SlideShare una empresa de Scribd logo
1 de 19
A decentralized
authentication model for
the metaverse using AI-
Based blockchain technology
RESEARCH TOPIC
Muhammad Zeeshan Arshad
1
Table of Contents
1. Title Page
2. Introduction
3. Problem Statement
4. Research Questions
5. Scope of Research
6. Literature Review (Table)
7. Proposed Methodology of Research (framework)
8. Expected Results
9. Thesis Timeline
10. References
11. Curriculum Vitae of MS Scholar
12. Undertaking
2
2-INTRODUCTION
1. Metaverse
“Metaverse is the universe that lies beyond the real universe, virtual with persistent
multiuser environment merging both digital and physical world.”
2. AI-Blockchain
“Blockchain as a decentralized platform with distributed ledger database can bring a
blend of centralized and distributed ecosystem. ”
3. Blockchain-Metaverse convergence
“Many blockchain-based systems now use non-fungible tokens and cryptocurrency to
create, own, and monetize decentralized digital assets. Due to the inherent flaws of
centralized data storage, blockchain exists as a decentralized, distributed database
secured by encryption, allowing users access to any digital place, particularly in a
blockchain-based metaverse. ”
3
2-INTRODUCTION
• Title
A decentralized
authentication model for
the metaverse using AI-
Based blockchain technology
• Significance
Immutable AI models
empower the authentication
mechanism with better
efficiency and seamless user
experience to the metaverse
users. [1]
• Literature Review
• Research Gap
With respect to the above Literature
Review centralized authentication
framework needs to be formulated for
metaverse users to provide Immersive
and Continuous User experience.
• Research Question
How to integrate
blockchain with AI in
metaverse?
No Category Factors
1 Knowledge Password [2]
2 Knowledge key [3]
3 Biometric physiology [4]
4 Biometric Behavior [5]
5 Knowledge+Biometric Multi-factor [6]
4
3-PROBLEM STATEMENT
1. Authentication in re-logging in metaverse
2. Lack of immersive user experience
3. Different authentication mechanism for different metaverse
enabled environments
4. Attacks on AI based frameworks (Adversarial AI)
5
4-RESEARCH QUESTIONS
1. How to integrate blockchain with AI in metaverse?
2. How blockchain based strategy can be efficient with
respect to authentication?
3. Which environment can be used to test the efficiency?
4. What ML model can be efficient for handling
authentication issue in Blockchain assisted metaverse
system?
5. What are the metrics that can be efficient for testing the
proposed ML based methodology?
6. Which dataset is suitable to test in the environment of
blockchain assisted metaverse application? 6
5-STATEMENT OF OBJECTIVES
1. Integration of AI model with blockchain
2. Formulate an authentication framework which
provide a seamless user experience for metaverse
applications
3. Find which database is best suitable for the
authentication for users in metaverse.
4. Find the best metrics for the proposed framework
7
6-SCOPE OF RESEARCH
A decentralized authentication model for the metaverse using AI-Based blockchain technology
No Research Question Research Objective Methodology Outcome
1
How to integrate blockchain
with AI in metaverse?
Integration of AI model with
blockchain (Objective 1)
a. Literature search
b. Systematic Literature Review
c. Proof of concept
Literature collected about the
fusion of Blockchain and AI
and integration with Metaverse
2
How blockchain based strategy
can be efficient with respect to
authentication?
Formulate an authentication
framework which provide a
seamless user experience for
metaverse applications (Objective
2)
a. Data collection
b. Initial Framework Design
c. Final Framework Design
d. Proof of concept
AI-Blockchain based
authentication framework
3
Which environment can be
used to test the efficiency?
Find which database is best
suitable for the authentication for
users in metaverse (Objective 3)
a. Training of AI model
b. Perform Simulation Setup of testing environment
4
What ML model can be
efficient for handling
authentication issue in
Blockchain assisted metaverse
system?
Integration of AI model with
blockchain (Objective 1)
a. Literature search
b. Systematic Literature Review
c. Proof of concept
Literature collected about the
fusion of Blockchain and AI
and integration with Metaverse
5
What are the metrics that can
be efficient for testing the
proposed ML based
methodology?
Find the best metrics for the
proposed framework (Objective 4)
a. Testing Framework using
simulation
b. Validating and Tunning
Simulated Prototype of
Authentication Framework for
metaverse
6
Which dataset is suitable to
test in the environment of
blockchain assisted metaverse
application?
Find which database is best
suitable for the authentication for
users in metaverse (Objective 3)
a. Training of AI model
b. Perform Simulation Setup of testing environment 8
7-LITERATURE REVIEW
03
04
05
Trusted AI with Blockchain to Empower Metaverse –
Secure AI training and AI deployed model [1].
01
02 Password-Authenticated Decentralized Identities - self-
sovereign username-password pairs [2]
OcuLock: Exploring Human Visual System for
Authentication in Virtual Reality Headmounted Display –
Authentication between devices [4]
PrivBioMTAuth: Privacy Preserving Biometrics-Based and
User Centric Protocol for User Authentication From Mobile
Phones. – Required Password and keep the system as a
key [6]
Design of Secure Mutual Authentication Scheme
for Metaverse Environments Using Blockchain – Identity
based Authentication [7]
9
7-LITERATURE REVIEW (Table)
No Category Factors Virtual Physical Immersive Continous Mutual session key
1 Knowledge Password [2] Yes No No No Yes Yes
2 Knowledge Key [3] No Yes Yes Yes Yes Yes
3 Biometric Physiology [4] Yes Yes Yes No No No
4 Biometric Behavior [5] Yes Yes Yes Yes No No
5 Knowledge + Biometric Multi-factor [6] Yes Yes No No Yes Yes
10
8-PROPOSED SOLUTION
AI BLOCKCHAIN
METAVERSE
01
02 03
AUTHENTICATION
11
12
12
8.1-PROTOCOL FOR DATA COLLECTION
• Best suitable ML model (Based on Performance and accuracy)
• Finding best dataset for model training ( Kaggle )
• Integration of blockchain and AI ( SLR )
• Feature Extraction (Huggyfaces, SIFT, SURF and OpenCV)
13
9-EXPECTED RESULTS
01 02 03 04
USER
Authentication
paramets
AI MODEL Authentication
For multiple
metaverse
environments
METAVERSE
Immersive user
experience
Prediction
based auth
14
10-TIMELINE
Months/Stages Oct 2022 Nov. 2022 Dec. 2022 Jan. 2023 Feb. 2023 Mar. 2023 May. 2023
Literature
review
Literature
review
Problem
formulation
Problem
formulation
Solving
Problem
Solving
Problem
Paper
Submission
Paper
Submission
More
extensions of
problem
More
extensions
of problem
Write up and
submission of
thesis
Write up
Submission
of thesis
15
11-REFERENCES
1. Badruddoja, S., Dantu, R., He, Y., Thompson, M., Salau, A., & Upadhyay, K. (2022, September). Trusted AI with
Blockchain to Empower Metaverse. In 2022 Fourth International Conference on Blockchain Computing and
Applications (BCCA) (pp. 237-244). IEEE.
2. Szalachowski, P. (2021). Password-Authenticated Decentralized Identities. IEEE Transactions on Information
Forensics and Security, 16, 4801-4810..
3. Gope, P., & Sikdar, B. (2018). Lightweight and privacy-preserving two-factor authentication scheme for IoT
devices. IEEE Internet of Things Journal, 6(1), 580-589.
4. Luo, S., Nguyen, A., Song, C., Lin, F., Xu, W., & Yan, Z. (2020, January). OcuLock: Exploring human visual system for
authentication in virtual reality head-mounted display. In 2020 Network and Distributed System Security
Symposium (NDSS).
5. Lee, S., Choi, W., & Lee, D. H. (2021, November). Usable user authentication on a smartwatch using vibration. In
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security (pp. 304-319).
6. Gunasinghe, H., & Bertino, E. (2017). PrivBioMTAuth: Privacy preserving biometrics-based and user centric
protocol for user authentication from mobile phones. IEEE Transactions on Information Forensics and Security,
13(4), 1042-1057.
7. Ryu, J., Son, S., Lee, J., Park, Y., & Park, Y. (2022). Design of Secure Mutual Authentication Scheme for
Metaverse Environments Using Blockchain. Ieee Access, 10, 98944-98958.
16
Curriculum Vitae of MS Scholar
Name: Muhammad Zeeshan Arshad
Father’s Name: Muhammad Arshad khokhar
Registration Number: 211824
Contact Information:
Address: Flat no A-38/12, PAF Complex E-9, Islamabad.
Phone: 0334-5088829
E-mail(s): 211824@students.au.edu.pk
Specialization Area: Blockchain, Machine Learning, Metaverse
17
Undertaking
I certify that the research work titled “A decentralized authentication model
for the metaverse using AI-Based blockchain technology” is my own work.
The work has not been presented elsewhere for assessment in whole or in
part, and where the material has been used from other sources, it has been
properly acknowledged/referred.
18
Blockchain

Más contenido relacionado

Similar a Blockchain

Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...
Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...
Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...
ijtsrd
 
sweeney_brendan-css527-20141118-research_proposal
sweeney_brendan-css527-20141118-research_proposalsweeney_brendan-css527-20141118-research_proposal
sweeney_brendan-css527-20141118-research_proposal
Brendan Sweeney
 
Titles with Abstracts_2023-2024_Block Chain.pdf
Titles with Abstracts_2023-2024_Block Chain.pdfTitles with Abstracts_2023-2024_Block Chain.pdf
Titles with Abstracts_2023-2024_Block Chain.pdf
info751436
 

Similar a Blockchain (20)

IRJET- A Survey on IoT Reference Architecture with Block Chain for Automatic ...
IRJET- A Survey on IoT Reference Architecture with Block Chain for Automatic ...IRJET- A Survey on IoT Reference Architecture with Block Chain for Automatic ...
IRJET- A Survey on IoT Reference Architecture with Block Chain for Automatic ...
 
Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...
Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...
Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...
 
Block yber.pptx
Block yber.pptxBlock yber.pptx
Block yber.pptx
 
Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...
Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...
Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...
 
sweeney_brendan-css527-20141118-research_proposal
sweeney_brendan-css527-20141118-research_proposalsweeney_brendan-css527-20141118-research_proposal
sweeney_brendan-css527-20141118-research_proposal
 
IRJET - Improving Password System using Blockchain
IRJET - Improving Password System using BlockchainIRJET - Improving Password System using Blockchain
IRJET - Improving Password System using Blockchain
 
Build Blockchain Prototype using Azure Workbench and Manage data on ledger
Build Blockchain Prototype using Azure Workbench and Manage data on ledgerBuild Blockchain Prototype using Azure Workbench and Manage data on ledger
Build Blockchain Prototype using Azure Workbench and Manage data on ledger
 
IRJET- Blockchain based Certificate Issuing and Validation
IRJET-  	  Blockchain based Certificate Issuing and ValidationIRJET-  	  Blockchain based Certificate Issuing and Validation
IRJET- Blockchain based Certificate Issuing and Validation
 
Ieee 2020 21 blockchain in pondicherry,final year projects in pondicherry,bes...
Ieee 2020 21 blockchain in pondicherry,final year projects in pondicherry,bes...Ieee 2020 21 blockchain in pondicherry,final year projects in pondicherry,bes...
Ieee 2020 21 blockchain in pondicherry,final year projects in pondicherry,bes...
 
Adoption Blockchain Smart Contracts in Developing Information Systems.pdf
Adoption Blockchain Smart Contracts in Developing Information Systems.pdfAdoption Blockchain Smart Contracts in Developing Information Systems.pdf
Adoption Blockchain Smart Contracts in Developing Information Systems.pdf
 
Researching Decentralised AI_ Harnessing Blockchain and AI's Potential.pdf
Researching Decentralised AI_ Harnessing Blockchain and AI's Potential.pdfResearching Decentralised AI_ Harnessing Blockchain and AI's Potential.pdf
Researching Decentralised AI_ Harnessing Blockchain and AI's Potential.pdf
 
Blockchain for AI: Review and Open. Research Challenges K. SALAH, M. H. REHMA...
Blockchain for AI: Review and Open. Research Challenges K. SALAH, M. H. REHMA...Blockchain for AI: Review and Open. Research Challenges K. SALAH, M. H. REHMA...
Blockchain for AI: Review and Open. Research Challenges K. SALAH, M. H. REHMA...
 
University of Borås-full talk-2023-12-09.pptx
University of Borås-full talk-2023-12-09.pptxUniversity of Borås-full talk-2023-12-09.pptx
University of Borås-full talk-2023-12-09.pptx
 
Decentralised AI through Distributed Ledger Technologies
Decentralised AI through Distributed Ledger Technologies Decentralised AI through Distributed Ledger Technologies
Decentralised AI through Distributed Ledger Technologies
 
6.designing secure and efficient biometric based secure access mechanism for ...
6.designing secure and efficient biometric based secure access mechanism for ...6.designing secure and efficient biometric based secure access mechanism for ...
6.designing secure and efficient biometric based secure access mechanism for ...
 
Cloud computing projects
Cloud computing projects Cloud computing projects
Cloud computing projects
 
Titles with Abstracts_2023-2024_Block Chain.pdf
Titles with Abstracts_2023-2024_Block Chain.pdfTitles with Abstracts_2023-2024_Block Chain.pdf
Titles with Abstracts_2023-2024_Block Chain.pdf
 
Fake Certificate Detection by using Blockchain
Fake Certificate Detection by using BlockchainFake Certificate Detection by using Blockchain
Fake Certificate Detection by using Blockchain
 
IRJET - Privacy Preserving Keyword Search over Encrypted Data in the Cloud
IRJET -  	  Privacy Preserving Keyword Search over Encrypted Data in the CloudIRJET -  	  Privacy Preserving Keyword Search over Encrypted Data in the Cloud
IRJET - Privacy Preserving Keyword Search over Encrypted Data in the Cloud
 
IRJET- Survey on Blockchain based Digital Certificate System
IRJET- Survey on Blockchain based Digital Certificate SystemIRJET- Survey on Blockchain based Digital Certificate System
IRJET- Survey on Blockchain based Digital Certificate System
 

Último

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 

Último (20)

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 

Blockchain

  • 1. A decentralized authentication model for the metaverse using AI- Based blockchain technology RESEARCH TOPIC Muhammad Zeeshan Arshad 1
  • 2. Table of Contents 1. Title Page 2. Introduction 3. Problem Statement 4. Research Questions 5. Scope of Research 6. Literature Review (Table) 7. Proposed Methodology of Research (framework) 8. Expected Results 9. Thesis Timeline 10. References 11. Curriculum Vitae of MS Scholar 12. Undertaking 2
  • 3. 2-INTRODUCTION 1. Metaverse “Metaverse is the universe that lies beyond the real universe, virtual with persistent multiuser environment merging both digital and physical world.” 2. AI-Blockchain “Blockchain as a decentralized platform with distributed ledger database can bring a blend of centralized and distributed ecosystem. ” 3. Blockchain-Metaverse convergence “Many blockchain-based systems now use non-fungible tokens and cryptocurrency to create, own, and monetize decentralized digital assets. Due to the inherent flaws of centralized data storage, blockchain exists as a decentralized, distributed database secured by encryption, allowing users access to any digital place, particularly in a blockchain-based metaverse. ” 3
  • 4. 2-INTRODUCTION • Title A decentralized authentication model for the metaverse using AI- Based blockchain technology • Significance Immutable AI models empower the authentication mechanism with better efficiency and seamless user experience to the metaverse users. [1] • Literature Review • Research Gap With respect to the above Literature Review centralized authentication framework needs to be formulated for metaverse users to provide Immersive and Continuous User experience. • Research Question How to integrate blockchain with AI in metaverse? No Category Factors 1 Knowledge Password [2] 2 Knowledge key [3] 3 Biometric physiology [4] 4 Biometric Behavior [5] 5 Knowledge+Biometric Multi-factor [6] 4
  • 5. 3-PROBLEM STATEMENT 1. Authentication in re-logging in metaverse 2. Lack of immersive user experience 3. Different authentication mechanism for different metaverse enabled environments 4. Attacks on AI based frameworks (Adversarial AI) 5
  • 6. 4-RESEARCH QUESTIONS 1. How to integrate blockchain with AI in metaverse? 2. How blockchain based strategy can be efficient with respect to authentication? 3. Which environment can be used to test the efficiency? 4. What ML model can be efficient for handling authentication issue in Blockchain assisted metaverse system? 5. What are the metrics that can be efficient for testing the proposed ML based methodology? 6. Which dataset is suitable to test in the environment of blockchain assisted metaverse application? 6
  • 7. 5-STATEMENT OF OBJECTIVES 1. Integration of AI model with blockchain 2. Formulate an authentication framework which provide a seamless user experience for metaverse applications 3. Find which database is best suitable for the authentication for users in metaverse. 4. Find the best metrics for the proposed framework 7
  • 8. 6-SCOPE OF RESEARCH A decentralized authentication model for the metaverse using AI-Based blockchain technology No Research Question Research Objective Methodology Outcome 1 How to integrate blockchain with AI in metaverse? Integration of AI model with blockchain (Objective 1) a. Literature search b. Systematic Literature Review c. Proof of concept Literature collected about the fusion of Blockchain and AI and integration with Metaverse 2 How blockchain based strategy can be efficient with respect to authentication? Formulate an authentication framework which provide a seamless user experience for metaverse applications (Objective 2) a. Data collection b. Initial Framework Design c. Final Framework Design d. Proof of concept AI-Blockchain based authentication framework 3 Which environment can be used to test the efficiency? Find which database is best suitable for the authentication for users in metaverse (Objective 3) a. Training of AI model b. Perform Simulation Setup of testing environment 4 What ML model can be efficient for handling authentication issue in Blockchain assisted metaverse system? Integration of AI model with blockchain (Objective 1) a. Literature search b. Systematic Literature Review c. Proof of concept Literature collected about the fusion of Blockchain and AI and integration with Metaverse 5 What are the metrics that can be efficient for testing the proposed ML based methodology? Find the best metrics for the proposed framework (Objective 4) a. Testing Framework using simulation b. Validating and Tunning Simulated Prototype of Authentication Framework for metaverse 6 Which dataset is suitable to test in the environment of blockchain assisted metaverse application? Find which database is best suitable for the authentication for users in metaverse (Objective 3) a. Training of AI model b. Perform Simulation Setup of testing environment 8
  • 9. 7-LITERATURE REVIEW 03 04 05 Trusted AI with Blockchain to Empower Metaverse – Secure AI training and AI deployed model [1]. 01 02 Password-Authenticated Decentralized Identities - self- sovereign username-password pairs [2] OcuLock: Exploring Human Visual System for Authentication in Virtual Reality Headmounted Display – Authentication between devices [4] PrivBioMTAuth: Privacy Preserving Biometrics-Based and User Centric Protocol for User Authentication From Mobile Phones. – Required Password and keep the system as a key [6] Design of Secure Mutual Authentication Scheme for Metaverse Environments Using Blockchain – Identity based Authentication [7] 9
  • 10. 7-LITERATURE REVIEW (Table) No Category Factors Virtual Physical Immersive Continous Mutual session key 1 Knowledge Password [2] Yes No No No Yes Yes 2 Knowledge Key [3] No Yes Yes Yes Yes Yes 3 Biometric Physiology [4] Yes Yes Yes No No No 4 Biometric Behavior [5] Yes Yes Yes Yes No No 5 Knowledge + Biometric Multi-factor [6] Yes Yes No No Yes Yes 10
  • 12. 12 12
  • 13. 8.1-PROTOCOL FOR DATA COLLECTION • Best suitable ML model (Based on Performance and accuracy) • Finding best dataset for model training ( Kaggle ) • Integration of blockchain and AI ( SLR ) • Feature Extraction (Huggyfaces, SIFT, SURF and OpenCV) 13
  • 14. 9-EXPECTED RESULTS 01 02 03 04 USER Authentication paramets AI MODEL Authentication For multiple metaverse environments METAVERSE Immersive user experience Prediction based auth 14
  • 15. 10-TIMELINE Months/Stages Oct 2022 Nov. 2022 Dec. 2022 Jan. 2023 Feb. 2023 Mar. 2023 May. 2023 Literature review Literature review Problem formulation Problem formulation Solving Problem Solving Problem Paper Submission Paper Submission More extensions of problem More extensions of problem Write up and submission of thesis Write up Submission of thesis 15
  • 16. 11-REFERENCES 1. Badruddoja, S., Dantu, R., He, Y., Thompson, M., Salau, A., & Upadhyay, K. (2022, September). Trusted AI with Blockchain to Empower Metaverse. In 2022 Fourth International Conference on Blockchain Computing and Applications (BCCA) (pp. 237-244). IEEE. 2. Szalachowski, P. (2021). Password-Authenticated Decentralized Identities. IEEE Transactions on Information Forensics and Security, 16, 4801-4810.. 3. Gope, P., & Sikdar, B. (2018). Lightweight and privacy-preserving two-factor authentication scheme for IoT devices. IEEE Internet of Things Journal, 6(1), 580-589. 4. Luo, S., Nguyen, A., Song, C., Lin, F., Xu, W., & Yan, Z. (2020, January). OcuLock: Exploring human visual system for authentication in virtual reality head-mounted display. In 2020 Network and Distributed System Security Symposium (NDSS). 5. Lee, S., Choi, W., & Lee, D. H. (2021, November). Usable user authentication on a smartwatch using vibration. In Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security (pp. 304-319). 6. Gunasinghe, H., & Bertino, E. (2017). PrivBioMTAuth: Privacy preserving biometrics-based and user centric protocol for user authentication from mobile phones. IEEE Transactions on Information Forensics and Security, 13(4), 1042-1057. 7. Ryu, J., Son, S., Lee, J., Park, Y., & Park, Y. (2022). Design of Secure Mutual Authentication Scheme for Metaverse Environments Using Blockchain. Ieee Access, 10, 98944-98958. 16
  • 17. Curriculum Vitae of MS Scholar Name: Muhammad Zeeshan Arshad Father’s Name: Muhammad Arshad khokhar Registration Number: 211824 Contact Information: Address: Flat no A-38/12, PAF Complex E-9, Islamabad. Phone: 0334-5088829 E-mail(s): 211824@students.au.edu.pk Specialization Area: Blockchain, Machine Learning, Metaverse 17
  • 18. Undertaking I certify that the research work titled “A decentralized authentication model for the metaverse using AI-Based blockchain technology” is my own work. The work has not been presented elsewhere for assessment in whole or in part, and where the material has been used from other sources, it has been properly acknowledged/referred. 18

Notas del editor

  1. [2] designed a password-authenticated decentralized identity by which users register their self-sovereign username-password pairs and use them as universal credentials. This kind of password-authenticated method can realize the security authentication between the device and the service provider. However, these methods require the user to enter a password during the authentication process, which fails to achieve immersive authentication [4] Current mutual authentication schemes primarily focus on onetime authentication between devices as in and have not yet considered dynamic authentication between avatars [6] introduces a three-factor authentication scheme based on a signed identity token that encodes the user’s biometric identifier and the password entered by the user into the token. Although this method requires users to enter a password during the authentication process
  2. [2] designed a password-authenticated decentralized identity by which users register their self-sovereign username-password pairs and use them as universal credentials. This kind of password-authenticated method can realize the security authentication between the device and the service provider. However, these methods require the user to enter a password during the authentication process, which fails to achieve immersive authentication [4] Current mutual authentication schemes primarily focus on onetime authentication between devices as in and have not yet considered dynamic authentication between avatars [6] introduces a three-factor authentication scheme based on a signed identity token that encodes the user’s biometric identifier and the password entered by the user into the token. Although this method requires users to enter a password during the authentication process