Affiliation:
1. Department of Information Technology, The University of Haripur, Haripur 22620, Pakistan
2. Department of Computer Science, College of Computer and Information Sciences, King Saud University, Riyadh 11633, Saudi Arabia
3. Department of Software and Communications Engineering, Hongik University, Sejong 30016, Republic of Korea
Abstract
In the rapidly evolving landscape of distributed systems, security stands as a significant challenge, especially in the face of network node attacks. Such threats introduce profound complexities into the dynamics of security protocols, trust management, and resource allocation, issues further amplified by the metaverse’s exponential growth. This paper proposes an innovative solution, offering unique technical contributions to address these multi-faceted challenges. We unveil a trust-based resource allocation framework designed to facilitate the secure and efficient sharing of computational resources within the metaverse. This system has the potential to markedly diminish latency, thereby enhancing overall performance. In parallel, we introduce a reputation system that systematically monitors latency across a spectrum of metaverse entities, providing valuable insights for making informed resource allocation decisions. Moreover, we advocate for a decentralized trust management system, specifically designed to withstand potential security breaches without reliance on a centralized authority. This significantly fortifies both system security and user trust. Alongside this, we unveil an inventive proof-of-trust consensus mechanism that fosters trust and collaboration among metaverse entities during resource allocation, thereby cultivating a more secure ecosystem. Our proposed model poses a robust challenge to malicious entities, and it substantially bolsters the security architecture. The simulation results lend substantial credence to the effectiveness of our approach, demonstrating significant improvements in latency reduction, scalability, and the detection of malicious nodes, thereby outperforming existing methodologies.
Funder
National Research Foundation
King Saud University
Subject
Electrical and Electronic Engineering,Computer Networks and Communications,Hardware and Architecture,Signal Processing,Control and Systems Engineering
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献