Blockchain-Enabled Secure and Interoperable Authentication Scheme for Metaverse Environments
Abstract
:1. Introduction
1.1. Contribution
- We propose a system model to ensure interoperable and secure authentication among avatars, users, and devices that can address various identity-related security issues such as impersonation, server spoofing, lack of interoperability, mutual-authentication issues, replay, server spoofing, man-in-the-middle attacks, etc.
- We propose a blockchain-based decentralized authentication scheme, using a unique Meta-ID, called the Metaverse interoperable Identity Framework (MIF), which will map physical-user identities with avatar-virtual identities and establish a uniform identification mechanism across metaverses.
- We conduct an informal analysis to validate the proposed scheme’s ability to safeguard against diverse attacks, encompassing impersonation, server spoofing, replay, man-in-the-middle, and mutual-authentication attacks. Furthermore, we demonstrate the scheme’s capability to foster interoperability and facilitate seamless navigation across different metaverse environments.
- The security of the proposed system is evaluated through a combination of informal and formal analyses, including examinations using Burrows–Abadi–Nikoogadam (BAN) logic, the real-or-random (RoR) model, and the automated validation of internet security protocols and applications (AVISPA) simulation tool.
- Additionally, we conduct a comparative assessment of performance and security characteristics against relevant existing works, demonstrating the superiority of the proposed scheme.
1.2. Organization
2. Related Work
3. Preliminaries
3.1. Commercial Metaverse Platforms
3.2. Hyperledger Fabric
3.3. Smart Contracts
4. System Model
- Blockchain: In our system model, we have proposed the use of an enterprise blockchain platform—Hyperledger Fabric. This blockchain platform makes the identity mechanism completely decentralized. All devices, users, and avatars are registered on blockchain and are each assigned a unique ID called Meta-ID. Hyperledger Fabric helps in storing the authentication information securely. The blockchain is not owned by any single entity, making it unbiased, which can help in avoiding insider attacks. Hyperledger Fabric also gives us the flexibility to write our own smart contracts and plug in our own consensus mechanism.
- Metaverse platforms: Most of the metaverse platforms available today implement centralized identity mechanisms. The authentication mechanism on one metaverse platform is different from that on other platforms. In our proposed system, we implement decentralized identity using a blockchain identifier called Meta-ID. The metaverse platforms wanting to enhance identity-related security and to have authentication-mechanism uniformity across metaverses need to join this blockchain network. The blockchain-based Metaverse interoperable Identity Framework (MIF) will bring together multiple virtual and physical worlds.
- Certificate authority: The certificate authority is a trusted component in our system model. It ensures that unique Meta-IDs are assigned to all physical users, meta-persons, and devices. It is also responsible for initialization of the Metaverse interoperable Identity Framework and for syncing with all of the metaverse platforms that are connected to blockchain.
- User: User indicates a physical user like a student, employee, content creator, etc. The user will have an identity in the physical world such as an ID card, student roll number, employee ID, social security number, passport, etc. This physical ID will be mapped in Meta-ID to the virtual ID of an avatar or device. This will ensure that only the legitimate users enter the metaverse. The physical and behavioral attributes of each user will be mapped to an avatar in the virtual world. Other user information like email, phone number, etc., can be collected from the metaverse platform that each user registers on.
- Avatar: An avatar is a virtual representation of a user in the virtual world. Avatars have a unique ID associated with them. A user may create multiple avatars. Avatars are assigned a unique Meta-ID during the avatar-registration process. This helps them in avatar-to-avatar mutual authentication. It also helps in avatar-to-device mutual authentication.
- Device: Devices can be wearable devices that users in the physical world use to interact with virtual world. They can be AR or VR headsets, hand-held devices, smart glasses, or room-sized devices with multiple degrees of freedom. The device is registered against users and avatars. A unique Meta-ID is assigned to the device. This helps to avoid the stealing of devices or hijacking of device information.
- Meta-ID: A Meta-ID is the unique ID used to identify physical users, avatars, and devices across multiple metaverses. It is stored on blockchain to make it secure. Whenever a new avatar is created for the user, a new device is added by the user, the user enters a new metaverse platform, or any physical ID is updated for the user, the Meta-ID will be updated and then broadcast in all associated metaverse platforms to avoid security issues.
- Physical ID: A physical ID is proof that a physical user exists. The existing metaverse platforms consider authentication based on virtual IDs only. To map a physical ID with a virtual ID, in our system model, we collect proof of the Physical ID from the user during registration. Mapping a physical ID with each virtual identity will avoid attacks like avatar impersonation.
- Initialization: In the initialization phase, the CA initializes all of the system parameters, default users, avatars, etc. It syncs up all of the metaverse platforms, and all of the smart contracts are deployed in the MIF.
- User registration: Physical users can choose to register for a metaverse platform. In this phase, a user ID, a password, and other information is collected. The user is synced up with MIF through the metaverse platform server. The CA authorizes the user and then assigns a Meta-ID. This Meta-ID, a public key, and other relevant information about the user is stored in the blockchain for later verification.
- Device registration: A device registration process is required whenever any new device is identified for a user. A device ID, together with a user’s physical ID, is sent for registration to the MIF. The MIF maps physical IDs, avatars, and device IDs. MIF verifies a device and assigns a Meta-ID to it.
- Avatar generation: When the user has been registered to the metaverse platform and wants to navigate across the virtual world, avatar generation is required. One physical user might be associated with multiple avatars. An avatar ID is created and mapped to the user’s physical ID, and the relevant Meta-ID is assigned to an avatar. Using a public key, a session key, and an avatar ID, the user navigates across multiple metaverses.
- Login: During the user-registration phase, the user is assigned a Meta-ID that can be used in the login and authentication phases to uniquely identify this user. A session key is used during a logged-in session.
- Avatar and device mutual authentication: In the metaverse, avatars and devices can identify and interact with other avatars and devices using a Meta-ID. By using a Meta-ID, avatars and devices can interact not just within the same virtual world but within others as well.
Adversary Model
5. Proposed Scheme
5.1. Initialization Phase
5.2. User-Registration Phase
5.3. Avatar-Generation Phase
6. Security Analysis
6.1. Informal Security Analysis
- Impersonation attack: An adversary can create a fake login username, PU, and password, PW. However, it is not possible to get access to tokens, Ti, that are used at the time of user registration. Also, the Meta-ID that is a 256-bit hash used to uniquely identify users is also mapped to login credentials. To change the Meta-ID, consensus has to achieved in the blockchain network. So, it is not possible to manipulate it using an impersonation attack. Therefore, our scheme prevents impersonation attack.
- Replay attack: The replay attack allows an adversary to eavesdrop on the messages being exchanged between users and avatars. However, an adversary will not be able to get access to the private keys and MID of the user and avatar. In our proposed model, the replay attack is avoided using an MIF-sync up with relevant Metaverse server platforms (MPs). Blockchain in the MIF maintains the timestamp of the transaction and also the session key that is being used, SKi, to identify each session. Therefore, the combination of the Meta-ID and session key will prevent s replay attack.
- Fake-avatar attack: In this type of attack, the virtual world creates a false avatar to imitate an actual avatar. In order to do this, an adversary is required to possess the Meta-ID and avatar ID (Ai). Also, it would need to be able to verify the PKi with the CA and the MIF, which is highly infeasible as PKi is created using tokens. Also, avatars are mapped to the PID of the PU for which an avatar is created. This means that a fake avatar would need to able to get access to the physical ID of the user. It is highly unlikely that a fake avatar can get access to all of these parameters. Therefore, our scheme is fake-avatar-attack proof.
- Stolen-device attack: An adversary can steal a head-mounted device, hand-held device or other related device. However, the device ID is stored in a block masked with a hash. Also, it is combined with a Meta-ID that is stored in the blockchain. Therefore, an adversary cannot gain access to the user information, infoi, through a stolen device.
- Stolen-password attack: The user and avatar authentication processes in our scheme are not based only on a password. This authentication requires a physical PID and a metaverse-platform-specific username and password. The Meta-ID hash is generated based on all of the associated parameters. Thus, it is difficult to crack the password of the user by adversary. Therefore, our scheme is stolen-password-attack proof.
- Server-spoofing attack: An adversary can intercept messages shared among users and avatars and generate a response message as if it is coming from the legit server MPSi. However, a response message cannot be generated without the private keys of users and avatars. Also, the Meta-ID is added to the messages being sent. Thus, our scheme can resist platform-server-spoofing attacks.
- Denial-of-service attack: An adversary can send multiple request messages and transmit them to the MIF or CA for verification. This may lead to a network bottleneck. However, as the metaverse platform checks for the timestamp of the request and session key, the attacker cannot create new request messages. Even if the adversary tries to resend past messages, the MPS will treat them as invalid. Therefore, the proposed scheme guarantees robustness against denial-of-service attacks.
- Man-in-the-middle attack: An adversary may try to reuse previously shared messages that have been captured by an attacker. However, the timestamp and Meta-ID mechanisms in our scheme will prevent responses to such invalid requests. Thus, our scheme takes care of MITM attacks.
- Non-traceable-avatar attack: All of the messages shared among the users and devices are protected by session keys, SKi, and time stamps, ts. Also, there are unique random numbers associated with users or avatars. That is why our proposed scheme provides non-traceability.
- Lack of interoperability: Due to a lack of interoperability, an adversary may try to impersonate a user in different platforms with different identities. There is no uniformity in the identification of the user or avatar. The unique security feature provided by our scheme is interoperable identity. This will avoid the security issues caused by lack-of-identity interoperability.
- Mutual authentication: If an adversary tries to fake authentication while communicating with other users or avatars, it will not be validated in our proposed scheme. Because of the Meta-ID, Metaverse server platforms are registered while enrolling the user. Also, session keys and timestamps are used while sharing messages. Consequently, the proposed system provides secure mutual authentication.
- Stolen user- or avatar-information attack: The user information is protected by a Meta-ID and session key. Even if an adversary tries to steal user or avatar information, when it is being used somewhere else, session key will be invalid. Hence, our scheme protects users and avatars from stolen-information attacks.
- Session-key-disclosure attack: In the framework proposed, the session key is maintained per session and is used in combination with a Meta-ID. If an adversary tries to disclose the session key, then it would not be possible to use against another Meta-ID. Thus, our scheme is not susceptible to session-key-disclosure attack.
- Perfect forward secrecy: An adversary will not be able to perform a perfect forward secrecy attack on our proposed scheme. Even if the private key used in an individual session are stolen, then the attacker will not be obtain access to the Meta-ID for that user and device. Hence, an adversary will not be able to access data from other sessions.
- Insider attack: In the insider attack, an adversary can impersonate an avatar, Ai, or a ser, PUi. However, in our proposed scheme, without knowing session keys and a Meta-ID, it is difficult for any avatars or users to perform an impersonation attack. Hence, our scheme can prevent insider attacks.
6.2. Formal Security Analysis
BAN Logic
- Message meaning rule:
- 2.
- Nonce verification rule:
- 3.
- Jurisdiction rule:
- 4.
- Freshness rule:
- 5.
- Belief rule:
6.3. ROR Model
6.4. AVISPA
7. Performance Analysis
7.1. Computation Cost Analysis
7.2. Communication Cost Analysis
7.3. Security-Features Comparison
8. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Wang, Y.; Su, Z.; Zhang, N.; Xing, R.; Liu, D.; Luan, T.H.; Shen, X. A survey on metaverse: Fundamentals, security, and privacy. IEEE Commun. Surv. Tutor. 2023, 25, 319–352. [Google Scholar] [CrossRef]
- Patwe, S.; Mane, S. Blockchain enabled architecture for secure authentication in the metaverse environment. In Proceedings of the 2023 IEEE 8th International Conference for Convergence in Technology (I2CT), Lonavla, India, 7–9 April 2023; pp. 1–8. [Google Scholar]
- A Researcher’s Avatar was Sexually Assaulted on a Metaverse Platform Owned by Meta, Making Her the Latest Victim of Sexual Abuse on Meta’s Platforms, Watchdog Says. Available online: https://www.businessinsider.in/tech/news/a-female-researchers-avatar-was-sexually-assaulted-on-a-metaverse-platform-owned-by-meta-making-her-the-latest-victim-of-sexual-abuse-on-metas-platforms-watchdog-says/articleshow/91884508.cms (accessed on 13 January 2024).
- Falchuck, B.; Loeb, S.; Neff, R. The social metaverse: Battle for privacy. IEEE Technol. Soc. Mag. 2018, 37, 52–61. [Google Scholar] [CrossRef]
- Yu, S.; Lee, J.; Park, Y.; Park, Y.; Lee, S.; Chung, B. A secure and efficient three-factor authentication protocol in global mobility networks. Appl. Sci. 2020, 10, 3565. [Google Scholar] [CrossRef]
- Lee, L.-H.; Braud, T.; Zhou, P.; Wang, L.; Xu, D.; Lin, Z.; Kumar, A.; Bermejo, C.; Hui, P. All one needs to know about metaverse: A complete survey on technological singularity, virtual ecosystem, and research agenda. arXiv 2021, arXiv:2110.05352. [Google Scholar]
- Patwe, S.; Mane, S. Blockchain Enabled Architecture for Secure Authentication in the Metaverse Environment: A Student Training Use Case. In Proceedings of the IEEE International Conference on Metaverse Computing, Networking and Applications (MetaCom), Kyoto, Japan, 26–28 June 2023; pp. 413–417. [Google Scholar]
- Why Has Facebook Changed its Name to Meta and What is the Metaverse? Available online: https://www.newscientist.com/article/2295438-why-has-facebook-changed-its-name-to-meta-and-what-is-the-metaverse/ (accessed on 13 January 2024).
- Wang, Y.; Su, Z.; Zhang, N.; Liu, D.; Xing, R.; Luan, T.H.; Shen, X. A Survey on Metaverse: Fundamentals, Security, and Privacy. arXiv 2022, arXiv:abs/2203.02662. [Google Scholar] [CrossRef]
- Aks, S.M.; Karmila, M.; Givan, B.; Hendratna, G.; Setiawan, H.S.; Putra, A.S.; Winarno, S.H.; Kurniawan, T.A.; Simorangkir, Y.N.; Taufiq, R.; et al. A Review of Blockchain for Security Data Privacy with Metaverse. In Proceedings of the 2022 International Conference on ICT for Smart Society (ICISS), Online, 10–11 August 2022; pp. 1–5. [Google Scholar] [CrossRef]
- Gadekallu, T.R.; Huynh-The, T.; Wang, W.; Yenduri, G.; Ranaweera, P.; Pham, Q.V.; da Costa, D.B.; Liyanage, M. Blockchain for the Metaverse: A Review. arXiv 2022, arXiv:2203.09738v2. [Google Scholar]
- Yang, K.; Zhang, Z.; Tian, Y.; Ma, J. A Secure Authentication Framework to Guarantee the Traceability of Avatars in Metaverse. In Proceedings of the IEEE Transactions on Information Forensics and Security, Nürnberg, Germany, 4–7 December 2023; Volume 18, pp. 3817–3832. [Google Scholar] [CrossRef]
- Huang, Y.; Li, Y.J.; Cai, Z. Security and privacy in metaverse: A comprehensive survey. Big Data Min. Anal. 2023, 6, 234–247. [Google Scholar] [CrossRef]
- Truong, V.T.; Le, L.; Niyato, D. Blockchain meets metaverse and digital asset management: A comprehensive survey. IEEE Access 2023, 11, 26258–26288. [Google Scholar] [CrossRef]
- Nguyen, C.T.; Hoang, D.T.; Nguyen, D.N.; Dutkiewicz, E. Metachain: A novel blockchain-based framework for metaverse applications. arXiv 2021, arXiv:2201.00759. [Google Scholar]
- Panda, P.K.; Chattopadhyay, S. A secure mutual authentication protocol for IoT environment. J. Reliable Intell. Environ. 2020, 6, 9–94. [Google Scholar] [CrossRef]
- Li, Y.; Xu, M.; Xu, G. Blockchain-based mutual authentication protocol without CA. J. Supercomput. 2022, 78, 17261–17283. [Google Scholar] [CrossRef]
- Ryu, J.; Son, S.; Lee, J.; Park, Y.; Park, Y. Design of secure mutual authentication scheme for metaverse environments using blockchain. IEEE Access 2022, 10, 98944–98958. [Google Scholar] [CrossRef]
- Kim, M.; Oh, J.; Son, S.; Park, Y.; Kim, J.; Park, Y. Secure and Privacy-Preserving Authentication Scheme Using Decentralized Identifier in Metaverse Environment. Electronics 2023, 12, 4073. [Google Scholar] [CrossRef]
- Shen, M.; Liu, H.; Zhu, L.; Xu, K.; Yu, H.; Du, X.; Guizani, M. Blockchain-Assisted Secure Device Authentication for Cross-Domain Industrial IoT. IEEE J. Sel. Areas Commun. 2020, 38, 942–954. [Google Scholar] [CrossRef]
- Ryu, J.; Oh, J.; Kwon, D.; Son, S.; Lee, J.; Park, Y.; Park, Y. Secure ECC-Based Three-Factor Mutual Authentication Protocol for Telecare Medical Information System. IEEE Access 2022, 10, 11511–11526. [Google Scholar] [CrossRef]
- Xu, M.; Ng, W.C.; Lim, W.Y.B.; Kang, J.; Xiong, Z.; Niyato, D.; Yang, Q.; Shen, X.; Miao, C. A full dive into realizing the edge-enabled metaverse: Visions, enabling technologies, and challenges. IEEE Commun. Surv. Tutor. 2023, 25, 656–700. [Google Scholar] [CrossRef]
- Yang, Q.; Zhao, Y.; Huang, H.; Xiong, Z.; Kang, J.; Zheng, Z. Fusing blockchain and AI with metaverse: A survey. IEEE Open J. Comput. Soc. 2022, 3, 122–136. [Google Scholar] [CrossRef]
- Huynh-The, T.; Gadekallu, T.R.; Wang, W.; Yenduri, G.; Ranaweera, P.; Pham, Q.V.; Costa, D.B.; Liyanage, M. Blockchain for the metaverse: A review. Futur. Gener. Comp. Syst. 2023, 143, 401–419. [Google Scholar] [CrossRef]
- Dolev, D.; Yao, A. On the security of public key protocols. IEEE Trans. Inf. Theory 1983, 29, 198–208. [Google Scholar] [CrossRef]
- Masud, M.; Gaba, G.S.; Choudhary, K.; Hossain, M.S.; Alhamid, M.F.; Muhammad, G. Lightweight and anonymity-preserving user authentication scheme for IoT-based healthcare. IEEE Internet Things J. 2022, 9, 2649–2656. [Google Scholar] [CrossRef]
- Bhattacharya, M.; Roy, S.; Chattopadhyay, S.; Das, A.K.; Jamal, S.S. ASPA-MOSN: An efficient user authentication scheme for phishing attack detection in mobile online social networks. IEEE Syst. J. 2023, 17, 234–245. [Google Scholar] [CrossRef]
- Son, S.; Kwon, D.; Lee, S.; Jeon, Y.; Das, A.K.; Park, Y. Design of secure and lightweight authentication scheme for UAV-enabled intelligent transportation systems using blockchain and PUF. IEEE Access 2023, 11, 60240–60253. [Google Scholar] [CrossRef]
- Canetti, R.; Krawczyk, H. Universally composable notions of key exchange and secure channels. In Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, 28 April–2 May 2002; pp. 337–351. [Google Scholar]
- Soni, P.; Pardhan, J.; Pal, A.K.; Islam, S.K.H. Cybersecurity attack-resilience authentication mechanism for intelligent healthcare system. IEEE Trans. Ind. Inform. 2023, 19, 830–840. [Google Scholar] [CrossRef]
- Oh, J.; Yu, S.; Lee, J.; Son, S.; Kim, M.; Park, Y. A secure and lightweight authentication protocol for IoT-based smart homes. Sensors 2021, 21, 1488. [Google Scholar] [CrossRef]
- Hosseinzadeh, M.; Ahmed, O.H.; Ahmed, S.H.; Trinh, C.; Bagheri, N.; Kumari, S.; Lansky, J.; Huynh, B. An enhanced authentication protocol for RFID systems. IEEE Access 2020, 8, 126977–126987. [Google Scholar] [CrossRef]
- Lee, J.; Kim, G.; Das, A.K.; Park, Y. Secure and efficient honey list-based authentication protocol for vehicular ad hoc networks. IEEE Trans. Netw. Sci. Eng. 2021, 8, 2412–2425. [Google Scholar] [CrossRef]
- Chen, C.M.; Chen, Z.; Kumari, S.; Lin, M.C. LAP-IoHT: A lightweight authentication protocol for the internet of health things. Sensors 2022, 22, 5401. [Google Scholar] [CrossRef] [PubMed]
- Wang, D.; Cheng, H.; Wang, P.; Huang, X.; Jian, G. Zipf’s law in passwords. IEEE Trans. Inf. Forensics Secur. 2017, 12, 2776–2791. [Google Scholar] [CrossRef]
- AVISPA. Automated Validation of Internet Security Protocols and Applications. Available online: http://www.avispa-project.org/ (accessed on 22 August 2023).
- SPAN: A Security Protocol Animator for AVISPA. Available online: https://people.irisa.fr/Thomas.Genet/span/ (accessed on 22 August 2023).
- Kilinc, H.H.; Yanik, T. A survey of SIP authentication and key agreement schemes. IEEE Commun. Surv. Tutor. 2013, 16, 1005–1023. [Google Scholar] [CrossRef]
- Ravanbakhsh, N.; Nazari, M. An efficient improvement remote user mutual authentication and session key agreement scheme for E-health care systems. Multimed. Tools Appl. 2018, 77, 55–88. [Google Scholar] [CrossRef]
- Gope, P.; Sikdar, B. Lightweight and privacy-preserving two-factor authentication scheme for IoT devices. IEEE Internet Things J. 2019, 6, 580–589. [Google Scholar] [CrossRef]
Publication | Security Challenge Addressed | Solution Proposed | What Are We Planning to Address? |
---|---|---|---|
[12] | Disguise, impersonation, replay | Secure authentication framework to guarantee the traceability of avatars in metaverse using two-factor authentication framework based on chameleon signature and biometrics. |
|
[16] | Device privacy, impersonation attack, replay attack, password-guessing attack, mutual authentication | Secure mutual authentication protocol for IoT and cloud servers based on elliptic curve cryptography. |
|
[17] | Impersonation, replay, mutual authentication, centralization | An authentication protocol based on elliptic curves and bilinear pairs. |
|
[18] | impersonation, replay attack, server spoofing, stolen smart devices, MITM, insider attacks | Mutual authentication scheme using elliptic curve cryptography (ECC) and biometric information. |
|
[20] | Cross-domain authentication | Blockchain-Assisted Secure Device Authentication (BASA) for Cross-Domain Industrial IoT. |
|
Notation | Description |
---|---|
CA | Certificate authority |
PUi | Physical user |
Metaverse platform | |
PIDi | ID of physical user PUi |
PNi | User name of physical user PUi |
PWi | Password of physical user PUi |
Di | Device ID of physical user PUi |
MPS | Metaverse platform server |
Ti | Random token for User Ui |
Ai | Avatar identity of Ui |
Sci | Smart contract for MPi |
PKca, PKi | Public key of CA and Ui |
Kca, Ki | Private key of CA and Ui |
Ski | Session key for user Ui |
H(.) | Hash function |
⊕ | Exclusive OR |
|| | Concatenation operation |
Notation | Description |
---|---|
Two principals | |
Two statements | |
The session key | |
is fresh | |
Query | Description |
---|---|
Execute | Two principals |
Send | Two statements |
Reveal | The session key |
Test | |
Corrupt |
Schemes | User | Server | Total Cost |
---|---|---|---|
Panda and Chattopadhyay [16] | 44.1190 ms | 29.4136 ms | 73.5326 ms |
Li et al. [17] | 36.7759 ms | 36.7837 ms | 73.5596 ms |
Ryu et al. [18] | 51.4723 ms | 88.2458 ms | 139.7181 ms |
Kim et al. [19] | 29.4438 ms | 36.7755 ms | 66.2193 ms |
Our proposed scheme | 27.3357 ms | 22.7758 ms | 50.1115 ms |
Schemes | Communication Cost | Messages |
---|---|---|
Panda and Chattopadhyay [16] | 1440 bits | 3 |
Li et al. [17] | 1728 bits | 2 |
Ryu et al. [18] | 1888 bits | 3 |
Kim et al. [19] | 1344 bits | 2 |
Our proposed scheme | 1256 bits | 2 |
Security Feature | Panda and Chattopadhyay [16] | Li et al. [17] | Ryu et al. [18] | Kim et al. [19] | Our Proposed Scheme |
---|---|---|---|---|---|
Impersonation | ✓ | ✓ | ✓ | ✓ | ✓ |
Avatar Impersonation | X | X | ✓ | ✓ | ✓ |
Mutual authentication | X | ✓ | ✓ | ✓ | ✓ |
Server Spoofing | ✓ | x | ✓ | ✓ | ✓ |
Replay | ✓ | X | ✓ | ✓ | ✓ |
Stolen Device | X | x | ✓ | ✓ | ✓ |
Offline Password Guessing | ✓ | X | ✓ | ✓ | ✓ |
Insider Attack | ✓ | X | ✓ | X | ✓ |
Session Key Disclosure | ✓ | ✓ | ✓ | ✓ | ✓ |
Perfect Forward Secrecy | ✓ | ✓ | ✓ | ✓ | ✓ |
Man-in-the-Middle | ✓ | ✓ | ✓ | ✓ | ✓ |
Insider Attack | ✓ | X | ✓ | ✓ | ✓ |
Ephemeral Secret Leakage | X | ✓ | ✓ | ✓ | ✓ |
Anonymity | ✓ | X | ✓ | ✓ | ✓ |
Privacy Preservation | X | X | X | ✓ | ✓ |
Untraceability | ✓ | X | ✓ | ✓ | ✓ |
Denial of Service | X | ✓ | X | ✓ | ✓ |
Lack of Interoperability | X | X | X | X | ✓ |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Patwe, S.; Mane, S.B. Blockchain-Enabled Secure and Interoperable Authentication Scheme for Metaverse Environments. Future Internet 2024, 16, 166. https://doi.org/10.3390/fi16050166
Patwe S, Mane SB. Blockchain-Enabled Secure and Interoperable Authentication Scheme for Metaverse Environments. Future Internet. 2024; 16(5):166. https://doi.org/10.3390/fi16050166
Chicago/Turabian StylePatwe, Sonali, and Sunil B. Mane. 2024. "Blockchain-Enabled Secure and Interoperable Authentication Scheme for Metaverse Environments" Future Internet 16, no. 5: 166. https://doi.org/10.3390/fi16050166
APA StylePatwe, S., & Mane, S. B. (2024). Blockchain-Enabled Secure and Interoperable Authentication Scheme for Metaverse Environments. Future Internet, 16(5), 166. https://doi.org/10.3390/fi16050166