.0.
and semantic extraction to enhance the effectiveness of Web
3.0’s interactions. In the considered system, smart contracts 5.3.4. Decentralized identity management in Web 3.0
utilize tokens to play a vital role in facilitating data exchange.
Decentralized identification is another critical component of
Users effectively upload data to off-chain storage using the in-
Web 3.0, which uses blockchain technology to provide a se-
terplanetary file system (IPFS) to access metadata. Smart con-
cure decentralized user-controlled identity ecosystem. In the
tracts and blockchain technology are utilized to semantically
conventional identification system, maintaining and protecting
store data, generate NFT tokens, and distribute them to the net-
users’ digital identities online is a critical issue leading to seri-
work. This enables the exchange of off-chain semantic data and
ous concerns about privacy and data breaches [111]. However,
the profit potential. Subsequently, a Stackelberg game is em-
these challenges can be mitigated using decentralized identity
ployed to optimize semantic pricing strategies. The proposed
to ensure data privacy and security. The users can manage their
solution offers significant improvements to trust, transparency,
digital identities using decentralized identities without elimi-
and efficiency in Web 3.0. The framework is examined through
nating third-party service providers [15]. It enables the users
an urban planning case study and proven to be efficient and ef-
to create and maintain their digital identities, as well as control
fective.
their data and privacy. These identities are protected using se-
A similar token-based incentive mechanism for the Meta- cure keys and can be potentially used to identify users across
verse Web 3.0 application was proposed in [117]. However, platforms and services with accessible identity verification and
in this work, the authors focused more on the incentives entities authentication [118].
driving the development of the blockchain network. In particu- In [107] the authors proposed a decentralized-based user
lar, the blockchain network evaluates users’ ability to generate identity framework for Web 3.0. The proposed framework es-
incentive resources and provides contract opportunities to the tablishes a one-to-one link between decentralized identity ac-
users. Once the users accept the offer, the smart contract ana- counts (i.e., souls) and users, effectively representing human
lyzes user data, categorizes incentives, and distributes them to interactions and ensuring user privacy and anonymity. In par-
the users based on their performance. Furthermore, a reward ticular, the considered framework verifies users using facial
classification system guides the selection and terms of trade recognition and then authenticates users with ZKP. The authors
19
Table 5
Summary of Blockchain-Based Approaches for Web 3.0

Ref. Application Research Problem Solution Result


[2] Social Media Data privacy concerns while shar- Smart contract to ensure data pri- Enhanced data privacy, integrity, and efficiency
ing data vacy during data sharing compared to existing work by 97.55%.
[7] Smart City Efficient data sharing for training Store locally trained models as Enhanced data quality, performance, and storage se-
AI using IoT data in Web 3.0 transactions; participants receive curity resulting in high accuracy (up to 95%) and
currencies as rewards for their per- minimal learning loss (up to 10%).
formance, with a peacemaker en-
tity ensuring protocol compliance.
[8] Metaverse Ensuring privacy, data ownership, Store data in blocks to ensure pri- Improved data privacy, ownership, and Metaverse
and decentralization for a storage vacy and protect data ownership; performance for 360◦ video streaming compared to
system in Web 3.0 enable transactions without third existing work.
parties using smart contracts for
secure data transactions and veri-
fication.
[106] General Ap- Addressing semantic verification Use edge servers to encrypt and Enhanced semantic communication/verification and
plications in various Web 3.0 scenarios verify data; smart contracts for data processing efficiency compared to existing
recording and accessing data. works.
[107] User Identity Addressing user identity issues in Zero-Knowledge Proofs (ZKP) for Reduced time for verifying users’ identities effec-
Web 3.0 users’ identity verification tively (up to 126 ms).
[114] NFT and Ensuring security and privacy of Quantum signatures for user iden- Enhanced security and privacy of Web 3.0 user iden-
Payment users’ identities in quantum-based tity verification; quantum NFT to- tities.
Security blockchain services kens for asset ownership.
[116] Finance Addressing gaps in blockchain ZKP for semantic verification and Enhanced data efficiency and performance in Web
and semantic communication effi- Stackelberg game for semantic 3.0.
ciency in Web 3.0 trading.
[117] Metaverse Addressing Web 3.0 data process- Contract-theoretic incentive mech- Enhanced network utility, reducing overall cost util-
ing costs and associated challenges anism to reduce service costs. ity by 54.52% and 62.5%, respectively.

Meaning
utilized a consensus mechanism to encode facial recognition
results and employ linkable ring signatures for user-account
Sender
mappings within decentralized identity. The system is com-
pletely decentralized, relies on smart contracts for verification, Experience

Context
and is tested on a practical blockchain network. The result illus- Receiver
Concept
trated that the proposed framework, incorporating decentralized
identity, offers a privacy-preserving solution enabling users to
es

re

maintain accountability for their accounts. A similar decentral-


liz

fe
o

rs
mb

Experience
to
sy

ized identity concept is proposed in [114], which is illustrated


in Fig. 9. The proposed framework comprises infrastructure, Symbol Object
stands for
"Juaguar"
cryptography protocols, NFTs tokens, and quantum blockchain "ジャガー"
services. In particular, in the considered system, data is stored "Báo đốm"

in distributed nodes, while cryptography ensures the security


and privacy of users’ identities. Users establish ownership as- Fig. 10: The meaning of meaning: connection between language and
thought [120].
sets through digital signing and NFT tokens. Quantum signa-
tures verify user identities, enabling participation in informa-
tion sharing and earning rewards using quantum blockchain to- future, it is also necessary to resolve governing inconsistency
kens. The authors demonstrated that the framework can effec- and privacy issues [119]. Overcoming these challenges will
tively deliver both anonymity and sustainability for the future be crucial to unlocking the full potential of blockchain in Web
decentralized society. 3.0. Researchers are continuously investigating several areas of
blockchain technology, including smart contracts, decentralized
5.4. Insights and Summary data storage, tokenization, and decentralized identity manage-
ment, to improve the functionality and capabilities of Web 3.0.
Blockchain technology will play a key role in the future de-
A summary of the blockchain-based approaches for Web 3.0
velopment of Web 3.0 due to its outstanding features which
applications is presented in Table 5.
are especially appropriate for Web 3.0. However, blockchain
also faces several challenges when deploying in Web 3.0 plat-
forms. As existing blockchain networks fail to effectively man- 6. The Semantic Web Technologies
age high transaction volumes, scalability is still an important
challenge [6] [53]. For wider adoption, interoperability be- The Semantic web technologies are an indispensable part of
tween various blockchains and conventional systems is needed. Web 3.0 development. Over twenty years ago, Sir Tim Berners-
To create a reliable and resilient blockchain ecosystem in the Lee presented the semantic web paradigm as a successor vi-
20
6.1. Semantic Web Technology Stack
User Interface and Applications
Recall that semantic web technologies aim to provide
Trust
machine-readable data so that machines can easily find and
process data. In practice, this is a very challenging task.
Proof
For instance, the information “Beau Doe has a homepage
http://www.example.com/beau” can be easily understood by a
Unifying Logic human, but it is not an easy job for a machine. To do so, se-
mantic web technologies are developed to describe information
Ontologies: Rules:
in a structured and decentralized way. In general, the knowl-
Querying: OWL RIF/SWRL

Cryptography
SPARQL
edge representation in the semantic web can be constructed
Taxonomies: RDFS from low to high levels [120]. The first level defines an object,
e.g., web resource using characters and syntax formats, e.g.,
Data Interchange: RDF Extensible Markup Language (XML). This level corresponds
to the two bottom layers of the Semantic Web stack, as shown
Syntax: XML in Fig. 11. Then, the knowledge of the object (i.e., description)
is given in the second level, corresponding to the third layer in
Web Platform
Fig. 11. Finally, the third level, i.e., entire worlds, links knowl-
Identifiers: URI Character sets: Unicode
edge among objects using various technologies from different
types, such as Taxonomies, e.g., Resource Description Frame-
Fig. 11: The Semantic Web stack [122]. work Schema, Ontologies, e.g., Web Ontology Language, and
Rules, e.g., Rule Interchange Format. Generally, the semantic
sion to Web 2.0 [121]. This may lead to confusion between the web is developed based on this principle.
semantic web, and Web 3.0. They are sometimes used inter- The W3C, which is in charge of semantic web standardiza-
changeably; however, the semantic web is only a critical tech- tion, proposes the semantic web stack that groups the SWT into
nology used in Web 3.0 (in addition to other enabling technolo- different layers, as shown in Fig. 11. In this stack, a layer uses
gies like blockchain, AI, and IoT). Instead of explicitly pre- services from its lower layer and provides services to its upper
senting information in specific textual and graphical forms, the layer. As such, each layer is built based on its lower layer, and
semantic web technologies aim to provide meaning/facts of in- it tends to be more complex than its lower layers.
formation regardless of how it is presented by symbols. For ex-
6.1.1. Web platform and syntax layers
ample, the word “jaguar” can be represented by different sym-
These first two layers build the foundations for semantic web
bols in different languages, as shown in Fig. 10. Moreover, the
technologies. The web platform (the lowest layer) defines the
word can refer to various objects, such as animals, cars, and
web resources uniquely based on the Uniform Resource Identi-
versions of the operating system. This ability to express and
fier (URI) and a character set, e.g., Unicode. Then, the syntax
understand multiple meanings of words allows the web to do
layer defines the syntax/format of the data according to the Ex-
more meaningful work. To that end, the semantic web tech-
tensible Markup Language (XML). On the other hand, XML
nologies aim to provide intelligent data that machines can eas-
gives syntaxes for its upper layers, e.g., the Data Interchange,
ily and automatically search, retrieve, and process [122]. In
to describe information. Note that the bottom two layers’ tech-
other words, the goal of semantic web technologies is to make
nologies, e.g., URI, Unicode, and XML are well-defined and
web data machine-readable and define how knowledge is repre-
are the foundation for the semantic web. Thus, this stack shows
sented so that humans and machines can work in cooperation.
that the semantic web aims to extend (not replace) the current
In practice, enabling automatic machine processing can be web version.
accomplished in two ways [122]. The first approach aims to
build a smarter machine by teaching the machine to infer the 6.1.2. Data interchange layer
meaning of data, possibly accomplished by AI-based methods, Although XML is well-known for providing web document
such as natural language and image recognition. The second format, machines cannot understand it. As such, the Re-
approach, based on the semantic web technologies, focuses on source Description Framework (RDF) is proposed as a core
building smarter data by expressing data and its meaning in a data representation format for the semantic web [122]. The
standard format that machines can automatically “read”. In ad- RDF leverages URI to identify the resources (e.g., objects
dition, the semantic web technologies also enable decentraliz- and subjects on the web) and describe them in terms of their
ing data across the network. Thus, the semantic webs are ex- predicates (i.e., properties and values). Thus, the RDF can
pected to transform the web from the “web of documents” e.g., be considered as a simple language to describe things, e.g.,
Web 1.0 and Web 2.0 to the “web of data” [123]. This section expressing relationships among web resources. In partic-
first presents fundamental technologies supporting the seman- ular, RDF represents information by a triple, i.e., subject-
tic web, called Semantic Web Technologies (SWT). Then, the predicate-object, that forms a graph of data [124], as shown
state-of-the-art in SWT is surveyed. Finally, the current chal- in Fig. 12 (a). For example, the RDF triple of a state-
lenges of SWT are discussed. ment “Beau Doe has a homepage www.example.com/beau”
21
Subject Object sent knowledge, to enable the classification of concepts [120].
URI Predicate URI \ Lireral Specifically, the technologies of this layer, e.g., the RDF
Schema (RDFS), supply a vocabulary for describing classes and
URI properties of RDF-based resources. For that, the RDFS is also
called RDF Vocabulary Description Language. Let us return to
(a) The RDF triple (statement): Subject-Predicate- the previous examples illustrated in Fig. 12, Beau Does can be-
Object [124]
long to the person class, the predicate can be the property class,
Subject Object and both are sub-classes of the resource class. In RDFS, the
http://www.example.org/beau/ resource class is the foundation of all other classes.
Predicate http://www.example.org/beau
contact.rdf\#beaudoe

6.1.4. Ontologies and rules layers


http://xmlns.com/foaf/0.1/homepage
The semantic web technologies aim to construct a global
(b) The RDF triple of “Beau Doe has a home- database, and thus this database may consist of partial or even
page http://www.example.com/beau” contradicting information. For example, the word “Jaguard”
can be a type of animal, but it can also be a car brand or a ver-
Subject Object
sion of the Macintosh operation system, as shown in Fig. 10. To
http://www.example.org/beau/
Predicate Doe address this problem, the ontology layer aims to define a spe-
contact.rdf\#beaudoe
cific domain of discussion by extending the taxonomy layer’s
vocabulary. As such, this layer takes responsibility for defin-
http://xmlns.com/foaf/0.1/family_name
ing rules and knowledge about which relations make sense and
(c) The RDF triple of “Beau Doe has are allowed [120]. Here, an ontology language is the explicit
family name Doe” representation of concepts and their interrelations [125]. For
instance, the Web Ontology Language (OWL) can be used to
Fig. 12: The RDF triple representation.
define a specification of a shared conceptualization, e.g., an ab-
<rdf:RDF stract model of the domain, identified relevant concepts, and re-
xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
xmlns:foaf="http://xmlns.com/foaf/0.1/" lations [126]. To support rules beyond the OWL and RDFS, the
xmlns="http://www.example.org/beau/contact.rdf#">
<foaf:Person rdf:about=
semantic technologies also consist of rule languages, which are
"http://www.example.org/beau/contact.rdf#beaudoe"> used for expressing web rules that computers can execute. Cur-
<foaf:homepage
rdf:resource="http://www.example.org/~joe/"/> rently, the Rule Interchange Format (RIF) and Semantic Web
</foaf:Person>
</rdf:RDF> Rule Language (SWRL) are emerging standards at this layer.

6.1.5. Querying layer


Fig. 13: The RDF/XML representation of “Beau Doe has family name Doe”.
The querying layer aims to obtain information from RDF
data, RDFS, and OWL ontologies. For that, W3C proposes the
is presented in Fig. 12 (b). Here, all elements of this triple
Simple Protocol and RDF Query Language (SPARQL), which
are resources with URI. Specifically, the first resource with
is analogous to the Structured Query Language (SQL). The ma-
URI www.example.org/beau/contact.rdf#beaudoe is a subject
jor difference is that while SQL uses string, e.g., the name of
that identifies Beau Doe. The second resource, i.e., “has
a table or column for querying data, SPARQL utilizes RDF
a homepage”, with URI www.xmlns.com/foaf/0.1/homepage
triples and resources. In addition, SPARQL is also a protocol
is the predicate pre-described in the XML format at the
for accessing RDF-based data.
URI. The third resource is Beau Doe’s homepage with URI
www.example.org/beau. Note that in an RDF triple, all elements
6.1.6. Unifying logic and other top layers
(i.e., subject, predicate, and object) must be resources uniquely
The unifying logic layer is essential to guarantee the reliabil-
identified by URI, except the object that can also be defined
ity of data interchange between Query, Ontology, and Rule. The
by a literal, which can be a string, number, or date. As shown
Cryptography Layer is a vertical layer offering cryptography
in Fig. 12 (c), the object is a literal type, i.e., a string “Doe”,
techniques, e.g., digital signatures, to validate data sources, thus
which does not exist separately with this information. RDF
ensuring reliable inputs. To guarantee that the obtained knowl-
triples can be described using XML format, namely RDF/XML,
edge can be trusted, the Proof and Trust layers are proposed to
as shown in Fig. 13. Other syntaxes, e.g., Terse RDF Triple
force all semantics and rules to be complied with before for-
Language (TURTLE) or Notation 3 (N3), can also be used for
warding this information to the user interface and applications
describing RDF triples [124].
layer. To date, semantic web technologies have been widely ap-
plied in practice, such as building Linked Data [127, 128, 129]
6.1.3. Taxonomies layer and Knowledge Graph [130]. However, the Web 3.0’s main
This layer extends the RDF by defining how to model goal, i.e., providing a data framework for cooperating between
groups/classes of resources and the relations among these re- machines and humans, is still not achieved due to immature
sources. In other words, the Taxonomy layer adds more vocab- technologies [131]. For example, the Unifying Logic, Proof,
ulary, i.e., definitions of concepts and relations used to repre- and Trust layers are not well-defined yet [124]. We will further
22
discuss the state-of-the-art and challenges of the semantic web a specific portion of the dataset including class labels, a com-
technologies for Web 3.0 in the following subsections. bination of the MLP model and additional training extracted
final features helpful for service clustering. Accordingly, us-
6.2. State-of-the-art in Semantic Web Technologies ing the last preprocessed features, the spectral clustering algo-
rithm was then employed to achieve optimal service clustering
6.2.1. Managing complexity and diversity
through the dataset’s characteristics. Another study introduced
Combining current web services to accomplish user seeks
the DeepWSC framework, which enhances web service clus-
for specific functionalities while maintaining the highest pos-
tering by combining service composability and deep semantic
sible quality of service (QoS) is involved with web service
features [134]. As conventional approaches to web service clus-
composition. Evolutionary computation (EC) methods are em-
tering have limitations, such as their inability to capture the
ployed to address the complex computational nature of this
semantic meaning of services and neglect of service compos-
problem. Moreover, for each individual combination demand,
ability, DeepWSC can overcome these limitations. Integrating
these methods can detect compound services that offer the qual-
deep learning techniques, it extracts nuanced semantic prop-
ity of semantic matchmaking (QoSM), which is a near-optimal
erties from service representations. Experimental evaluations
functional quality method, or non-functional quality [132].
demonstrate DeepWSC’s superior performance, surpassing ex-
However, as the number of composition requests from users
isting techniques in various validation indexes. Beyond its de-
continues to rise rapidly, addressing one demand at a time is
piction, DeepWSC categorizes web services into clusters based
no longer efficient enough. This way, the authors in [132] em-
on functional descriptions and relationships, fostering compos-
barked on a groundbreaking study to address the challenge of
ability and functional diversity. This approach aims to cre-
managing diverse service composition demands as a collective
ate a refined system, enabling seamless interactions and intri-
problem [132]. Utilizing an estimation of distribution algo-
cate functionalities through the combination of diverse web ser-
rithm (EDA), they put forward a fresh approach based on a
vices.
permutation-based multi-factorial evolutionary algorithm (PM-
FEA) called PMFEA-EDA, to solve this problem. Additionally, 6.2.4. Efficient task cooperation and safety check
they introduced a technique for sharing knowledge across var-
To enhance cooperative multi-unmanned ground vehicle
ious service composition requests, along with the development
(UGV) systems, a semantic-centered cloud control framework
of a new sampling mechanism. This mechanism of sampling
was introduced in [135]. This framework involves the imple-
aims to enhance the likelihood of service composition identi-
mentation of semantic modeling using the semantic network to
fication with superior quality in both single-tasking and multi-
establish an integrated design structure for tasks and environ-
tasking scenarios.
ments. Additionally, with a combination of semantic web rule
language (SWRL) and deep learning, a scene semantic infor-
6.2.2. Amalgamating content and structure mation retrieval technique was employed to achieve task-level
The sparse and limited features found in web page sum- cloud task cooperation and scene understanding. One funda-
maries impact the web service’s clustering performance. More- mental technology that plays a pivotal role in achieving the
over, the clustering process is further complicated by the in- goals of Web 3.0 is blockchain. Blockchain facilitates transpar-
fluence of data sparsity and noisy features. To solve this prob- ent recording and decentralized content and ensures enhanced
lem, a clustering Web service called spectral clustering was pro- trust and security. Nevertheless, as the amount of on-chain
posed in [133]. The authors combine the structured data and recorded content expands rapidly and the user base continues to
descriptive documents extracted from the service relationship grow, the resource consumption associated with computing and
network, this clustering web service can use unified content, storage escalates. This poses affordability challenges for users
structural information, and semantic representation (UCSI-SC) due to increased operational costs. A promising approach is to
to improve the performance. Using Doc2vec and the service re- focus on the analysis of semantic information in content, allow-
lationship network to learn structural-semantic information, can ing for the precise conveyance of desired meanings while mini-
extract content-based semantic details from descriptive doc- mizing resource consumption. Fig. 14 demonstrates a compre-
uments. By pre-existing training of a service classification hensive framework that was proposed to enable wireless edge
model, the method enables the amalgamation of content and intelligence in the context of Web 3.0 [106]. As is observed in
structural-semantic information into cohesive features. Finally, Fig. 14, the platform comprises six important elements aimed
the unified features are employed for spectral clustering to clus- at facilitating the exchange of semantic demands. To imple-
ter Web services, achieving significant improvements in preci- ment interactions within Web 3.0 ecosystems while ensuring
sion [133]. both off-chain and on-chain service security, a proof of seman-
tic mechanism based on Oracle technology was introduced. Ad-
6.2.3. Optimizing web service ditionally, an adaptive sharding mechanism based on deep rein-
The structural characteristics of the service network and the forcement learning, implemented on the Oracle, was designed
semantics of service content can be combined for large-scale to enhance interaction efficiency and enable Web 3.0 frame-
service management. This way, to acquire initial features works to effectively address diverse semantic requests [106].
from service network relationships and service descriptions, Another study presented a semantic method to combine
two newly introduced models were employed. Moreover, using diverse data within a building information modeling (BIM)
23
Semantic Information Producers Semantic Information Consumers
Minimizing user data overload
Maintaining service security
Enhancing effectiveness

User Layer User Layer

Transmitting new contents Environment Transmitting new contents

Service Layer Service Layer

Processing new contents


Processing new contents

Pragmatic Layer
Pragmatic Layer
Semantic Channel Circulating semantic
Circulating semantic ecosystems
ecosystems

Semantic Layer Semantic Layer

Sharing semantic information Oracle Sharing semantic information

Blockchain Layer Blockchain Layer

Encoding and decoding channels Channel Encoding Physical Channel Encoding and decoding
channels

Communication Layer Communication Layer

Fig. 14: The framework proposed in [106] is based on the unified blockchain-semantic and enables Web 3.0.

ecosystem. This approach aims to enhance safety checking au- 7. 3D Interactive Web Technology
tomatically through the utilization of SPARQL-based reasoning
techniques [136]. The approach involves converting them into 7.1. Background of 3D Interactive Web Technology
integrated ontology instances, extracting threats from BIM and The emergence of 3D interactive web technology, sometimes
sensor information, and developing interconnected ontologies known as “Web3D” has brought in a new era of engaging and
for subway construction safety checking. In this way, the au- dynamic online experiences for users. It enables web users
tomation of converting text-based rules within checking rules to engage with immersive and dynamic 3D content. Further-
empowered by SPARQL-based can be achieved. As a result, more, it creates incredible new opportunities for online cre-
the proposed platform can improve automated safety checking ativity, communication, and engagement through the use of 3D
and knowledge sharing. images, by real-time interactivity [138]. The conventional 2D
web has limited contents, such as texts, photos, and videos,
6.3. Insights and Summary Therefore, the 3D interactive web offers direct access to im-
Semantic web technologies play a vital role in Web 3.0 for mersive worlds through web browsers by integrating Hyper-
a range of capabilities. These technologies can facilitate the text Markup Language version 5 (HTML5) www.html.com,
seamless integration of web services, ensuring high-quality ser- Web Extended Reality (WebXR) (www.immersiveweb.dev),
vice composition. They can cluster and manage web services Three.js (www.threejs.org), Babylon.js (www.babylonjs.com),
effectively, improving discoverability and utilization within PlayCanvas (www.playcanvas.com), and Extended 3D Tech-
Web 3.0 ecosystems. Semantic modeling and scene under- nology (X3D) (www.web3d.org). These cutting-edge technolo-
standing can enhance cooperative systems like multi-unmanned gies enable the 3D interactive web to be easily accessible on a
ground vehicle (UGV) systems for intelligent decision-making. wide range of platforms and devices. Fig. 15 illustrates a high-
Resource consumption challenges in Web 3.0 can be addressed level design for a 3D interactive web platform. The design in-
through semantic information analysis, reducing resource us- cludes a web editor, game assets, and semantics to assist in the
age while ensuring secure interactions. Additionally, heteroge- development of innovative 3D cultural worlds. This design thus
neous data integration and automated safety checking can be simplifies the development of interactive experiences and exhi-
achieved using semantic web technologies, improving knowl- bitions by curators and non-programmers who lack program-
edge sharing and real-time monitoring. Table 6 summarizes the ming expertise.
current state-of-the-art semantic web technologies tailored for Web graphics library (WebGL) enables the representation of
Web 3.0. It provides a condensed overview of the advance- interactive 3D graphics, visualizations, games, and virtual re-
ments, methodologies, or key findings in the field of semantic ality experiences directly in web browsers. It is crucial for
web technologies relevant to the context of Web 3.0. building engaging virtual worlds where users can participate in
24
Table 6
Summary of the State-of-the-Art in Semantic Web Technologies for Web 3.0

Ref. ApplicationResearch Problem Solution Result


[106] General Secure data storage and efficient in- Implementing a unified blockchain-semantic Improved information interaction enhances
Web formation interaction ecosystem framework with adaptive deep re- efficiency, reduces latency, and facilitates the
Service inforcement learning-based sharding for re- diversity of Web 3.0 services.
source optimization
[132] General Web service composition problem Developing a new sampling strategy to en- The suggested approach surpasses two
Web hance the likelihood of finding top-quality advanced single-tasking methods and
Services service compositions in both single-tasking one recent multi-tasking evolutionary
and multitasking environments computation-based technique in discovering
superior solutions.
[133] General Functional affinity characterization Utilizing Doc2vec for content and network The proposed approach boosts precision by
Web challenges in complex web service representation learning for structural seman- 4.78% and recall by 5.4% compared to the
Services networks tics, enhancing web service clustering state-of-the-art method.
[134] General Clustering web services Developing a heuristic framework that DeepWSC excels in multiple metrics, sur-
Web merges deep semantic features from ser- passing state-of-the-art approaches for im-
Service vice descriptions with composability fea- proved web service clustering on 8,459 real-
tures from invocation relationships, creating world services.
integrated features for web service clustering
[135] AutonomousHeterogeneous cooperative au- Combining ontology, deep learning, and This work demonstrates a feasible way to re-
Un- tonomous unmanned systems SWRL rules for semantic-centered cloud alize the cognitive ability of autonomous un-
manned control in autonomous unmanned systems manned systems at the task level.
System

3D online experiences. The primary purpose of WebGL is to immerse themselves in virtual environments where they inter-
connect JavaScript and the computer’s GPU, allowing for rapid act with virtual items and explore in real-time by allowing 3D
real-time processing of complex 3D scenarios [139]. It uses experiences in web browsers [144]. This thus can fill the gap
custom shader programs written in OpenGL Shading Language between the virtual and real worlds, giving users personalized
(GLSL) to control how 3D objects look at the final output. It and exciting experiences in the Web 3.0 era. In short, the roles
also provides users to navigate and interact with a virtual world of 3D interactive web technologies in Web 3.0 are:
to explore objects and environments in real-time with 3D mate-
rials, that were previously restricted to the traditional web.
• Enhance web users’ experiences using 3D visuals, VR/AR
Fig. 16 illustrates the WebGL technology utilized in the 3D
headsets, haptic devices, and recognition sensors [145].
web platform. In particular, the figure consists of three lay-
These technologies have become essential for developing
ers, each layer playing a crucial role in enabling the creation
interactive worlds with an atmosphere of reality and im-
and rendering of 3D graphics in web applications. On the top
mersion. It improves the web experience for all users by
layer, the middleware layer plays a pivotal role by providing
making it more interesting and realistic.
developers with essential tools and libraries like three.js. This
layer acts as an interface, allowing developers to focus on cre-
ating 3D experiences. Moving to the middle layer, WebGL API • Enable the creation of new applications and services that
provides a rich JavaScript middleware ecosystem which is used make effective use of the web’s spatial and semantic fea-
to bridge the gap between the middleware and the rendering en- tures. These applications include virtual museums, gam-
gine to ensure an enjoyable browsing experience [141]. Finally, ing platforms, e-commerce solutions, real estate inter-
at the bottom layer, WebGL utilizes OpenGL, for translating faces, tourism platforms, and more [146]. Leveraging
high-level requests from the WebGL API into hardware-specific these semantic features enables the development of dy-
commands, ensuring 3D content across a variety of devices and namic and engaging experiences, providing users with a
systems seamlessly [142]. The next sub-section delves into an diversified and immersive online environment across sev-
exploration of the roles of 3D interactive web technology, and eral domains and industries.
how this innovative technology is revolutionizing user experi-
ences in Web 3.0. • Boost user and community involvement across a variety
of platforms and devices. Shared experiences and seam-
7.2. The Role of 3D Interactive Web Technology in Web 3.0 less engagement can be achieved using 3D avatars, social
The 3D interactive web is an essential component of the im- networks, live streaming, and related technology [147].
plementation of Web 3.0, creating its environment while ren- These technologies are essential to building a digital world
dering it a reality. It has a huge influence on the web’s growth where individuals can communicate, work together, and
toward Web 3.0, which is designed to be more immersive, in- develop connections anywhere within any device. Incor-
telligent, and decentralized [143]. Web 3.0 users are expected porating such components makes online engagement more
to experience dynamic and exciting information which is effi- dynamic and exciting, encouraging an atmosphere of com-
cient and can be achieved using 3D interactive web. Users can munity and shared engagement.
25
Server End User

2.5 Oculus Plugin VR


2.6 HCI Plugin
Curator Windows +
2.7 Tango Plugin Oculus (Binary)
2.1 Compiler

2.8 Analytics
Devices
1. Web Browser Plugin

Web Browser

1.1 Web Editor


2.2 Sences, 3D Models, DB of linked resources

AR
Structure sensor
(Binary)
2.3 Parser
1.2 Reader-Writer 2.4 Semantic Module

External
Web-sites
3.1

Fig. 15: A high-level design for a server-based 3D interactive web platform for 3D cultural worlds [137]. The design is intended to facilitate the building of new
3D cultural worlds and comprises a web editor, gaming assets, and semantics, making it easier for curators and non-programmers to develop interactive experiences
and exhibitions without requiring extensive programming knowledge.

Content Recently, the authors in [149] proposed an X3D ontology tech-


Content Download
JavaScript, HTML, CSS, etc.
from the site nique for 3D interactive web. The considered framework com-
JavaScript middleware
bines ontologies and semantic technologies with 3D model-
The WebGL API
supports a robust ing. In particular, the 3D content ontology contains information
JavaScript middleware
Middle-ware ecosystem
about specific 3D models and scenes, including dataset types,
provides accessibility AFrame
Babylon.js
encoding standards, and activities. The framework focuses on
creating ontologies to capture semantic information for enrich-
HTML5 Unity WebGL ing 3D models. It also incorporates mechanisms for storing,
Reliable WebGL relies
on work by browsers WebGL 3D engine and querying, and semantic 3D data, enabling advanced search se-
others mechanism in
CSS JavaScript browsers mantic capabilities, interoperability, and data sources. The au-
thors highlighted that the proposed framework presents a new
opportunity for the future of semantic 3D content. A similar
Native OpenGL is X3D data model was proposed in [151] for smart cities. In the
used by WebGL.
Khronos service considered framework, the XML model is used to develop a
providers
3D virtual atmosphere for healthcare applications. In particu-
Fig. 16: WebGL technology is used in 3D web platforms [140]. On the top lar, X3D and Hanim are used to represent the 3D virtual world
layer, middleware provides accessibility for the developers (e.g., three.js li- and the 3D avatar. The 3D environment is interconnected with
brary), while WebGL API provides a powerful foundation for a rich JavaScript real-time GPS data, and the avatar is monitored based on its
middleware ecosystem. At the second layer, the browser provides a WebGL 3D
engine with other mechanisms. At the bottom layer, WebGl uses native services GPS location. The data model is then defined with XML and
(i.e., OpenGL) a cross-platform for producing 3D. handled with an X3D browser. The authors showed that the
proposed framework can be used to observe the user’s health
data in real life.
7.3. Recent Development on 3D Interactive Web Technology
7.3.1. Extended 3D technology (X3D) for 3D interactive web 7.3.2. The 3D model for 3D interactive web
The development of the 3D web encouraged an evolution in The use of 3D models in 3D interactive web brings numerous
the realm of virtual reality and revolutionized the way users advantages in generating realistic visuals in AR and VR appli-
use the web. Users can immerse themselves in a full 3D cations. However, the advancement of AR and VR technologies
revolutionary reality using cutting-edge technology like VR has brought challenges for existing WebGL 3D JavaScript li-
and AR [148]. In conventional online systems, the users en- braries, such as data transmission, limited mobile browser com-
counter challenges such as interoperability, limited interaction, putation, and latency in handling 3D models [152]. Leveraging
and scalability [149]. However, these challenges can be miti- advancements in rendering 3D technologies and optimizations
gated using ontology-based 3D semantic knowledge represen- can help reduce latency and ensure the smooth rendering of
tations which enable interoperability, improve 3D models, en- 3D models and animations. As a result, the authors in [153]
hance user interaction, and handle 3D data efficiently [150]. proposed a separate animation data for Web3D. In the consid-
26
ered framework, the data model is divided into animation and ferent devices, (i.e., phones and tablets), gives an immersive
topological sequences enabling the efficient loading of essential experience. In particular, the authors used WebGL and WebXR
data during the initial rendering. The mesh model is exported JavaScript libraries, for interactive 3D content without using
in JD file format, and data is stored separately based on an- any web UI/UX components. The WebGL engine is used to de-
imation tracks. A multi-granular model support is employed velop 3D medical object assets, scenarios, and extended reality
for continuous animation support. The Three.js techniques are components. Users can interact with the 3D animated objects
optimized to accomplish asynchronous uploading data and on- using devices to ensure an immersive experience. All medical
demand rendering that significantly reduces the initial loading scenarios are stored in a database using WebXR dynamically
time and improves efficiency, especially in interaction scenar- on the user’s device. Users can access the environment individ-
ios with multiple animations. The authors demonstrated that ualized to their device for an enhanced user experience. The
the proposed optimization method reduces the latency in model authors showed that the proposed method potentially incorpo-
data transmission and improves complex interactive scenarios. rates interactive elements for an engaging educational experi-
Another 3D model was proposed in [154] for urban planning. ence with accessibility, and cost-effectiveness.
In the considered framework, the authors proposed a dynamic Another WebXR-based framework was proposed in [161] for
platform for 3D building which is essentially made up of user learning in Web3D. In the considered framework, the system’s
interaction, automation, and real-time modeling. The 3D mod- objectives are achieved by constructing functional stacks us-
eling is efficiently performed by an object detection network. ing three layers. In particular, the learning system uses 3D
The Convolutional Neural Network (CNN) was implemented interactivity on a screen, with movable 3D models and audio
to develop the framework. Performance evaluation shows that recordings, to enhance accessibility. The mobile VR inter-
the proposed framework can offer the 3D modeling community action enables users to discover a 3D space by moving their
cost-effectiveness, and enhance user interaction. mobile devices. The framework incorporates AR interaction
through Simultaneous Localization and Mapping (SLAM), al-
7.3.3. HTML5 for 3D interactive web lowing learners to load a 3D object view and utilize their mobile
HTML5 is another core technology that plays a vital role in device camera to scan a surface for AR. For rendering XR ma-
3D interactive web. It enables developers to build spectacu- terial, A-frame VR and Google Model-viewer have been em-
lar 3D interactive experiences directly in the browser with the ployed. The framework uses a client-server model, with server-
advent of WebGL (i.e., a JavaScript API for displaying 3D vi- side and reusable client-side functions. The system runs on a
suals) in the browser. HTML5 can address challenges in 3D Windows server and includes two databases for user interac-
online learning by offering individuals a dynamic and engag- tions. The authors demonstrated that the proposed framework
ing experience. Due to security issues and the demand for can improve the learning system in the Web3D area. Moreover,
multi-device user experience, HTML5 replaced Adobe Flash the authors in [155] proposed a similar client-based cloud-edge
for online learning platforms [156]. Therefore, the authors pro- architecture for Web3D. The authors concluded that their pro-
posed an HTML5-based 3D animation framework for Web3D posed framework will address large-scale 3D scene challenges.
in [157]. The authors explored a human-centered online sys- Fig. 17 illustrates the proposed cloud-edge-client framework.
tem to control engineering experimentation. In the considered The framework explores the challenges and opportunities of us-
framework, HTML5 is used for controlling the immersive and ing point cloud data to create 3D digital twins of real-world
interactive learning environment to ensure security and design- scenes and present them in immersive and interactive ways
ing the graphical user interface. In particular, by replacing the using XR technologies. Furthermore, it also addresses ineffi-
outdated flash plug-in with HTML5, compatibility, and acces- ciencies in real-world industrial use and improves perception
sibility are greatly enhanced, creating a way for learners to of scenes and comprehension, 3D model generation, and large
access the system comfortably. The authors highlighted that data analysis and presentation intelligence.
the proposed framework enhances the seamless integration of
3D features, real-time interaction, and online learning experi- 7.3.5. Unity 3D for future 3D interactive gaming
ences/opportunities in 3D interactive web. Unity 3D is another important technology in 3D applications
because it provides an efficient and versatile platform for gener-
7.3.4. WebXR for 3D interactive web ating immersive visual online experiences. Its extensive num-
WebXR is an important element in 3D interactive web, which ber of tools and capabilities empowers developers to bring their
provides a standardized API for immersive experiences that creative ideas into action and provide compelling 3D material
are easily accessible through web browsers. It has trans- to consumers. One of the key challenges it can solve is cross-
formed how we experience and engage with 3D information platform compatibility, allowing developers to create 3D pro-
on the web, linked with many devices and platforms. We- grams that can operate on a number of devices and operating
bXR can help tackle problems such as performance, accessi- systems. Therefore, the authors in [159] proposed a 3D ap-
bility, and compatibility in the 3D web by offering a standard plication for health monitoring and implemented a web-based
approach to developing immersive experiences that function framework for gait rehabilitation and training exercises using
across many devices and platforms [160]. Therefore the authors Azure Kinect and 3D features. The Azure Kinect camera cap-
in [158] proposed a WebXR-based health application frame- tured images that were analyzed by Microsoft’s embedded AI
work in Web3D. The considered framework, developed on dif- algorithm to track human body joints. 3D interface utilized
27
Application
upload
Presentation and
discard Perception and visual analysis
Data modeling
collection

Real word scenes XR presentations


Point clouds 3D models

Point clouds based 3D XR presentations of 3D Cloud-edge client integrated data


scene perception and modeling scence and information visualization analysis

i. Collaborative computing paradigm i. XR rendering basic theory i. Visualization system design


ii. Scale precision and efficient ii. Mobile XR immersive presentation ii. Devices monitoring data visualization
computing iii. Mobile XR visual enhancement
iii. Real-time calculation with iii. Real-time interaction of XR

Fig. 17: The proposed 3D scene modeling and XR presentation of the cloud-edge-client architecture [155]. The process involves using point cloud-based 3D scene
perception and modeling, collaborative computing paradigm, and XR presentation. The different stages of the process work together to optimize task allocation,
ensure system openness, scalability, and controllability, and present the 3D digital twin model in an immersive and interactive way.

a body tracking software development kit (SDK) to replicate challenges arising from the integration of one or several tech-
patient movements to an avatar. The proposed framework en- nologies, such as blockchain, semantic web, 3D interactive, and
ables patients to access information, visualize training data, and IoT, as the infrastructure for Web 3.0.
make decisions regarding health conditions. Patients accessed
and completed training exercises through the 3D platform. The
authors assessed the effectiveness of the framework and encour- 8.1. Open Issues
aged users to follow physical rehabilitation goals using the use
of VR technology. 8.1.1. Security and privacy
Security and privacy are paramount in Web 3.0 due to its
7.4. Insights and Summary transformative nature as an advanced, decentralized, and vir-
3D web technology plays a crucial role in the evolution of tual Internet [162]. The integration of technologies such as
the internet into Web 3.0 by enhancing user experiences and blockchain, IoT, AI, 5G, semantic web, and interactive 3D web
enabling new functionalities. It enables the creation of immer- has transformed the internet environment, making it more vir-
sive environments in which people engage with digital mate- tual, decentralized, and interconnected. This transformative
rial in a more engaging and realistic way. This section focuses revolutionary Web 3.0 nature raises several security and pri-
on the application of 3D interactive technology in the devel- vacy issues such as smart contract vulnerabilities, data breaches
opment of Web 3.0 in the future. 3D web technology can dy- in IoT devices, and privacy infringements through AI-driven
namically improve the seamless integration of virtual reality ex- personalization[163]. To overcome these challenges, techni-
periences and enable high-quality immersion in virtual worlds. cal solutions must be developed and executed. Reliable cryp-
Despite of its advantages, it also presents challenges for de- tographic approaches, such as homomorphic encryption and
velopers, such as producing realistic and engaging 3D displays zero-knowledge proofs, can improve the security and privacy
for users and developing reliable and efficient algorithms for of Web 3.0 applications. Decentralized identity management
processing, presenting, and transmitting 3D data over the In- solutions based on blockchain technology can provide individ-
ternet. All these challenges will be carefully considered when uals with more control over their personal information and pri-
integrating enabling technologies (i.e. WebGL, HTML5, We- vacy settings. Furthermore, developments in federated learn-
bXR, Three.js, Babylon.js, and X3D) in Web 3.0 in the future. ing and differential privacy can reduce the privacy hazards con-
Researchers keep looking for new ways to improve, and the nected with AI-powered data processing. Furthermore, regu-
combination of 3D technology and Web 3.0 is set to change the latory policymakers must adapt current rules with new rules
digital world more interactively. A summary of the 3D interac- to reflect the distinct characteristics of decentralized systems.
tive approaches for Web 3.0 is presented in Table 7. To maintain accountability and defend user rights, compliance
with data protection laws, cybersecurity standards, and privacy
regulations is becoming essential. Additionally, information
8. Open Issues and Emerging Technologies exchange and the creation of industry standards depend heavily
on collaborative efforts among stakeholders, from developers
In this section, we discuss the inherent challenges of incor- to legislators. The reliability of data and transactions is piv-
porating emerging technologies to improve the performance of otal for the creative and innovative development of Web 3.0
Web 3.0. We also introduce ideas to address the complexities applications, ultimately enabling scalability, and efficiency, and
associated with these novel fusions. Our main focus centers on minimizing associated costs and risks.
28
Table 7
Summary of 3D Interactive Approaches for Web 3.0

Ref. Application Research Problem Solution Result


[149] Education Integration of 3D technology Semantic ontology for 3D represen- Enhanced 3D representation on the Semantic
in immersive virtual and aug- tation Web.
mented reality scenarios
[151] Healthcare Real-time data monitoring in X3D visualization for 3D health Significantly improved management and
smart cities management control of health information in a virtual en-
vironment.
[153] Animation Data Data transmission limitations, Large-scale 3D models to enhance Significantly reduced latency, data transmis-
poor computing, and delays in data request and loading processes sion, and rendering by up to 24.72%.
3D models
[155] E-Governance Computational power challenges Presentation and visualization of Significantly alleviated high bandwidth and
in large-scale 3D scene modeling large-scale 3D models using We- latency issues in large-scale 3D scenes.
bXR
[154] Design and Architecture Time and labor expenses in 3D 3D modeling for building design Significantly enhanced user interaction and
interactive platforms and CNN for object detection usability in 3D modeling.
[157] Education Remote virtual learning in 3D 3D animation for remote virtual Enhanced online learning experiences and
web environments experiments and HTML5 for the expanded 3D opportunities for remote vir-
graphical user interface tual environments.
[158] Health Informatics Remote medical learning prac- Virtual medical education and inter- Increased user engagement and satisfaction
tices action using WebXR representation in medical education and training on the
multi-cross XR platform by up to 4.64%.
[159] Health Informatics Quality and efficiency in gait dis- Unity 3D for user interaction in Developed an app for physiotherapists to
orders treatment VR scenarios and Azure Kinect for track users’ rehabilitation, achieving a suc-
body tracking cess rate of up to 77.5%.

8.1.2. Interoperability, scalability, and efficiency compelling reasons. Firstly, blockchain technology is well-
Interoperability, scalability, and efficiency are crucial for the known for its inherent energy-intensive characteristics. This is
success and adoption of Web 3.0, as they determine the practi- predominantly attributed to the multitude of nodes required for
cality and effectiveness of this new Internet era [57]. Interoper- transaction validation and ledger maintenance, each necessitat-
ability ensures that different blockchain networks and DApps ing substantial computational resources, consequently leading
can seamlessly communicate and transact with one another, to substantial energy consumption. Secondly, it is important
fostering a cohesive ecosystem rather than isolated platforms. to consider that IoT devices often operate on limited battery
Scalability is essential to accommodate the growing number power, necessitating prudent management of energy resources
of users and transactions on the network without compromis- to ensure sustained functionality. Integrating these IoT devices
ing performance, which is vital for real-time applications in the into blockchain networks could potentially deplete their power
Web 3.0 space. Efficiency in processing transactions and us- reserves, thus reducing their operational lifespan. Thirdly, Web
ing resources is key to making Web 3.0 both environmentally 3.0 is poised to encompass a multitude of diverse applications
sustainable and cost-effective for users. However, achieving and services, each entailing specific requirements for the in-
these objectives in a decentralized environment presents signif- volved blockchain and IoT devices. For example, certain ap-
icant challenges. Ensuring interoperability across diverse and plications within the Web 3.0 ecosystem may demand high-
often incompatible blockchain protocols is a complex task, re- performance capabilities, while others may prioritize energy
quiring standardized frameworks and technologies. Scalability efficiency. A skewed trade-off between energy consumption
poses difficulties as increasing the capacity of decentralized net- and performance could potentially lead to detrimental conse-
works often leads to challenges in maintaining security and de- quences for the advancement of Web 3.0. Excessive energy
centralization. Furthermore, enhancing efficiency, especially in consumption within blockchain networks may discourage user
consensus mechanisms like Proof-of-Work, which are energy- engagement and jeopardize the sustainability of Web 3.0. Addi-
intensive, is crucial to address environmental concerns and im- tionally, if IoT devices cannot effectively conserve energy, their
prove transaction speeds. Thus, while interoperability, scala- ability to participate in Web 3.0 applications and services could
bility, and efficiency are foundational for the functionality and be restricted.
growth of Web 3.0, they also represent some of the most signif-
icant technical hurdles that need to be overcome.
8.2. Emerging Technologies
8.1.3. Energy efficiency and performance optimization
Web 3.0’s computational and communicative capabilities de-
pend heavily on balancing the energy consumption and opera- The integration of cutting-edge technologies assumes a piv-
tional efficiency of blockchain and IoT devices, which are key otal role in shaping the trajectory of Web 3.0’s evolution. This
components of its computational and communicative functions. section delves into a spectrum of emerging technologies poised
This equilibrium presents a formidable challenge for several to significantly advance the development of Web 3.0.
29
8.2.1. WebAssembly (Wasm) 3.0, characterized by its decentralized nature and heightened
Web 3.0 is envisaged as a transformative force in shaping a focus on user privacy and data sovereignty, ZKPs offer im-
more intelligent, decentralized, and immersive online environ- mense potential. They enable the verification of transactions or
ment, as noted in a work on blockchain [164]. This evolution data authenticity within blockchain networks without exposing
necessitates web applications and services to augment their ef- the underlying data, thus maintaining privacy and confidential-
ficiency, resilience, and adaptability across diverse platforms ity. This is especially beneficial for DeFi, secure voting sys-
and devices. An instrumental solution to address these chal- tems, and identity verification processes, where the need to val-
lenges is WebAssembly [165], a binary instruction format for idate information without compromising privacy is paramount.
a virtual computer that can operate within web browsers. We- Moreover, ZKPs can enhance the scalability of blockchain net-
bAssembly liberates online programs and services from the lim- works by enabling more efficient data processing and reducing
itations imposed by intermediary layers of abstraction between the amount of information that needs to be stored on-chain. The
JavaScript and the CPU, allowing them to fully harness the ability to prove the correctness of transactions without revealing
computational capabilities of the CPU [165]. The implications their contents could greatly reduce the computational load and
of WebAssembly for the online platform are extensive, as it em- storage requirements, addressing some of the scalability chal-
powers web-based client applications that previously struggled lenges faced by current blockchain technologies. As Web 3.0
to attain such performance to execute code written in multi- continues to evolve, integrating ZKPs into its framework could
ple languages [166]. Importantly, WebAssembly is engineered significantly advance its capabilities in terms of privacy, secu-
to seamlessly coexist with JavaScript, facilitating the incorpo- rity, and efficiency, making it a key technology for the future
ration of WebAssembly modules into JavaScript applications development of the decentralized web.
through the use of WebAssembly JavaScript APIs. This inte-
gration enables users to leverage WebAssembly’s capabilities 8.2.4. Generative AI
while harnessing the versatility and adaptability of JavaScript Generative AI (GAI), a facet of AI capable of generating
within the same applications, even for those who may not be novel content spanning text, visuals, and music, assumes sub-
well-versed in writing WebAssembly code [166]. stantial importance within the development of Web 3.0. This
significance rests on a multitude of compelling rationales [169].
8.2.2. Quantum computing Firstly, it acts as a catalyst for the development of inventive
Quantum computing, considered an emerging technology, Web 3.0 applications. For instance, generative AI finds utility
provides both immense promise and significant challenges to in crafting applications that produce personalized content, aid-
Web 3.0. Leveraging the principles of quantum mechanics, ing users in the creation of their digital assets, and facilitating
quantum computers promise to exponentially increase compu- novel, immersive interactions within the digital domain. Sec-
tational power, enabling the processing of complex data sets ondly, generative AI contributes to the augmentation of Web
and the execution of advanced algorithms at unprecedented 3.0 applications’ performance and scalability. It plays a piv-
speeds. This capacity has the potential to transform Web 3.0 otal role in conceiving innovative data compression algorithms,
applications by improving data security using quantum encryp- streamlining the performance of Web 3.0 networks, and intro-
tion, streamlining decentralized networks, and enabling real- ducing advanced security features to fortify Web 3.0 applica-
time data analysis for immersive virtual experiences. How- tions. Thirdly, generative AI endeavors to simplify and enhance
ever, some challenges must be resolved before quantum com- the user experience in Web 3.0, manifesting through the cre-
puting can be completely incorporated into Web 3.0. These ation of intuitive tools and interfaces that streamline user inter-
include creating stable and scalable quantum hardware, de- actions with applications and services. As generative AI con-
veloping quantum-resistant cryptographic methods to protect tinues its evolution and maturation, its prominence within the
data from quantum incidents, and developing innovative pro- Web 3.0 ecosystem is bound to witness significant expansion.
gram concepts appropriate for quantum computing [114]. Ad-
ditionally, integrating quantum computing with conventional 9. Conclusion
web technologies creates major technical and interoperability
problems [167]. Consequently, researchers and developers are Web 3.0 is an emerging technology that has the potential to
actively investigating these areas, seeking to solve the chal- bring a tremendous revolution in various fields, such as finance,
lenges. Addressing these difficulties will be essential for quan- IoT, health informatics, education, distributed applications, and
tum computing’s effective integration into Web 3.0, allowing it supply chain management. In this article, we have presented
to achieve its full potential to transform the digital world and a comprehensive survey on how technologies can enable, em-
drive the next generation of web technologies. power, and revolutionize Web 3.0. Firstly, we have presented
an overview of Web 3.0, discussed its effectiveness, and high-
8.2.3. Zero-knowledge proofs (ZKPs) lighted a number of applications and recent industry standards
ZKPs are a revolutionary cryptographic method enabling one where the technologies were potentially deployed. Then, we
party to prove to another that a statement is true without re- have discussed and demonstrated various important technolo-
vealing any information beyond the validity of the statement gies that will play key roles in the future development of Web
itself [168]. This technology is particularly significant in the 3.0, (i.e., IoT, 5G, blockchain, semantic web, and 3D interac-
context of privacy and security in digital transactions. In Web tive web technologies). For each technology, we have provided
30
an overview, examined the state-of-the-art, and discussed how [20] W. Zhao, C. Jiang, H. Gao, S. Yang, X. Luo, Blockchain-enabled cyber-
it can be utilized in future development of Web 3.0 scenarios. physical systems: A Review, IEEE Internet of Things Journal 8 (6) (Mar.
2020) 4023–4034.
Finally, we have discussed open issues and some potential solu- [21] D. Chen, L. J. Xie, B. Kim, L. Wang, C. S. Hong, L.-C. Wang, Z. Han,
tions that will pave the way for the wide adoption and deploy- Federated learning based mobile edge computing for augmented reality
ment of Web 3.0 in the near future. applications, in: Proc. 2020 International Conference on Computing,
Networking and Communications (ICNC), 2020, pp. 767–773.
[22] F. A. Sunny, P. Hajek, M. Munk, M. Z. Abedin, M. S. Satu, M. I. A.
Efat, M. J. Islam, A systematic review of blockchain applications, IEEE
References Access 10 (Jun. 2022) 59155–59177.
[23] E. R. J. Frankenfield, S. Kvilhaug, 51% attack: Definition, who is at
[1] History of the web, https://webfoundation.org/about/vision/ risk, example, and cost, https://www.investopedia.com/terms/
history-of-the-web/. (2023). 1/51-attack.asp. (2023).
[2] S. Salim, B. Turnbull, N. Moustafa, A blockchain-enabled explainable [24] R. Gupta, An introduction to terminologies and lay-
federated learning for securing internet-of-things-based social media 3.0 ers in web3, https://techblog.geekyants.com/
networks, IEEE Transactions on Computational Social Systems (Dec. an-introduction-to-terminologies-and-layers-in-web3/.
2021) 1–17. (2022).
[3] K. Korkmaz, J. Bruneau-Queyreix, S. B. Mokhtar, L. Reveillere, [25] B. Lashkari, P. Musilek, A comprehensive review of blockchain consen-
ALDER: Unlocking blockchain performance by multiplexing consen- sus mechanisms, IEEE Access 9 (Mar. 2021) 43620–43652.
sus protocols, in: Proc. IEEE 21st International Symposium on Network [26] C. T. Nguyen, D. T. Hoang, D. N. Nguyen, D. Niyato, H. T.
Computing and Applications (NCA), Vol. 21, Jan. 2022, pp. 9–18. Nguyen, E. Dutkiewicz, Proof-of-stake consensus mechanisms for fu-
[4] W.-Y. Lin, X. Zhang, H. Song, K. Omori, Health information seeking in ture blockchain networks: Fundamentals, applications and opportuni-
the Web 2.0 age: Trust in social media, uncertainty reduction, and self- ties, IEEE Access 7 (Jun. 2019) 85727–85745.
disclosure, Computers in Human Behavior 56 (Mar. 2016) 289–294. [27] S. P. Choudary, Understanding the incentives for
[5] B. Stritter, F. Freiling, H. König, R. Rietz, S. Ullrich, A. von Gernler, web3, https://medium.com/bosonprotocol/
F. Erlacher, F. Dressler, Cleaning up web 2.0’s security mess-at least understanding-the-incentives-for-web3-ca15ec6b30f7/.
partly, IEEE Security & Privacy 14 (2) (Apr. 2016) 48–57. (2021).
[6] J. Zarrin, H. Wen Phang, L. Babu Saheer, B. Zarrin, Blockchain for [28] X. Liu, Z. Tang, P. Li, S. Guo, X. Fan, J. Zhang, A graph learn-
decentralization of Internet: prospects, trends, and challenges, Cluster ing based approach for identity inference in Dapp platform blockchain,
Computing 24 (4) (May, 2021) 2841–2866. IEEE Transactions on Emerging Topics in Computing 10 (1) (Sep. 2020)
[7] P. Drakatos, E. Demetriou, S. Koumou, A. Konstantinidis, 438–449.
D. Zeinalipour-Yazti, Triastore: A Web 3.0 blockchain datastore [29] K. Yue, Y. Zhang, Y. Chen, Y. Li, L. Zhao, C. Rong, L. Chen, A survey
for massive IoT workloads, in: Proc. 2021 22nd IEEE International of decentralizing applications via blockchain: The 5G and beyond per-
Conference on Mobile Data Management (MDM), 2021, pp. 187–192. spective, IEEE Communications Surveys & Tutorials 23 (4) (Sep. 2021)
[8] X. Zhang, G. Min, T. Li, Z. Ma, X. Cao, S. Wang, AI and Blockchain 2191–2217.
Empowered Metaverse for Web 3.0: Vision, Architecture, and Future [30] G. Weston, Blockchain for Decentralized Finance (DeFi), https://
Directions, IEEE Communications Magazine 61 (8) (Jun. 2023) 60–66. 101blockchains.com/web3-guide/. (2022).
[9] X. Ren, M. Xu, D. Niyato, J. Kang, Z. Xiong, C. Qiu, X. Wang, Build- [31] W. Ding, J. Hou, J. Li, C. Guo, J. Qin, R. Kozma, F.-Y. Wang, De-
ing Resilient Web 3.0 with Quantum Information Technologies and Sci based on Web3 and DAO: A comprehensive overview and reference
Blockchain: An Ambilateral View, arXiv:2303.13050 (Mar. 2023). model, IEEE Transactions on Computational Social Systems 9 (5) (Sep.
[10] S. Salim, B. Turnbull, N. Moustafa, Data analytics of social media 3.0: 2022) 1563–1573.
Privacy protection perspectives for integrating social media and Inter- [32] S. Cucko, M. Turkanovic, Decentralized and self-sovereign identity:
net of Things (SM-IoT) systems, Ad Hoc Networks 128 (Apr. 2022) Systematic mapping study, IEEE Access 9 (Oct. 2021) 139009–139027.
102786–102801. [33] Q. Wang, R. Li, Q. Wang, S. Chen, Non-fungible token (NFT):
[11] R. Z. Cabada, M. L. B. Estrada, F. G. Hernández, R. O. Bustillos, C. A. Overview, evaluation, opportunities and challenges, arXiv:2105.07447
Reyes-Garcı́a, An affective and web 3.0-based learning environment for (Oct. 2021).
a programming language, Telematics and Informatics 35 (3) (2018) 611– [34] D. T. Hoang, D. N. Nguyen, C. T. Nguyen, E. Hossain, D. Niyato, Meta-
628. verse Communication and Computing Networks: Applications, Tech-
[12] F. Bashir, N. F. Warraich, Systematic literature review of semantic web nologies, and Approaches, IEEE-Wiley (2023).
for distance learning, Interactive Learning Environments 31 (1) (Aug. [35] Y.-J. Liu, H. Du, D. Niyato, G. Feng, J. Kang, Z. Xiong, Slicing4Meta:
2023) 527–543. An Intelligent Integration Architecture with Multi-dimensional Network
[13] A. N. Turi, A. N. Turi, Currency under the web 3.0 economy, Tech- Resources for Metaverse-as-a-Service in Web 3.0, IEEE Communica-
nologies for Modern Digital Entrepreneurship: Understanding Emerg- tions Magazine 61 (8) (Aug. 2023) 438–449.
ing Tech at the Cutting-Edge of the Web 3.0 Economy (2020) 155–186. [36] semantic, Semantic mediawiki, https://www.
[14] C. Chen, L. Zhang, Y. Li, T. Liao, S. Zhao, Z. Zheng, H. Huang, J. Wu, semantic-mediawiki.org/wiki/Semantic_MediaWiki. (2023).
When digital economy meets Web 3.0: Applications and challenges, [37] Ivan Cryptoslav, Somnium space tokenomics,
IEEE Open Journal of the Computer Society 3 (Oct. 2022) 233–245. https://coinmarketcap.com/academy/article/
[15] P. P. Ray, Web3: A comprehensive review on background, technologies, what-is-somnium-space. (2023).
applications, zero-trust architectures, challenges and future directions, [38] M. McFadden, Web 3.0 and standards, https://dnsrf.org/blog/
Internet of Things and Cyber-Physical Systems (May, 2023) 213–248. web-3-0-and-standards/index.html (2023).
[16] P. Singh, R. Garg, P. Nagrath, A survey on web 3.0 security issues and [39] Consensys, A detailed guide on web 3.0, https://consensys.net/
financial supply chain risk based on neural networks and blockchain, in: blockchain-use-cases/decentralized-finance/. (2023).
Computational Intelligence for Engineering and Management Applica- [40] Ericsson, IoT connections forecast - Mobility Report, https://www.
tions: Select Proceedings of CIEMA 2022, Springer, 2023, pp. 547–559. ericsson.com/en/reports-and-papers/mobility-report/
[17] T. Issa, Artificial intelligence technologies and the evolution of Web 3.0, dataforecasts/iot-connections-outlook/. (2023).
Pennsylvania, United States, IGI Global, 2015. [41] X. Wang, J. Yang, J. Han, W. Wang, F.-Y. Wang, Metaverses and
[18] O. Adedugbe, E. Benkhelifa, R. Campion, F. Al-Obeidat, A. Bani Hani, DeMetaverses: From digital twins in CPS to parallel intelligence in
U. Jayawickrama, Leveraging cloud computing for the semantic web: CPSS, IEEE Intelligent Systems 37 (4) (Sep. 2022) 97–102.
Review and trends, Soft Computing 24 (Nov. 2020) 5999–6014. [42] O. Novo, M. D. Francesco, Semantic interoperability in the IoT: ex-
[19] S. Tanwar, Blockchain revolution from 1.0 to 5.0: technological perspec- tending the web of things architecture, ACM Transactions on Internet of
tive, in: Blockchain Technology: From Theory to Practice, Singapore, Things 1 (1) (Mar. 2020) 1–25.
Springer, 2022, pp. 43–61.

31
[43] P. Patel, M. I. Ali, A. Sheth, From raw data to smart manufacturing: AI [64] S. Ferber, Production performance management,
and semantic web of things for industry 4.0, IEEE Intelligent Systems https://iot.eclipse.org/adopters/testbeds/
33 (4) (Oct. 2018) 79–86. production-performance-management/. (2012).
[44] W. Group, Web of things (wot) architecture, https://w3c.github. [65] Ericsson, 5G network coverage outlook-Mobility Report,
io/wot-architecture/. (2023). https://www.ericsson.com/en/reports-and-papers/
[45] H. Jethva, JSON A Brief Background, https://www.alibabacloud. mobility-report/dataforecasts/network-coverage/.
com/blog/basics-of-working-with-json-in-sql-server_ (2023).
597409. (2023). [66] X. Lin, N. Lee, Introduction to 5G and Beyond, 5G and Beyond: Fun-
[46] T. L. Koreshoff, T. W. Leong, T. Robertson, Approaching a human- damentals and Standards (Aug. 2021) 1–25.
centred internet of things, in: Proc. of the 25th Australian Computer- [67] A. Weissberger, IMT vision–Framework and overall objectives of the
Human Interaction Conference: Augmentation, Application, Innova- future development of IMT for 2020 and beyond, Recommendation ITU
tion, Collaboration, 2013, pp. 363–366. 2083 (0) (Jan. 2015).
[47] S. M. Oteafy, H. S. Hassanein, Iot in the fog: A roadmap for data-centric [68] 3GPP, System architecture for the 5G system (5GS), 3GPP
iot development, IEEE Communications Magazine 56 (3) (Mar. 2018) TS23.501, https://2020.standict.eu/standards-watch/
157–163. system-architecture-5g-system/. (2022).
[48] Q. Wu, G. Ding, Y. Xu, S. Feng, Z. Du, J. Wang, K. Long, Cognitive [69] L. Chettri, R. Bera, A Comprehensive Survey on Internet of Things (IoT)
Internet of Things: a new paradigm beyond connection, IEEE Internet Toward 5G Wireless Systems, IEEE Internet of Things Journal 7 (1)
of Things Journal 1 (2) (Mar. 2014) 129–143. (Oct. 2019) 16–32.
[49] M. Yannuzzi, R. Milito, R. Serral-Gracià, D. Montero, M. Nemirovsky, [70] S. Hakak, T. R. Gadekallu, P. K. R. Maddikunta, S. P. Ramu, P. M, C. De
Key ingredients in an iot recipe: Fog computing, cloud computing, and Alwis, M. Liyanage, Autonomous vehicles in 5G and beyond: A survey,
more fog computing, in: Proc. 2014 IEEE 19th International Workshop Vehicular Communications 39 (Feb. 2023) 100551–100582.
on Computer Aided Modeling and Design of Communication Links and [71] N. Abbas, Y. Zhang, A. Taherkordi, T. Skeie, Mobile edge computing:
Networks (CAMAD), 2014, pp. 325–329. A survey, IEEE Internet of Things Journal 5 (1) (Sep. 2018) 450–465.
[50] M. Tao, J. Zuo, Z. Liu, A. Castiglione, F. Palmieri, Multi-layer cloud [72] Y. Siriwardhana, P. Porambage, M. Liyanage, M. Ylianttila, A survey on
architectural model and ontology-based security service framework for mobile augmented reality with 5G mobile edge computing: Architec-
iot-based smart homes, Future Generation Computer Systems 78 (Jan. tures, applications, and technical aspects, IEEE Communications Sur-
2018) 1040–1051. veys & Tutorials 23 (2) (Feb. 2021) 1160–1192.
[51] S. Wang, L. Ouyang, Y. Yuan, X. Ni, X. Han, F.-Y. Wang, Blockchain- [73] I. Ahmed, H. Khammari, A. Shahid, A. Musa, K. S. Kim, E. De Poorter,
enabled smart contracts: architecture, applications, and future trends, I. Moerman, A Survey on Hybrid Beamforming Techniques in 5G: Ar-
IEEE Transactions on Systems, Man, and Cybernetics: Systems 49 (11) chitecture and System Model Perspectives, IEEE Communications Sur-
(Feb. 2019) 2266–2277. veys and Tutorials 20 (4) (Jun. 2018) 3060–3097.
[52] T. M. Fernández-Caramés, P. Fraga-Lamas, A review on the use of [74] M. Mezzavilla, M. Zhang, M. Polese, R. Ford, S. Dutta, S. Rangan,
blockchain for the internet of things, IEEE Access 6 (May, 2018) 32979– M. Zorzi, End-to-end simulation of 5G mmWave networks, IEEE Com-
33001. munications Surveys & Tutorials 20 (3) (Apr. 2018) 2237–2263.
[53] B. Bhushan, C. Sahoo, P. Sinha, A. Khamparia, Unification of [75] T. S. Rappaport, G. R. MacCartney, M. K. Samimi, S. Sun, Wide-
blockchain and internet of things (biot): requirements, working model, band millimeter-wave propagation measurements and channel models
challenges and future directions, Wireless Networks 27 (Aug. 2021) 55– for future wireless communication system design, IEEE Transactions on
90. Communications 63 (9) (May, 2015) 3029–3056.
[54] M. A. Rahman, M. S. Hossain, M. S. Islam, N. A. Alrajeh, G. Muham- [76] A. Kayyali, Web3, 5G, and the Metaverse: The Un-
mad, Secure and provenance enhanced Internet of health things frame- derlying Technology, https://insidetelecom.com/
work: A blockchain managed federated learning approach, IEEE Access web3-5g-and-the-metaverse-the-underlying-technology/.
8 (Nov. 2020) 205071–205087. (2023).
[55] S. Saxena, B. Bhushan, M. A. Ahad, Blockchain based solutions to se- [77] Y. Cheng, M. Pesavento, Joint optimization of source power alloca-
cure IoT: Background, integration trends and a way forward, Journal of tion and distributed relay beamforming in multiuser peer-to-peer relay
Network and Computer Applications 181 (May, 2021) 103050. networks, IEEE Transactions on Signal Processing 60 (6) (Feb. 2012)
[56] B. Farahani, F. Firouzi, M. Luecking, The convergence of IoT and dis- 2962–2973.
tributed ledger technologies (DLT): Opportunities, challenges, and solu- [78] N. H. Chu, D. T. Hoang, D. N. Nguyen, K. T. Phan, E. Dutkiewicz,
tions, Journal of Network and Computer Applications 177 (Mar. 2021) D. Niyato, T. Shu, Metaslicing: A novel resource allocation framework
102936. for metaverse, IEEE Transactions on Mobile Computing (2023) 1–18.
[57] G. Hatzivasilis, I. Askoxylakis, G. Alexandris, D. Anicic, A. Bror- [79] Q. Wang, P. Wang, W. Sun, Y. Zhang, Low-Latency Communications
ing, V. Kulkarni, K. Fysarakis, G. Spanoudakis, The Interoperability of for Digital Twin Empowered Web 3.0, IEEE Network, Early Access,
Things: Interoperable solutions as an enabler for IoT and Web 3.0, in: doi: 10.1109/MNET.2023.3319380 (Oct. 2023).
Proc. 2018 IEEE 23rd International Workshop on Computer Aided Mod- [80] A.-S. Bana, E. de Carvalho, B. Soret, T. Abrao, J. C. Marinello, E. G.
eling and Design of Communication Links and Networks (CAMAD), Larsson, P. Popovski, Massive MIMO for Internet of Things (IoT) con-
Nov. 2018, pp. 1–7. nectivity, Physical Communication 37 (Dec. 2019) 100859–100866.
[58] C. Choi, J. Choi, Ontology-based security context reasoning for power [81] P. Fang, T. Wolf, Implementing Virtual Network Functions in Named
IoT-cloud security service, IEEE Access 7 (Aug. 2019) 110510–110517. Data Networking and Web 3.0, in: Proc. 2023 International Confer-
[59] B. A. Mozzaquatro, C. Agostinho, D. Goncalves, J. Martins, R. Jardim- ence on Computing, Networking and Communications (ICNC), 2023,
Goncalves, An ontology-based cybersecurity framework for the Internet pp. 117–123.
of Things, Sensors 18 (9) (Sep. 2018) 3053. [82] J. Wang, H. Du, Z. Tian, D. Niyato, J. Kang, X. Shen, Semantic-aware
[60] M. Gheisari, H. E. Najafabadi, J. A. Alzubi, J. Gao, G. Wang, A. A. Ab- sensing information transmission for metaverse: A contest theoretic ap-
basi, A. Castiglione, OBPP: An ontology-based framework for privacy- proach, IEEE Transactions on Wireless Communications 22 (8) (Jan.
preserving in IoT-based smart city, Future Generation Computer Sys- 2023) 5214–5228.
tems 123 (Oct. 2021) 1–13. [83] N. C. Luong, T. L. Van, S. Feng, H. Du, D. Niyato, D. I. Kim, Edge
[61] I. Szilagyi, P. Wira, Ontologies and semantic web for the internet of computing for metaverse: Incentive mechanism versus semantic com-
things-a survey, in: Proc. IECON 2016-42nd Annual Conference of the munication, IEEE Transactions on Mobile Computing (2023) 1–17.
IEEE Industrial Electronics Society, 2016, pp. 6949–6954. [84] Z. Liu, X. Xu, F. Han, Q. Zhao, L. Qi, W. Dou, X. Zhou, Secure Edge
[62] World Wide Web Consortium (W3C), Linked data, https://www.w3. Server Placement with Non-Cooperative Game for Internet of Vehicles
org/DesignIssues/LinkedData.html/. (2006). in Web 3.0, IEEE Transactions on Network Science and Engineering,
[63] V. Shevchuk, Unified architecture, https://opcfoundation.org/ Early Access (Oct. 2023) 1–12.
about/opc-technologies/opc-ua/. (2008). [85] X. Luo, H.-H. Chen, Q. Guo, Semantic communications: Overview,

32
open issues, and future research directions, IEEE Wireless Communi- enabled Web 3.0, IEEE Wireless Communications, Early Access, doi:
cations 29 (1) (Jan. 2022) 210–219. 10.1109/MWC.018.2200568 (Mar. 2023).
[86] H. Ning, H. Wang, Y. Lin, W. Wang, S. Dhelim, F. Farha, J. Ding, [107] T. Wang, S. Zhang, S. C. Liew, Linking Souls to Humans with ZKBID:
M. Daneshmand, A survey on the metaverse: The state-of-the-art, tech- Accountable Anonymous Blockchain Accounts for Web 3.0 Decentral-
nologies, applications, and challenges, IEEE Internet of Things Journal ized Identity, arXiv:2301.02102 (Jan. 2023).
10 (16) (Aug. 2023) 14671–14688. [108] A. Furfaro, L. Argento, D. Saccá, F. Angiulli, F. Fassetti, An infrastruc-
[87] H. Xie, Z. Qin, G. Y. Li, B.-H. Juang, Deep learning enabled seman- ture for service accountability based on digital identity and blockchain
tic communication systems, IEEE Transactions on Signal Processing 69 3.0, in: Proc. IEEE INFOCOM 2019-IEEE Conference on Computer
(Apr. 2021) 2663–2675. Communications Workshops (INFOCOM WKSHPS), 2019, pp. 632–
[88] W. H. Hassan, et al., Current research on Internet of Things (IoT) secu- 637.
rity: A survey, Computer Networks 148 (Jan. 2019) 283–294. [109] W. Zou, D. Lo, P. S. Kochhar, X.-B. D. Le, X. Xia, Y. Feng, Z. Chen,
[89] Y. Wang, Z. Su, N. Zhang, R. Xing, D. Liu, T. H. Luan, X. Shen, A B. Xu, Smart contract development: Challenges and opportunities, IEEE
survey on metaverse: Fundamentals, security, and privacy, IEEE Com- Transactions on Software Engineering 47 (10) (Sep. 2019) 2084–2106.
munications Surveys and Tutorials 25 (1) (Jan. 2023) 319–352. [110] C. Wu, J. Xiong, H. Xiong, Y. Zhao, W. Yi, A review on recent progress
[90] J. Al-Jaroodi, N. Mohamed, Blockchain in industries: A survey, IEEE of smart contract in blockchain, IEEE Access 10 (May, 2022) 50839–
Access 7 (Mar. 2019) 36500–36515. 50863.
[91] R. Yang, F. R. Yu, P. Si, Z. Yang, Y. Zhang, Integrated blockchain [111] X. Jia, W. Xu, P. Deng, S. Gao, L. Tang, Y. Wang, M. Zhang,
and edge computing systems: A survey, some research issues and chal- L. Bao, D. Lin, Cross-organisational data sharing framework based on
lenges, IEEE Communications Surveys & Tutorials 21 (2) (Jan. 2019) blockchain-probes, IET Networks 12 (2) (Jul. 2023) 77–85.
1508–1532. [112] R. Sheldon, B. Posey, 7 decentralized data storage networks com-
[92] M. I. Khalid, I. Ehsan, A. K. Al-Ani, J. Iqbal, S. Hussain, S. S. Ullah, pared, https://www.techtarget.com/searchstorage/tip/
et al., A comprehensive survey on blockchain-based decentralized stor- Comparing-4-decentralized-data-storage-offerings/.
age networks, IEEE Access 11 (Jan. 2023) 10995–11015. (2023).
[93] A. A. Monrat, O. Schelen, K. Andersson, A survey of blockchain from [113] F. Casino, E. Politou, E. Alepis, C. Patsakis, Immutability and decen-
the perspectives of applications, challenges, and opportunities, IEEE Ac- tralized storage: An analysis of emerging threats, IEEE Access 8 (Dec.
cess 7 (Aug. 2019) 117134–117151. 2019) 4737–4744.
[94] C. T. Nguyen, D. T. Hoang, D. N. Nguyen, Y. Xiao, H.-A. Pham, [114] M. Xu, X. Ren, D. Niyato, J. Kang, C. Qiu, Z. Xiong, X. Wang, V. C. Le-
E. Dutkiewicz, N. H. Tuong, Fedchain: Secure proof-of-stake-based ung, When quantum information technologies meet blockchain in Web
framework for federated-blockchain systems, IEEE Transactions on Ser- 3.0, IEEE Network, Early Access, doi: 10.1109/MNET.134.2200578
vices Computing 16 (4) (Jan. 2023) 2642–2656. (May, 2023) 1–8.
[95] S. Yan, Analysis on blockchain consensus mechanism based on proof [115] L. Cao, Decentralized AI: Edge intelligence and smart blockchain,
of work and proof of stake, in: Proc. 2022 International Conference Metaverse, Web3, and DeSci, IEEE Intelligent Systems 37 (3) (May-
on Data Analytics, Computing and Artificial Intelligence (ICDACAI), Jun. 2022) 6–19.
2022, pp. 464–467. [116] Y. Lin, Z. Gao, Y. Tu, H. Du, D. Niyato, J. Kang, H. Yang, A Blockchain-
[96] L. Chen, L. Xu, N. Shah, Z. Gao, Y. Lu, W. Shi, On security analysis of based Semantic Exchange Framework for Web 3.0 toward Participatory
proof-of-elapsed-time (poet), in: Proc. Stabilization, Safety, and Secu- Economy, IEEE Communications Magazine 61 (8) (Jun. 2023) 94–100.
rity of Distributed Systems: 19th International Symposium, SSS 2017, [117] D. M. Doe, J. Li, N. Dusit, Z. Gao, J. Li, Z. Han, Promoting the Sustain-
November 5–8, 2017, Proceedings 19, 2017, pp. 282–297. ability of Blockchain in Web 3.0 and the Metaverse Through Diversified
[97] D. Puthal, S. P. Mohanty, V. P. Yanambaka, E. Kougianos, PoAh: A Incentive Mechanism Design, IEEE Open Journal of the Computer So-
novel consensus algorithm for fast scalable private blockchain for large- ciety 4 (Mar. 2023) 171–184.
scale IoT frameworks, arXiv:2001.07297 (Jan. 2020). [118] O. Avellaneda, A. Bachmann, A. Barbir, J. Brenan, P. Dingle, K. H.
[98] X. Liu, G. Zhao, X. Wang, Y. Lin, Z. Zhou, H. Tang, B. Chen, Mdp- Duffy, E. Maler, D. Reed, M. Sporny, Decentralized identity: Where did
based quantitative analysis framework for proof of authority, in: Proc. it come from and where is it going?, IEEE Communications Standards
2019 International Conference on Cyber-Enabled Distributed Comput- Magazine 3 (4) (Dec. 2019) 10–13.
ing and Knowledge Discovery (CyberC), Jan. 2019, pp. 227–236. [119] Q. Wang, R. Li, Q. Wang, S. Chen, M. Ryan, T. Hardjono, Exploring
[99] Z. Liu, S. Tang, S. S. Chow, Z. Liu, Y. Long, Fork-free hybrid consensus Web3 from the view of blockchain, arXiv:2206.08821 (Jun. 2022).
with flexible proof-of-activity, Future Generation Computer Systems 96 [120] P. Hitzler, M. Krotzsch, S. Rudolph, Foundations of Semantic web tech-
(Jul. 2019) 515–524. nologies, Boca Raton, London, New York, CRC press, 2009.
[100] T. M. Hewa, Y. Hu, M. Liyanage, S. S. Kanhare, M. Ylianttila, Survey on [121] T. Berners-Lee, J. Hendler, O. Lassila, The Semantic web, Scientific
blockchain-based smart contracts: Technical aspects and future research, American 284 (5) (May 2001) 34–43.
IEEE Access 9 (Mar. 2021) 87643–87662. [122] S. Bratt, Semantic Web, and Other W3C Technologies to Watch,
[101] Z. Liu, Y. Xiang, J. Shi, P. Gao, H. Wang, X. Xiao, B. Wen, Q. Li, Y.-C. https://www.w3.org/2007/Talks/0130-sb-W3CTechSemWeb/
Hu, Make Web3.0 Connected, IEEE Transactions on Dependable and 0130-sb-W3CTechSemWeb.pdf/. (2023).
Secure Computing 19 (5) (May, 2022) 2965–2981. [123] Semantic web, https://www.w3.org/standards/semanticweb/.
[102] W. Wang, D. T. Hoang, P. Hu, Z. Xiong, D. Niyato, P. Wang, Y. Wen, (2023).
D. I. Kim, A survey on consensus mechanisms and mining strategy man- [124] RDF 1.1 concepts and abstract syntax, https://www.w3.org/TR/
agement in blockchain networks, IEEE Access 7 (Jan. 2019) 22328– rdf11-concepts/. (2023).
22370. [125] RDF Schema 1.1, https://www.w3.org/TR/rdf-schema/. (2023).
[103] A. Singh, K. Click, R. M. Parizi, Q. Zhang, A. Dehghantanha, K.-K. R. [126] T. R. Gruber, A translation approach to portable ontology specifications,
Choo, Sidechain technologies in blockchain networks: An examination Knowledge Acquisition 5 (2) (Sep. 1993) 199–220.
and state-of-the-art review, Journal of Network and Computer Applica- [127] J. Lehmann, et al., DBpedia–a large-scale, multilingual knowledge base
tions 149 (Jan. 2020) 102471–102487. extracted from wikipedia, Semantic Web 6 (2) (2015) 167–195.
[104] W. Chen, Y. Chen, X. Chen, Z. Zheng, Toward secure data sharing for [128] E. Sandhaus, Semantic technology at the new york times: Lessons
the iov: A quality-driven incentive mechanism with on-chain and off- learned and future directions, in: Proc. Semantic Web–ISWC 2010: 9th
chain guarantees, IEEE Internet of Things Journal 7 (3) (Oct. 2019) International Semantic Web Conference, ISWC 2010, November 7-11,
1625–1640. 2010, Revised Selected Papers, Part II 9, Springer, 2010, pp. 355–355.
[105] T. Zhou, X. Li, H. Zhao, Dlattice: A permission-less blockchain based [129] J. Weaver, P. Tarjan, Facebook linked data via the graph API, Semantic
on dpos-ba-dag consensus for data tokenization, IEEE Access 7 (Mar. Web 4 (3) (2013) 245–250.
2019) 39273–39287. [130] N. Noy, Y. Gao, A. Jain, A. Narayanan, A. Patterson, J. Taylor, Industry-
[106] Y. Lin, Z. Gao, H. Du, D. Niyato, J. Kang, R. Deng, X. S. Shen, A scale knowledge graphs: Lessons and challenges, Queue 17 (2) (Jul.
unified blockchain-semantic framework for wireless edge intelligence 2019) 48–75.

33
[131] P. Hitzler, A review of the semantic web field, Communications of the bile web 3d based on animation data separation and on-demand loading,
ACM 64 (2) (Feb. 2021) 76–83. IEEE Access 8 (May, 2020) 88474–88486.
[132] C. Wang, H. Ma, G. Chen, S. Hartmann, Using an estimation of dis- [154] H. Fan, G. Kong, C. Zhang, An Interactive platform for low-cost 3D
tribution algorithm to achieve multitasking semantic web service com- building modeling from VGI data using convolutional neural network,
position, IEEE Transactions on Evolutionary Computation 27 (3) (Apr. Big Earth Data 5 (1) (Apr. 2021) 49–65.
2022) 490–504. [155] H. Wu, H. Zhang, J. Cheng, J. Guo, W. Chen, Perspectives on point
[133] G. Kang, J. Liu, Y. Xiao, Y. Cao, B. Cao, M. Shi, Web services cluster- cloud-based 3D scene modeling and XR presentation within the cloud-
ing via exploring unified content and structural semantic representation, edge-client architecture, Visual Informatics 7 (3) (Sep. 2023) 59–64.
IEEE Transactions on Network and Service Management 19 (4) (Aug. [156] R. Tabarés, Html5 and the evolution of html; tracing the origins of digital
2022) 4082–4096. platforms, Technology in Society 65 (Feb, 2021) 1–8.
[134] G. Zou, Z. Qin, Q. He, P. Wang, B. Zhang, Y. Gan, DeepWSC: Clus- [157] Z. Lei, H. Zhou, W. Hu, G.-P. Liu, Q. Deng, D. Zhou, Z.-W. Liu, X. Gao,
tering web services via integrating service composability into deep se- Unified 3-d interactive human-centered system for online experimenta-
mantic features, IEEE Transactions on Services Computing 15 (4) (Sep. tion: Current deployment and future perspectives, IEEE Transactions on
2020) 1940–1953. Industrial Informatics 17 (7) (Aug. 2020) 4777–4787.
[135] W. Pang, H. Li, X. Ma, H. Zhang, A semantic-centered cloud control [158] K. Hanfati, S. Sukaridhoto, D. K. Basuki, R. P. N. Budiarti, E. D. Fa-
framework for autonomous unmanned system, Journal of Systems En- jrianti, I. A. Al Hafidz, Design and Implementation of WebXR Health
gineering and Electronics 33 (4) (Aug. 2022) 771–784. Learning Module Application, in: Proc. 2022 International Electronics
[136] X. Li, D. Yang, J. Yuan, A. Donkers, X. Liu, Bim-enabled semantic Symposium (IES), 2022, pp. 632–637.
web for automated safety checks in subway construction, Automation in [159] B. D. S. Gonccalves, O. Postolache, J. M. D. Pereira, Gait rehabilita-
Construction 141 (Sep. 2022) 104454. tion in virtual reality serious game interactive scenarios, in: Proc. 2022
[137] S. N. D. Ververidis, E. Anastasovitis, Architecture and interface design, International Conference and Exposition on Electrical And Power Engi-
https://www.researchgate.net/publication/322655519_ neering (EPE), 2022, pp. 672–676.
D61_-_DigiArt_-_Architecture_and_Interface_Design/. [160] B. Maclntyre, T. F. Smith, Thoughts on the Future of WebXR and the Im-
(2016). mersive Web, in: Proc. 2018 IEEE International Symposium on Mixed
[138] D. Patterson, Interactive 3D web applications for visualization of world and Augmented Reality Adjunct (ISMAR-Adjunct), 2018, pp. 338–342.
health organization data, in: Proc. of the Australasian Computer Science [161] X. Guo, I. Mogra, Using web 3D and WebXR game to enhance en-
Week Multiconference, 2016, pp. 1–8. gagement in primary school learning, in: Proc. 2022 IEEE International
[139] R. Baruah, AR and VR using the WebXR API: learn to create immer- Symposium on Multimedia (ISM), 2022, pp. 181–184.
sive content with WebGL, Three. js, and A-Frame, Singapore, Springer, [162] P. Winter, A. H. Lorimer, P. Snyder, B. Livshits, What’s in your wallet?
2021. privacy and security issues in Web 3.0, arXiv:2109.06836 (Feb. 2021).
[140] V. Munday, Introduction to web 3d technolo- [163] The Interconnection Between Blockchain, AI, and Personal
gies, https://medium.com/varvara.munday/ Data Privacy, https://medium.com/@metasecond.ai/
introduction-to-web-3d-technologies-a26b1dc68454/. metasecond-ai-use-case-story-ai-in-personal-data-privacy/
(2019). . (2023).
[141] D. Fan, T. Liang, H. He, M. Guo, M. Wang, Large-scale oceanic dy- [164] M. Ragnedda, G. Destefanis, Blockchain and Web 3.0, London: Rout-
namic field visualization based on webgl, IEEE Access 11 (Aug. 2021) ledge, Taylor and Francis Group, 2019.
82816–82829. [165] M. Grieco, Webassembly tutorial, https://www.youtube.com/
[142] L. Stemkoski, M. Pascale, Developing Graphics Frameworks with watch?v=_8T9T6MQ1fU/. (2022).
Python and OpenGL, Netherlands, Taylor & Francis, 2021. [166] Mozilla Developer Network, Webassembly, https://developer.
[143] Z. Mateusz, M. Cezary, Web 3d programming: Past, present and mozilla.org/en-US/docs/WebAssembly/. (2023).
future, https://emphie.com/insights/web-3d-programming5/ [167] T. Hollebeek, Quantum computing is coming out of the shad-
. (2023). ows. Web3 should be scared, https://forkast.news/
[144] S. Discher, R. Richter, J. Döllner, Concepts and techniques for web- web3-quantum-computing-fears/. (2023).
based visualization and processing of massive 3d point clouds with se- [168] X. Sun, F. R. Yu, P. Zhang, Z. Sun, W. Xie, X. Peng, A survey on Zero-
mantics, Graphical Models 104 (Jul. 2019) 101036–101048. Knowledge-Proof in blockchain, IEEE Network 35 (4) (Aug. 2021)
[145] Opc, The 4 technologies that will make web 3.0 a reality, https:// 198–205.
www.makeuseof.com/technologies-web-3-0/. (2021). [169] M. Shen, Z. Tan, D. Niyato, Y. Liu, J. Kang, Z. Xiong, L. Zhu, W. Wang,
[146] P. Plex, Everything you need to know about web 3.0 and its impact on et al., Artificial intelligence for web 3.0: A comprehensive survey,
your business, https://pixelplex.io/blog/what-is-web-3-0/ arXiv:2309.09972 (Aug. 2023).
. (2023).
[147] C. et al., The Spatial Web and Web 3.0, https://www2.deloitte.
com/us/en/insights/topics/digital-transformation/
web-3-0-technologies-in-business.html/. (2020).
[148] S. Van Nguyen, S. T. Le, M. K. Tran, H. M. Tran, Reconstruction of 3D
digital heritage objects for VR and AR applications, Journal of Informa-
tion and Telecommunication 6 (3) (Dec. 2022) 254–269.
[149] J. Flotynski, D. Brutzman, F. G. Hamza-Lup, A. Malamos, N. Polys,
L. F. Sikos, K. Walczak, The semantic web3d: towards comprehensive
representation of 3D content on the semantic web, in: Proc. 2019 Inter-
national Conference on 3D Immersion (IC3D), 2019, pp. 1–9.
[150] F. Qin, S. Gao, X. Yang, M. Li, J. Bai, An ontology-based semantic
retrieval approach for heterogeneous 3d cad models, Advanced Engi-
neering Informatics 30 (4) (Oct. 2016) 751–768.
[151] S. E. Kim, M. W. Lee, C. H. Jung, C. S. Park, J. M. Kim, S. P. Lee,
Representation of vr-based health information for smart city, in: Proc.
25th International Conference on 3D Web Technology, 2020, pp. 1–7.
[152] Z. Ma, Y. Ding, P. Yue, L. Zhang, Y. Liang, Y. Deng, Research and ap-
plication of 3D visualization technology of borehole data based on We-
bGL, in: Proc. 2021 IEEE Conference on Telecommunications, Optics
and Computer Science (TOCS), Dec. 2021, pp. 978–983.
[153] L. Li, X. Qiao, Q. Lu, P. Ren, R. Lin, Rendering optimization for mo-

34
Author Biography

Md Arif Hassan received his B.Sc. in Network Technology and Cyber Security
from Lincoln University College, Malaysia, in 2018; and his master’s degree in
cyber security from the National University of Malaysia in 2021. He is currently
pursuing a Ph.D. degree at the School of Electrical and Data Engineering at the
University of Technology Sydney (UTS), Australia. His research interests include
cyber security, Fintech security, blockchain technology, and Web 3.0.
Mohammad (Behdad) Jamshidi (M'12, SM'23) is a distinguished scientist
recognized by Stanford University for his contributions to AI and communication
technologies 3 times (2022-2024). He is the Chair of the IEEE-SB at the
University of Technology Sydney, Australia. He has been recognized as a Highly
Skilled Tech Developer by 25 EU countries through the Blue Card Program since
2022. He made significant research contributions to aerospace components of
NASA's PCoE across international institutions (2017-2021). Behdad has
authored 60+ papers, including several Highly Cited papers in prestigious
journals and IEEE conferences. Additionally, he has authored two book chapters
and holds five IR patents.

Dinh Thai Hoang (M’16, SM’22) is currently a faculty member at the School of
Electrical and Data Engineering, University of Technology Sydney, Australia. He
received his Ph.D. in Computer Science and Engineering from the Nanyang
Technological University, Singapore 2016. His research interests include
emerging wireless communications and networking topics, especially machine
learning applications in networking, edge computing, and cybersecurity. He has
received several precious awards, including the Australian Research Council
Discovery Early Career Researcher Award, IEEE TCSC Award for Excellence in
Scalable Computing for Contributions on “Intelligent Mobile Edge Computing
Systems” (Early Career Researcher), IEEE Asia-Pacific Board (APB)
Outstanding Paper Award 2022, and IEEE Communications Society Best Survey
Paper Award 2023. He is currently an Editor of IEEE TMC, IEEE TWC, and
IEEE TNSE.

Nguyen Quang Hieu received the B.E. degree in Hanoi University of Science
Technology, Vietnam in 2018. He is currently a Ph.D. student at School of
Electrical and Data Engineering, University of Technology (UTS), Sydney,
Australia. Before joining UTS, he was a research assistant at School of Computer
Science and Engineering, Nanyang Technological University, Singapore. His
research interest includes wireless communications and machine learning.
Bui Duc Manh received a Bachelor's in Electronic and Communication
Engineering from VNU-University of Engineering Technology in 2023. He is
currently a M.Sc research student at the School of Electrical and Data
Engineering, University of Technology Sydney (UTS), Sydney, Australia.
Despite e being a very young researcher, Mr Manh received two research awards
for prospective research students at Vietnam National University (1st ranking in
Vietnam) for his significant work in the field of cybersecurity in 2023. His
research interests include cybersecurity and privacy-preserving machine learning.

Chi-Hieu Nguyen received his B.E. degree in Information Systems and his M.S.
degree in Computer Science from the Hanoi University of Science and
Technology, Vietnam, in 2020 and 2022, respectively. He is currently pursuing a
Ph.D. degree at the School of Electrical and Data Engineering at the University
of Technology Sydney (UTS), Australia. His research interests include privacy-
preserving deep learning, deep reinforcement learning, mobile edge computing,
and IoT networks.

Cong T. Nguyen is a researcher and lecturer at the Institute of Fundamental and


Applied Sciences and the Faculty of Information Technology, Duy Tan
University, Vietnam. His research interests include blockchain technology, game
theory, optimization, and operational research. He received his BS degree from
Frankfurt University of Applied Sciences, Germany, MS degree from Technical
University Berlin, Germany, and PhD degree from the University of Technology
Sydney (UTS), Australia.

Nam H. Chu received the Ph.D. degree in Electrical and Computer Engineering
from the University of Technology Sydney, Australia. He is currently with the
School of Electrical and Data Engineering, UTS. He is also a Faculty Member of
the Department of Telecommunications Engineering, University of Transport and
Communications, Hanoi, Vietnam. His research interests include applying
advanced machine learning and optimization methods for wireless
communications. He was the co-recipient of the Computer Networks 2021 Best
Paper Award.
Nguyen Van Huynh (Member, IEEE) received the Ph.D. Degree in Electrical
and Computer Engineering from the University of Technology Sydney (UTS),
Australia in 2022. He is currently a Lecturer at the Department of Electrical
Engineering and Electronics, University of Liverpool, Liverpool, L69 3GJ,
United Kingdom. Before joining UoL, he was a Postdoctoral Research Associate
in the Department of Electrical and Electronic Engineering, Imperial College
London, United Kingdom. His research interests include mobile computing,
5G/6G, IoT, and machine learning. He is currently an Associate Editor of IEEE
Transactions on Vehicular Technology.

Mohammad Abu Alsheikh is an Associate Professor and IEEE Senior Member


at the University of Canberra (UC), Australia. Before that, he was a Postdoctoral
Researcher at the Massachusetts Institute of Technology (MIT), USA. He
received a Ph.D. degree from Nanyang Technological University (NTU),
Singapore. He has received numerous awards and recognitions, including the
2021 SciTech Mentorship Excellence Award, the 2020 ARC DECRA
Fellowship, and the 2020 UC Early Career Researcher Excellence Award. His
research focuses on the Internet of Things and data privacy.
Click here to access/download;Author Photo;Mohammad
(Behdad) Jamshidi .jpeg
Click here to access/download;Author Photo;Chi Hieu
Nguyen.jpg
Click here to access/download;Author Photo;Cong T Nguyen.jpg
Click here to access/download;Author Photo;Diep N
Nguyen.PNG
Click here to access/download;Author Photo;Dinh Thai Hoang
.jpg
Click here to access/download;Author Photo;Nguyen Quang
Hieu.jpg
Click here to access/download;Author Photo;Nguyen Van
Huynh.JPG
Click here to access/download;Author Photo;Mohammad Abu Alsheikh .jpg
Click here to access/download;Author Photo;Nam H Chu.jpg
Click here to access/download;Author Photo;Md Arif Hassan .jpg
Click here to access/download;Author Photo;Bui Duc Manh.jpg
Declaration of Interest Statement

Declaration of interests

☒The authors declare that they have no known competing financial interests or personal relationships
that could have appeared to influence the work reported in this paper.

☐The authors declare the following financial interests/personal relationships which may be considered
as potential competing interests:

You might also like