A Systematic Literature Review on Fundamental Technologies and Security Challenges in the Metaverse Platforms
- URL: http://arxiv.org/abs/2510.09621v1
- Date: Thu, 18 Sep 2025 16:20:46 GMT
- Title: A Systematic Literature Review on Fundamental Technologies and Security Challenges in the Metaverse Platforms
- Authors: Krishno Dey, Diogo Barradas, Saqib Hakak,
- Abstract summary: The Metaverse utilizes emerging technologies such as Extended Reality (XR), Artificial Intelligence (AI), blockchain, and digital twins.<n>This survey aims to provide a comprehensive review of the enabling technologies for the Metaverse.<n>It also aims to provide a thorough analysis of key vulnerabilities and threats that may compromise its sustainability and user safety.
- Score: 3.945340269853794
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: The Metaverse utilizes emerging technologies such as Extended Reality (XR), Artificial Intelligence (AI), blockchain, and digital twins to provide an immersive and interactive virtual experience. As Metaverse continues to evolve, it bring a range of security and privacy threats, such as identity management, data governance, and user interactions. This survey aims to provide a comprehensive review of the enabling technologies for the Metaverse. It also aims to provide a thorough analysis of key vulnerabilities and threats that may compromise its sustainability and user safety. We perform a systematic literature review (SLR) to identify key vulnerabilities and their countermeasures in Metaverse platforms. Metaverse offers a much larger attack surface compared to conventional digital platforms. Immersive, decentralized, and permanent characteristics of the Metaverse generate new vulnerabilities. Although there are many countermeasures to these vulnerabilities, most of them are theoretical or have not been tested in real-world environments. Our review highlights current advancements, identifies research gaps, and outlines future directions to ensure a secure, resilient, and ethically governed Metaverse.
Related papers
- A Systematic Survey of Model Extraction Attacks and Defenses: State-of-the-Art and Perspectives [65.3369988566853]
Recent studies have demonstrated that adversaries can replicate a target model's functionality.<n>Model Extraction Attacks pose threats to intellectual property, privacy, and system security.<n>We propose a novel taxonomy that classifies MEAs according to attack mechanisms, defense approaches, and computing environments.
arXiv Detail & Related papers (2025-08-20T19:49:59Z) - Metaverse Security and Privacy Research: A Systematic Review [0.47109219881156855]
metaverse technologies, including virtual worlds, augmented reality, and lifelogging, have accelerated their adoption across diverse domains.<n>This rise exposes users to significant new security and privacy challenges due to sociotechnical complexity, pervasive connectivity, and extensive user data collection in immersive environments.<n>We present a systematic review of the literature published between 2013 and 2024, offering a comprehensive analysis of how the research community has addressed metaverse-related security and privacy issues over the past decade.
arXiv Detail & Related papers (2025-07-20T14:42:17Z) - Towards Trustworthy GUI Agents: A Survey [64.6445117343499]
This survey examines the trustworthiness of GUI agents in five critical dimensions.<n>We identify major challenges such as vulnerability to adversarial attacks, cascading failure modes in sequential decision-making.<n>As GUI agents become more widespread, establishing robust safety standards and responsible development practices is essential.
arXiv Detail & Related papers (2025-03-30T13:26:00Z) - Blockchain-based Pseudonym Management for Vehicle Twin Migrations in Vehicular Edge Metaverse [73.79237826420925]
Vehicle Twins (VTs) provide valuable metaverse services to improve driving safety and on-board satisfaction for VMUs throughout journeys.
To maintain uninterrupted metaverse experiences, VTs must be migrated among edge servers following the movements of vehicles.
This can raise concerns about privacy breaches during the dynamic communications among vehicular edge metaverses.
Existing pseudonym management methods fall short in meeting the extensive pseudonym demands in vehicular edge metaverses.
arXiv Detail & Related papers (2024-03-22T15:31:37Z) - Towards Ubiquitous Semantic Metaverse: Challenges, Approaches, and
Opportunities [68.03971716740823]
In recent years, ubiquitous semantic Metaverse has been studied to revolutionize immersive cyber-virtual experiences for augmented reality (AR) and virtual reality (VR) users.
This survey focuses on the representation and intelligence for the four fundamental system components in ubiquitous Metaverse.
arXiv Detail & Related papers (2023-07-13T11:14:46Z) - Privacy Computing Meets Metaverse: Necessity, Taxonomy and Challenges [29.22630037716171]
We conduct comprehensive research on the necessity, taxonomy and challenges when privacy computing meets metaverse.
We first introduce underlying technologies and various applications of metaverse, on which we analyze the challenges of data usage in metaverse.
Next, we review and summarize state-the-art solutions based on learning, differential privacy, homomorphic encryption, and zero-knowledge for different privacy problems in metaverse.
arXiv Detail & Related papers (2023-04-23T13:05:58Z) - Secure and Trustworthy Artificial Intelligence-Extended Reality (AI-XR)
for Metaverses [14.042795506083117]
We discuss the security, privacy, and trustworthiness aspects associated with the use of various AI techniques in AI-XR metaverse applications.
We present a taxonomy of potential solutions that could be leveraged to develop secure, private, robust, and trustworthy AI-XR applications.
arXiv Detail & Related papers (2022-10-24T14:26:59Z) - A Full Dive into Realizing the Edge-enabled Metaverse: Visions, Enabling
Technologies,and Challenges [93.06849621984684]
"The successor to the mobile Internet", the Metaverse has grown in popularity.
lite versions of the Metaverse exist today, but they are far from realizing the full vision of an immersive, embodied, and interoperable Metaverse.
Without addressing the issues of implementation from the communication and networking, the Metaverse is difficult to succeed the Internet.
We discuss the computation challenges and cloud-edge-end computation framework-driven solutions to realize the Metaverse on resource-constrained edge devices.
arXiv Detail & Related papers (2022-03-10T16:48:51Z) - Metaverse: Security and Privacy Concerns [11.681231979727702]
The term "metaverse", a three-dimensional virtual universe similar to the real realm, has always been full of imagination since it was put forward in the 1990s.
It may bring a lot of benefits to human society such as reducing discrimination, eliminating individual differences, and socializing.
However, everything has security and privacy concerns, which is no exception for the metaverse.
arXiv Detail & Related papers (2022-03-08T05:06:13Z) - Artificial Intelligence for the Metaverse: A Survey [66.57225253532748]
We first deliver a preliminary of AI, including machine learning algorithms and deep learning architectures, and its role in the metaverse.
We then convey a comprehensive investigation of AI-based methods concerning six technical aspects that have potentials for the metaverse.
Several AI-aided applications, such as healthcare, manufacturing, smart cities, and gaming, are studied to be deployed in the virtual worlds.
arXiv Detail & Related papers (2022-02-15T03:34:56Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.