Extended Reality and Cybersecurity

A special issue of Information (ISSN 2078-2489). This special issue belongs to the section "Information Applications".

Deadline for manuscript submissions: 23 June 2024 | Viewed by 3108

Special Issue Editors


E-Mail Website
Guest Editor
School of Computing and Information Technology, University of Wollongong, Wollongong, NSW 2522, Australia
Interests: virtual reality; multimedia security; adversarial machine learning
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
School of Computing and Information Technology, University of Wollongong, Wollongong, NSW 2522, Australia
Interests: cybersecurity; IoT security and privacy; applied cryptography

E-Mail Website
Guest Editor
School of Computing and Information Technology, University of Wollongong, Wollongong, NSW 2522, Australia
Interests: network virtualization and security; IoT security; cybersecurity

Special Issue Information

Dear Colleagues,

Extended reality (XR), which encompasses virtual reality, augmented reality, mixed reality, etc., is becoming increasingly popular as many global companies and organizations are heavily investing in the research and development of such technologies. The growth of XR has seen it being adopted in a variety of application areas, such as remote work, immersive training, marketing, healthcare, virtual events, education, and entertainment. In conjunction with advances in emerging technologies such as artificial intelligence, blockchain, digital twins, 5G communication, the Internet of Things (IoT), cloud computing, and so on, XR is expected to deliver greater and more engaging immersive experiences.

However, as XR deals with people, data, and information, cybersecurity and privacy threats are major concerns surrounding the use of XR technology. Among others, examples of such threats include the possibility of adversaries attacking and disrupting collaboration in shared XR environments, stealing data and identities, eavesdropping on communications, committing fraud through impersonating legitimate users or generating fake transactions, harassment in XR space, obtaining physical device locations, and so on. Hence, it is imperative for researchers and practitioners to develop solutions to safeguard XR and its related technologies against such threats in order for XR to receive widespread acceptance and adoption.

This Special Issue welcomes a broad spectrum of research papers, ranging from innovative techniques and applications to position papers and comprehensive reviews, on XR, cybersecurity, privacy, and their related areas. We seek original and high-quality submissions that are related, but not limited, to topics including extended reality (including virtual reality, augmented reality, mixed reality, etc.), the metaverse, security visualization, cybersecurity, artificial intelligence, attacks against machine learning and their defenses, privacy and social issues in XR, and so on.

Dr. Yang-Wai Chow
Dr. Nan Li
Dr. Chau Nguyen
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Information is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • extended reality (virtual reality, augmented reality, mixed reality, etc.)
  • metaverse
  • cybersecurity
  • artificial intelligence
  • machine learning/deep learning
  • adversarial machine learning and defenses
  • privacy and social issues
  • authentication
  • biometrics
  • security visualization
  • digital twins

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Other

23 pages, 511 KiB  
Systematic Review
User Authentication Mechanisms Based on Immersive Technologies: A Systematic Review
by Ioanna Anastasaki, George Drosatos, George Pavlidis and Konstantinos Rantos
Information 2023, 14(10), 538; https://doi.org/10.3390/info14100538 - 2 Oct 2023
Cited by 1 | Viewed by 1974
Abstract
Immersive technologies are revolutionary technological advancements that offer users unparalleled experiences of immersion in a virtual or mixed world of virtual and real elements. In such technology, user privacy, security, and anonymity are paramount, as users often share private and sensitive information. Therefore, [...] Read more.
Immersive technologies are revolutionary technological advancements that offer users unparalleled experiences of immersion in a virtual or mixed world of virtual and real elements. In such technology, user privacy, security, and anonymity are paramount, as users often share private and sensitive information. Therefore, user authentication is a critical requirement in these environments. This paper presents a systematic literature review of recently published research papers on immersive technology-based user authentication mechanisms. After conducting the literature search in September 2023 using Scopus, the selection process identified 36 research publications that were further analyzed. The analysis revealed three major types of authentications related to immersive technologies, consistent with previous works: knowledge-based, biometric, and multi-factor methods. The reviewed papers are categorized according to these groups, and the methods used are scrutinized. To the best of our knowledge, this systematic literature review is the first that provides a comprehensive consolidation of immersive technologies for user authentication in virtual, augmented, and mixed reality. Full article
(This article belongs to the Special Issue Extended Reality and Cybersecurity)
Show Figures

Figure 1

Back to TopTop