Affiliation:
1. School of Information Science & Engineering, Henan University of Technology, Zhengzhou 450001, China
2. Henan International Joint Laboratory of Grain Information Processing, Zhengzhou 450001, China
Abstract
Compared to traditional platform environments in the online realm, the metaverse, as a three-dimensional (3D) virtual world, exposes more identity data to the network. Once these data are compromised, it leads to privacy breaches. Therefore, how to ensure identity security in the metaverse environment has become an urgent problem to be solved. Although research on identity authentication schemes can help improve identity security, traditional identity authentication schemes in network environments are studied based on their own environmental characteristics, which makes it difficult to meet the security needs in the metaverse environment. As a result, in this paper we propose an elliptic curve cryptography (ECC)-based identity authentication scheme to address identity authentication issues in the metaverse environment. This scheme ensures secure communication among users, avatars, and platform servers. The security of this scheme was demonstrated through informal security analysis and the automated validation of internet security protocols and applications (AVISPA) formal security analysis tools, and the results showed that it can resist various known attacks. Compared with existing identity authentication schemes, this scheme has lower computational and communication costs.
Funder
National Natural Science Foundation of China
Reference27 articles.
1. Security and privacy in metaverse: A comprehensive survey;Huang;Big Data Min. Anal.,2023
2. Chow, Y.W., Susilo, W., Li, Y., Li, N., and Nguyen, C. (2023). Visualization and cybersecurity in the metaverse: A survey. J. Imaging, 9.
3. Metaverse and virtual health care in ophthalmology: Opportunities and challenges;Tan;Asia Pac. J. Ophthalmol.,2022
4. Construction of RSA-Based authentication scheme in authorized access to healthcare services;Dharminder;J. Med. Syst.,2020
5. Fog computing-based three-party authentication and key agreement protocol for smart healthcare;Wang;Ruan Jian Xue Bao/J. Softw.,2023