5G/6G-Enabled Metaverse Technologies: Taxonomy, Applications, and Open Security Challenges with Future Research Directions

dc.contributor.authorAdil, Muhammad
dc.contributor.authorSong, Houbing
dc.contributor.authorKhan, Muhammad Khurram
dc.contributor.authorFarouk, Ahmed
dc.contributor.authorJin, Zhanpeng
dc.date.accessioned2023-06-20T18:30:31Z
dc.date.available2023-06-20T18:30:31Z
dc.date.issued2023-05-25
dc.description.abstractInternet technology has proven to be a vital contributor to many cutting-edge innovations that have given humans access to interact virtually with objects. Until now, numerous virtual systems had been developed for digital transformation to enable access to thousands of services and applications that range from virtual gaming to social networks. However, the majority of these systems lack to maintain consistency during interconnectivity and communication. To explore this discussion, in the recent past a new term, ”Metaverse” has been introduced, which is the combination of ”meta” and ”universe” that describes a shared virtual environment, where a number of technologies, such as fourthgeneration (4 th) and fifth-generation (5 th) technologies, virtual reality, machine learning algorithms, artificial intelligence, etc, work collectively to support each other for the sake of one objective, which is the virtual accessibility of objects via one network platform. With the development, integration, and virtualization of technologies, a lot of improvement in daily life applications is expected, but at the same time, there is a big challenge for the research community to secure this platform from external and external threats, because this technology is exposed to many cybersecurity attacks. Hence, it is imperative to systematically review and understand the taxonomy, applications, open security challenges, and future research directions of the emerging Metaverse technologies. In this paper, we have made useful efforts to present a comprehensive survey regarding Metaverse technology by taking into account the aforesaid parameters. Following this, in the initial phase, we will explore the future of Metaverse in the presence of 4 th and 5 th generation technologies in the context of interoperability and security. Thereafter, we will discuss the possible attacks to set a preface for the open security challenges. Based on underlined security challenges, we will suggest potential research directions that could be beneficial to address these challenges cost-effectively.en_US
dc.description.urihttps://arxiv.org/abs/2305.16473en_US
dc.format.extent51 pagesen_US
dc.genrejournal articlesen_US
dc.genrepreprintsen_US
dc.identifierdoi:10.13016/m24qju-ag5p
dc.identifier.urihttps://doi.org/10.48550/arXiv.2305.16473
dc.identifier.urihttp://hdl.handle.net/11603/28227
dc.language.isoen_USen_US
dc.relation.isAvailableAtThe University of Maryland, Baltimore County (UMBC)
dc.relation.ispartofUMBC Information Systems Department Collection
dc.relation.ispartofUMBC Student Collection
dc.relation.ispartofUMBC Faculty Collection
dc.rightsThis item is likely protected under Title 17 of the U.S. Copyright Law. Unless on a Creative Commons license, for uses protected by Copyright Law, contact the copyright holder or the author.en_US
dc.rightsAttribution-NonCommercial-NoDerivatives 4.0 International (CC BY-NC-ND 4.0)*
dc.rights.urihttps://creativecommons.org/licenses/by-nc-nd/4.0/*
dc.title5G/6G-Enabled Metaverse Technologies: Taxonomy, Applications, and Open Security Challenges with Future Research Directionsen_US
dc.typeTexten_US
dcterms.creatorhttps://orcid.org/0000-0003-2631-9223en_US

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
2305.16473.pdf
Size:
4.48 MB
Format:
Adobe Portable Document Format
Description:

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
2.56 KB
Format:
Item-specific license agreed upon to submission
Description: