2. Table of Contents
1. Title Page
2. Introduction
3. Problem Statement
4. Research Questions
5. Scope of Research
6. Literature Review (Table)
7. Proposed Methodology of Research (framework)
8. Expected Results
9. Thesis Timeline
10. References
11. Curriculum Vitae of MS Scholar
12. Undertaking
2
3. 2-INTRODUCTION
1. Metaverse
“Metaverse is the universe that lies beyond the real universe, virtual with persistent
multiuser environment merging both digital and physical world.”
2. AI-Blockchain
“Blockchain as a decentralized platform with distributed ledger database can bring a
blend of centralized and distributed ecosystem. ”
3. Blockchain-Metaverse convergence
“Many blockchain-based systems now use non-fungible tokens and cryptocurrency to
create, own, and monetize decentralized digital assets. Due to the inherent flaws of
centralized data storage, blockchain exists as a decentralized, distributed database
secured by encryption, allowing users access to any digital place, particularly in a
blockchain-based metaverse. ”
3
4. 2-INTRODUCTION
• Title
A decentralized
authentication model for
the metaverse using AI-
Based blockchain technology
• Significance
Immutable AI models
empower the authentication
mechanism with better
efficiency and seamless user
experience to the metaverse
users. [1]
• Literature Review
• Research Gap
With respect to the above Literature
Review centralized authentication
framework needs to be formulated for
metaverse users to provide Immersive
and Continuous User experience.
• Research Question
How to integrate
blockchain with AI in
metaverse?
No Category Factors
1 Knowledge Password [2]
2 Knowledge key [3]
3 Biometric physiology [4]
4 Biometric Behavior [5]
5 Knowledge+Biometric Multi-factor [6]
4
5. 3-PROBLEM STATEMENT
1. Authentication in re-logging in metaverse
2. Lack of immersive user experience
3. Different authentication mechanism for different metaverse
enabled environments
4. Attacks on AI based frameworks (Adversarial AI)
5
6. 4-RESEARCH QUESTIONS
1. How to integrate blockchain with AI in metaverse?
2. How blockchain based strategy can be efficient with
respect to authentication?
3. Which environment can be used to test the efficiency?
4. What ML model can be efficient for handling
authentication issue in Blockchain assisted metaverse
system?
5. What are the metrics that can be efficient for testing the
proposed ML based methodology?
6. Which dataset is suitable to test in the environment of
blockchain assisted metaverse application? 6
7. 5-STATEMENT OF OBJECTIVES
1. Integration of AI model with blockchain
2. Formulate an authentication framework which
provide a seamless user experience for metaverse
applications
3. Find which database is best suitable for the
authentication for users in metaverse.
4. Find the best metrics for the proposed framework
7
8. 6-SCOPE OF RESEARCH
A decentralized authentication model for the metaverse using AI-Based blockchain technology
No Research Question Research Objective Methodology Outcome
1
How to integrate blockchain
with AI in metaverse?
Integration of AI model with
blockchain (Objective 1)
a. Literature search
b. Systematic Literature Review
c. Proof of concept
Literature collected about the
fusion of Blockchain and AI
and integration with Metaverse
2
How blockchain based strategy
can be efficient with respect to
authentication?
Formulate an authentication
framework which provide a
seamless user experience for
metaverse applications (Objective
2)
a. Data collection
b. Initial Framework Design
c. Final Framework Design
d. Proof of concept
AI-Blockchain based
authentication framework
3
Which environment can be
used to test the efficiency?
Find which database is best
suitable for the authentication for
users in metaverse (Objective 3)
a. Training of AI model
b. Perform Simulation Setup of testing environment
4
What ML model can be
efficient for handling
authentication issue in
Blockchain assisted metaverse
system?
Integration of AI model with
blockchain (Objective 1)
a. Literature search
b. Systematic Literature Review
c. Proof of concept
Literature collected about the
fusion of Blockchain and AI
and integration with Metaverse
5
What are the metrics that can
be efficient for testing the
proposed ML based
methodology?
Find the best metrics for the
proposed framework (Objective 4)
a. Testing Framework using
simulation
b. Validating and Tunning
Simulated Prototype of
Authentication Framework for
metaverse
6
Which dataset is suitable to
test in the environment of
blockchain assisted metaverse
application?
Find which database is best
suitable for the authentication for
users in metaverse (Objective 3)
a. Training of AI model
b. Perform Simulation Setup of testing environment 8
9. 7-LITERATURE REVIEW
03
04
05
Trusted AI with Blockchain to Empower Metaverse –
Secure AI training and AI deployed model [1].
01
02 Password-Authenticated Decentralized Identities - self-
sovereign username-password pairs [2]
OcuLock: Exploring Human Visual System for
Authentication in Virtual Reality Headmounted Display –
Authentication between devices [4]
PrivBioMTAuth: Privacy Preserving Biometrics-Based and
User Centric Protocol for User Authentication From Mobile
Phones. – Required Password and keep the system as a
key [6]
Design of Secure Mutual Authentication Scheme
for Metaverse Environments Using Blockchain – Identity
based Authentication [7]
9
10. 7-LITERATURE REVIEW (Table)
No Category Factors Virtual Physical Immersive Continous Mutual session key
1 Knowledge Password [2] Yes No No No Yes Yes
2 Knowledge Key [3] No Yes Yes Yes Yes Yes
3 Biometric Physiology [4] Yes Yes Yes No No No
4 Biometric Behavior [5] Yes Yes Yes Yes No No
5 Knowledge + Biometric Multi-factor [6] Yes Yes No No Yes Yes
10
13. 8.1-PROTOCOL FOR DATA COLLECTION
• Best suitable ML model (Based on Performance and accuracy)
• Finding best dataset for model training ( Kaggle )
• Integration of blockchain and AI ( SLR )
• Feature Extraction (Huggyfaces, SIFT, SURF and OpenCV)
13
14. 9-EXPECTED RESULTS
01 02 03 04
USER
Authentication
paramets
AI MODEL Authentication
For multiple
metaverse
environments
METAVERSE
Immersive user
experience
Prediction
based auth
14
15. 10-TIMELINE
Months/Stages Oct 2022 Nov. 2022 Dec. 2022 Jan. 2023 Feb. 2023 Mar. 2023 May. 2023
Literature
review
Literature
review
Problem
formulation
Problem
formulation
Solving
Problem
Solving
Problem
Paper
Submission
Paper
Submission
More
extensions of
problem
More
extensions
of problem
Write up and
submission of
thesis
Write up
Submission
of thesis
15
16. 11-REFERENCES
1. Badruddoja, S., Dantu, R., He, Y., Thompson, M., Salau, A., & Upadhyay, K. (2022, September). Trusted AI with
Blockchain to Empower Metaverse. In 2022 Fourth International Conference on Blockchain Computing and
Applications (BCCA) (pp. 237-244). IEEE.
2. Szalachowski, P. (2021). Password-Authenticated Decentralized Identities. IEEE Transactions on Information
Forensics and Security, 16, 4801-4810..
3. Gope, P., & Sikdar, B. (2018). Lightweight and privacy-preserving two-factor authentication scheme for IoT
devices. IEEE Internet of Things Journal, 6(1), 580-589.
4. Luo, S., Nguyen, A., Song, C., Lin, F., Xu, W., & Yan, Z. (2020, January). OcuLock: Exploring human visual system for
authentication in virtual reality head-mounted display. In 2020 Network and Distributed System Security
Symposium (NDSS).
5. Lee, S., Choi, W., & Lee, D. H. (2021, November). Usable user authentication on a smartwatch using vibration. In
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security (pp. 304-319).
6. Gunasinghe, H., & Bertino, E. (2017). PrivBioMTAuth: Privacy preserving biometrics-based and user centric
protocol for user authentication from mobile phones. IEEE Transactions on Information Forensics and Security,
13(4), 1042-1057.
7. Ryu, J., Son, S., Lee, J., Park, Y., & Park, Y. (2022). Design of Secure Mutual Authentication Scheme for
Metaverse Environments Using Blockchain. Ieee Access, 10, 98944-98958.
16
17. Curriculum Vitae of MS Scholar
Name: Muhammad Zeeshan Arshad
Father’s Name: Muhammad Arshad khokhar
Registration Number: 211824
Contact Information:
Address: Flat no A-38/12, PAF Complex E-9, Islamabad.
Phone: 0334-5088829
E-mail(s): 211824@students.au.edu.pk
Specialization Area: Blockchain, Machine Learning, Metaverse
17
18. Undertaking
I certify that the research work titled “A decentralized authentication model
for the metaverse using AI-Based blockchain technology” is my own work.
The work has not been presented elsewhere for assessment in whole or in
part, and where the material has been used from other sources, it has been
properly acknowledged/referred.
18
Notas del editor
[2] designed a password-authenticated decentralized identity by which users register their self-sovereign username-password pairs and use them as universal credentials. This kind of password-authenticated method can realize the security authentication between the device and the service provider. However, these methods require the user to enter a password during the authentication process, which fails to achieve immersive authentication
[4] Current mutual authentication schemes primarily focus on onetime authentication between devices as in and have not yet considered dynamic authentication between avatars
[6] introduces a three-factor authentication scheme based on a signed identity token that encodes the user’s biometric identifier and the password entered by the user into the token. Although this method requires users to enter a password during the authentication process
[2] designed a password-authenticated decentralized identity by which users register their self-sovereign username-password pairs and use them as universal credentials. This kind of password-authenticated method can realize the security authentication between the device and the service provider. However, these methods require the user to enter a password during the authentication process, which fails to achieve immersive authentication
[4] Current mutual authentication schemes primarily focus on onetime authentication between devices as in and have not yet considered dynamic authentication between avatars
[6] introduces a three-factor authentication scheme based on a signed identity token that encodes the user’s biometric identifier and the password entered by the user into the token. Although this method requires users to enter a password during the authentication process