Secure and Trustworthy Artificial Intelligence-Extended Reality (AI-XR) for Metaverses

Author:

Qayyum Adnan1,Butt Muhammad Atif2,Ali Hassan2,Usman Muhammad3,Halabi Osama4,Al-Fuqaha Ala5,Abbasi Qammer H.6,Imran Muhammad Ali6,Qadir Junaid4

Affiliation:

1. University of Glasgow, United Kingdom and Information Technology University, Pakistan

2. Information Technology University, Pakistan

3. Glasgow Caledonian University, United Kingdom

4. Qatar University, Qatar

5. Hamad Bin Khalifa University, Qatar

6. University of Glasgow, United Kingdom

Abstract

Metaverse is expected to emerge as a new paradigm for the next-generation Internet, providing fully immersive and personalised experiences to socialize, work, and play in self-sustaining and hyper-spatio-temporal virtual world(s). The advancements in different technologies like augmented reality, virtual reality, extended reality (XR), artificial intelligence (AI), and 5G/6G communication will be the key enablers behind the realization of AI-XR metaverse applications. While AI itself has many potential applications in the aforementioned technologies (e.g., avatar generation, network optimization, etc.), ensuring the security of AI in critical applications like AI-XR metaverse applications is profoundly crucial to avoid undesirable actions that could undermine users’ privacy and safety, consequently putting their lives in danger. To this end, we attempt to analyze the security, privacy, and trustworthiness aspects associated with the use of various AI techniques in AI-XR metaverse applications. Specifically, we discuss numerous such challenges and present a taxonomy of potential solutions that could be leveraged to develop secure, private, robust, and trustworthy AI-XR applications. To highlight the real implications of AI-associated adversarial threats, we designed a metaverse-specific case study and analyzed it through the adversarial lens. Finally, we elaborate upon various open issues that require further research interest from the community.

Publisher

Association for Computing Machinery (ACM)

Subject

General Computer Science,Theoretical Computer Science

Reference177 articles.

1. Martin Abadi , Andy Chu , Ian Goodfellow , H Brendan McMahan , Ilya Mironov , Kunal Talwar , and Li Zhang . 2016 . Deep learning with differential privacy . In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, 308–318 . Martin Abadi, Andy Chu, Ian Goodfellow, H Brendan McMahan, Ilya Mironov, Kunal Talwar, and Li Zhang. 2016. Deep learning with differential privacy. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, 308–318.

2. Amina Adadi and Mohammed Berrada . 2018. Peeking inside the black-box: a survey on explainable artificial intelligence (XAI) . IEEE access 6( 2018 ), 52138–52160. Amina Adadi and Mohammed Berrada. 2018. Peeking inside the black-box: a survey on explainable artificial intelligence (XAI). IEEE access 6(2018), 52138–52160.

3. James Aiken and Sandra Scott-Hayward . 2019 . Investigating adversarial attacks against network intrusion detection systems in sdns . In 2019 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN). IEEE, 1–7. James Aiken and Sandra Scott-Hayward. 2019. Investigating adversarial attacks against network intrusion detection systems in sdns. In 2019 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN). IEEE, 1–7.

4. Advances in adversarial attacks and defenses in computer vision: A survey;Akhtar Naveed;IEEE Access,2021

5. Asad Ali , Inaam Ilahi , Adnan Qayyum , Ihab Mohammed , Ala Al-Fuqaha , and Junaid Qadir . 2021. Incentive-Driven Federated Learning and Associated Security Challenges: A Systematic Review. TechRxiv ( 2021 ). Asad Ali, Inaam Ilahi, Adnan Qayyum, Ihab Mohammed, Ala Al-Fuqaha, and Junaid Qadir. 2021. Incentive-Driven Federated Learning and Associated Security Challenges: A Systematic Review. TechRxiv (2021).

Cited by 7 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3