SlideShare a Scribd company logo
A decentralized
authentication model for
the metaverse using AI-
Based blockchain technology
RESEARCH TOPIC
Muhammad Zeeshan Arshad
1
Table of Contents
1. Title Page
2. Introduction
3. Problem Statement
4. Research Questions
5. Scope of Research
6. Literature Review (Table)
7. Proposed Methodology of Research (framework)
8. Expected Results
9. Thesis Timeline
10. References
11. Curriculum Vitae of MS Scholar
12. Undertaking
2
2-INTRODUCTION
1. Metaverse
“Metaverse is the universe that lies beyond the real universe, virtual with persistent
multiuser environment merging both digital and physical world.”
2. AI-Blockchain
“Blockchain as a decentralized platform with distributed ledger database can bring a
blend of centralized and distributed ecosystem. ”
3. Blockchain-Metaverse convergence
“Many blockchain-based systems now use non-fungible tokens and cryptocurrency to
create, own, and monetize decentralized digital assets. Due to the inherent flaws of
centralized data storage, blockchain exists as a decentralized, distributed database
secured by encryption, allowing users access to any digital place, particularly in a
blockchain-based metaverse. ”
3
2-INTRODUCTION
• Title
A decentralized
authentication model for
the metaverse using AI-
Based blockchain technology
• Significance
Immutable AI models
empower the authentication
mechanism with better
efficiency and seamless user
experience to the metaverse
users. [1]
• Literature Review
• Research Gap
With respect to the above Literature
Review centralized authentication
framework needs to be formulated for
metaverse users to provide Immersive
and Continuous User experience.
• Research Question
How to integrate
blockchain with AI in
metaverse?
No Category Factors
1 Knowledge Password [2]
2 Knowledge key [3]
3 Biometric physiology [4]
4 Biometric Behavior [5]
5 Knowledge+Biometric Multi-factor [6]
4
3-PROBLEM STATEMENT
1. Authentication in re-logging in metaverse
2. Lack of immersive user experience
3. Different authentication mechanism for different metaverse
enabled environments
4. Attacks on AI based frameworks (Adversarial AI)
5
4-RESEARCH QUESTIONS
1. How to integrate blockchain with AI in metaverse?
2. How blockchain based strategy can be efficient with
respect to authentication?
3. Which environment can be used to test the efficiency?
4. What ML model can be efficient for handling
authentication issue in Blockchain assisted metaverse
system?
5. What are the metrics that can be efficient for testing the
proposed ML based methodology?
6. Which dataset is suitable to test in the environment of
blockchain assisted metaverse application? 6
5-STATEMENT OF OBJECTIVES
1. Integration of AI model with blockchain
2. Formulate an authentication framework which
provide a seamless user experience for metaverse
applications
3. Find which database is best suitable for the
authentication for users in metaverse.
4. Find the best metrics for the proposed framework
7
6-SCOPE OF RESEARCH
A decentralized authentication model for the metaverse using AI-Based blockchain technology
No Research Question Research Objective Methodology Outcome
1
How to integrate blockchain
with AI in metaverse?
Integration of AI model with
blockchain (Objective 1)
a. Literature search
b. Systematic Literature Review
c. Proof of concept
Literature collected about the
fusion of Blockchain and AI
and integration with Metaverse
2
How blockchain based strategy
can be efficient with respect to
authentication?
Formulate an authentication
framework which provide a
seamless user experience for
metaverse applications (Objective
2)
a. Data collection
b. Initial Framework Design
c. Final Framework Design
d. Proof of concept
AI-Blockchain based
authentication framework
3
Which environment can be
used to test the efficiency?
Find which database is best
suitable for the authentication for
users in metaverse (Objective 3)
a. Training of AI model
b. Perform Simulation Setup of testing environment
4
What ML model can be
efficient for handling
authentication issue in
Blockchain assisted metaverse
system?
Integration of AI model with
blockchain (Objective 1)
a. Literature search
b. Systematic Literature Review
c. Proof of concept
Literature collected about the
fusion of Blockchain and AI
and integration with Metaverse
5
What are the metrics that can
be efficient for testing the
proposed ML based
methodology?
Find the best metrics for the
proposed framework (Objective 4)
a. Testing Framework using
simulation
b. Validating and Tunning
Simulated Prototype of
Authentication Framework for
metaverse
6
Which dataset is suitable to
test in the environment of
blockchain assisted metaverse
application?
Find which database is best
suitable for the authentication for
users in metaverse (Objective 3)
a. Training of AI model
b. Perform Simulation Setup of testing environment 8
7-LITERATURE REVIEW
03
04
05
Trusted AI with Blockchain to Empower Metaverse –
Secure AI training and AI deployed model [1].
01
02 Password-Authenticated Decentralized Identities - self-
sovereign username-password pairs [2]
OcuLock: Exploring Human Visual System for
Authentication in Virtual Reality Headmounted Display –
Authentication between devices [4]
PrivBioMTAuth: Privacy Preserving Biometrics-Based and
User Centric Protocol for User Authentication From Mobile
Phones. – Required Password and keep the system as a
key [6]
Design of Secure Mutual Authentication Scheme
for Metaverse Environments Using Blockchain – Identity
based Authentication [7]
9
7-LITERATURE REVIEW (Table)
No Category Factors Virtual Physical Immersive Continous Mutual session key
1 Knowledge Password [2] Yes No No No Yes Yes
2 Knowledge Key [3] No Yes Yes Yes Yes Yes
3 Biometric Physiology [4] Yes Yes Yes No No No
4 Biometric Behavior [5] Yes Yes Yes Yes No No
5 Knowledge + Biometric Multi-factor [6] Yes Yes No No Yes Yes
10
8-PROPOSED SOLUTION
AI BLOCKCHAIN
METAVERSE
01
02 03
AUTHENTICATION
11
12
12
8.1-PROTOCOL FOR DATA COLLECTION
• Best suitable ML model (Based on Performance and accuracy)
• Finding best dataset for model training ( Kaggle )
• Integration of blockchain and AI ( SLR )
• Feature Extraction (Huggyfaces, SIFT, SURF and OpenCV)
13
9-EXPECTED RESULTS
01 02 03 04
USER
Authentication
paramets
AI MODEL Authentication
For multiple
metaverse
environments
METAVERSE
Immersive user
experience
Prediction
based auth
14
10-TIMELINE
Months/Stages Oct 2022 Nov. 2022 Dec. 2022 Jan. 2023 Feb. 2023 Mar. 2023 May. 2023
Literature
review
Literature
review
Problem
formulation
Problem
formulation
Solving
Problem
Solving
Problem
Paper
Submission
Paper
Submission
More
extensions of
problem
More
extensions
of problem
Write up and
submission of
thesis
Write up
Submission
of thesis
15
11-REFERENCES
1. Badruddoja, S., Dantu, R., He, Y., Thompson, M., Salau, A., & Upadhyay, K. (2022, September). Trusted AI with
Blockchain to Empower Metaverse. In 2022 Fourth International Conference on Blockchain Computing and
Applications (BCCA) (pp. 237-244). IEEE.
2. Szalachowski, P. (2021). Password-Authenticated Decentralized Identities. IEEE Transactions on Information
Forensics and Security, 16, 4801-4810..
3. Gope, P., & Sikdar, B. (2018). Lightweight and privacy-preserving two-factor authentication scheme for IoT
devices. IEEE Internet of Things Journal, 6(1), 580-589.
4. Luo, S., Nguyen, A., Song, C., Lin, F., Xu, W., & Yan, Z. (2020, January). OcuLock: Exploring human visual system for
authentication in virtual reality head-mounted display. In 2020 Network and Distributed System Security
Symposium (NDSS).
5. Lee, S., Choi, W., & Lee, D. H. (2021, November). Usable user authentication on a smartwatch using vibration. In
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security (pp. 304-319).
6. Gunasinghe, H., & Bertino, E. (2017). PrivBioMTAuth: Privacy preserving biometrics-based and user centric
protocol for user authentication from mobile phones. IEEE Transactions on Information Forensics and Security,
13(4), 1042-1057.
7. Ryu, J., Son, S., Lee, J., Park, Y., & Park, Y. (2022). Design of Secure Mutual Authentication Scheme for
Metaverse Environments Using Blockchain. Ieee Access, 10, 98944-98958.
16
Curriculum Vitae of MS Scholar
Name: Muhammad Zeeshan Arshad
Father’s Name: Muhammad Arshad khokhar
Registration Number: 211824
Contact Information:
Address: Flat no A-38/12, PAF Complex E-9, Islamabad.
Phone: 0334-5088829
E-mail(s): 211824@students.au.edu.pk
Specialization Area: Blockchain, Machine Learning, Metaverse
17
Undertaking
I certify that the research work titled “A decentralized authentication model
for the metaverse using AI-Based blockchain technology” is my own work.
The work has not been presented elsewhere for assessment in whole or in
part, and where the material has been used from other sources, it has been
properly acknowledged/referred.
18
Blockchain

More Related Content

Similar to Blockchain

Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...
Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...
Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...
ijtsrd
 
sweeney_brendan-css527-20141118-research_proposal
sweeney_brendan-css527-20141118-research_proposalsweeney_brendan-css527-20141118-research_proposal
sweeney_brendan-css527-20141118-research_proposal
Brendan Sweeney
 
Titles with Abstracts_2023-2024_Block Chain.pdf
Titles with Abstracts_2023-2024_Block Chain.pdfTitles with Abstracts_2023-2024_Block Chain.pdf
Titles with Abstracts_2023-2024_Block Chain.pdf
info751436
 

Similar to Blockchain (20)

IRJET- A Survey on IoT Reference Architecture with Block Chain for Automatic ...
IRJET- A Survey on IoT Reference Architecture with Block Chain for Automatic ...IRJET- A Survey on IoT Reference Architecture with Block Chain for Automatic ...
IRJET- A Survey on IoT Reference Architecture with Block Chain for Automatic ...
 
Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...
Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...
Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...
 
Block yber.pptx
Block yber.pptxBlock yber.pptx
Block yber.pptx
 
Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...
Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...
Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...
 
sweeney_brendan-css527-20141118-research_proposal
sweeney_brendan-css527-20141118-research_proposalsweeney_brendan-css527-20141118-research_proposal
sweeney_brendan-css527-20141118-research_proposal
 
IRJET - Improving Password System using Blockchain
IRJET - Improving Password System using BlockchainIRJET - Improving Password System using Blockchain
IRJET - Improving Password System using Blockchain
 
Build Blockchain Prototype using Azure Workbench and Manage data on ledger
Build Blockchain Prototype using Azure Workbench and Manage data on ledgerBuild Blockchain Prototype using Azure Workbench and Manage data on ledger
Build Blockchain Prototype using Azure Workbench and Manage data on ledger
 
IRJET- Blockchain based Certificate Issuing and Validation
IRJET-  	  Blockchain based Certificate Issuing and ValidationIRJET-  	  Blockchain based Certificate Issuing and Validation
IRJET- Blockchain based Certificate Issuing and Validation
 
Ieee 2020 21 blockchain in pondicherry,final year projects in pondicherry,bes...
Ieee 2020 21 blockchain in pondicherry,final year projects in pondicherry,bes...Ieee 2020 21 blockchain in pondicherry,final year projects in pondicherry,bes...
Ieee 2020 21 blockchain in pondicherry,final year projects in pondicherry,bes...
 
Adoption Blockchain Smart Contracts in Developing Information Systems.pdf
Adoption Blockchain Smart Contracts in Developing Information Systems.pdfAdoption Blockchain Smart Contracts in Developing Information Systems.pdf
Adoption Blockchain Smart Contracts in Developing Information Systems.pdf
 
Researching Decentralised AI_ Harnessing Blockchain and AI's Potential.pdf
Researching Decentralised AI_ Harnessing Blockchain and AI's Potential.pdfResearching Decentralised AI_ Harnessing Blockchain and AI's Potential.pdf
Researching Decentralised AI_ Harnessing Blockchain and AI's Potential.pdf
 
Blockchain for AI: Review and Open. Research Challenges K. SALAH, M. H. REHMA...
Blockchain for AI: Review and Open. Research Challenges K. SALAH, M. H. REHMA...Blockchain for AI: Review and Open. Research Challenges K. SALAH, M. H. REHMA...
Blockchain for AI: Review and Open. Research Challenges K. SALAH, M. H. REHMA...
 
University of Borås-full talk-2023-12-09.pptx
University of Borås-full talk-2023-12-09.pptxUniversity of Borås-full talk-2023-12-09.pptx
University of Borås-full talk-2023-12-09.pptx
 
Decentralised AI through Distributed Ledger Technologies
Decentralised AI through Distributed Ledger Technologies Decentralised AI through Distributed Ledger Technologies
Decentralised AI through Distributed Ledger Technologies
 
6.designing secure and efficient biometric based secure access mechanism for ...
6.designing secure and efficient biometric based secure access mechanism for ...6.designing secure and efficient biometric based secure access mechanism for ...
6.designing secure and efficient biometric based secure access mechanism for ...
 
Cloud computing projects
Cloud computing projects Cloud computing projects
Cloud computing projects
 
Titles with Abstracts_2023-2024_Block Chain.pdf
Titles with Abstracts_2023-2024_Block Chain.pdfTitles with Abstracts_2023-2024_Block Chain.pdf
Titles with Abstracts_2023-2024_Block Chain.pdf
 
Fake Certificate Detection by using Blockchain
Fake Certificate Detection by using BlockchainFake Certificate Detection by using Blockchain
Fake Certificate Detection by using Blockchain
 
IRJET - Privacy Preserving Keyword Search over Encrypted Data in the Cloud
IRJET -  	  Privacy Preserving Keyword Search over Encrypted Data in the CloudIRJET -  	  Privacy Preserving Keyword Search over Encrypted Data in the Cloud
IRJET - Privacy Preserving Keyword Search over Encrypted Data in the Cloud
 
IRJET- Survey on Blockchain based Digital Certificate System
IRJET- Survey on Blockchain based Digital Certificate SystemIRJET- Survey on Blockchain based Digital Certificate System
IRJET- Survey on Blockchain based Digital Certificate System
 

Recently uploaded

Recently uploaded (20)

Advances in production technology of Grapes.pdf
Advances in production technology of Grapes.pdfAdvances in production technology of Grapes.pdf
Advances in production technology of Grapes.pdf
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
 
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdfDanh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
 
Gyanartha SciBizTech Quiz slideshare.pptx
Gyanartha SciBizTech Quiz slideshare.pptxGyanartha SciBizTech Quiz slideshare.pptx
Gyanartha SciBizTech Quiz slideshare.pptx
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
[GDSC YCCE] Build with AI Online Presentation
[GDSC YCCE] Build with AI Online Presentation[GDSC YCCE] Build with AI Online Presentation
[GDSC YCCE] Build with AI Online Presentation
 
NLC-2024-Orientation-for-RO-SDO (1).pptx
NLC-2024-Orientation-for-RO-SDO (1).pptxNLC-2024-Orientation-for-RO-SDO (1).pptx
NLC-2024-Orientation-for-RO-SDO (1).pptx
 
Salient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptxSalient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptx
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
Benefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational ResourcesBenefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational Resources
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"
Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"
Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdfINU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
 
The Benefits and Challenges of Open Educational Resources
The Benefits and Challenges of Open Educational ResourcesThe Benefits and Challenges of Open Educational Resources
The Benefits and Challenges of Open Educational Resources
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 

Blockchain

  • 1. A decentralized authentication model for the metaverse using AI- Based blockchain technology RESEARCH TOPIC Muhammad Zeeshan Arshad 1
  • 2. Table of Contents 1. Title Page 2. Introduction 3. Problem Statement 4. Research Questions 5. Scope of Research 6. Literature Review (Table) 7. Proposed Methodology of Research (framework) 8. Expected Results 9. Thesis Timeline 10. References 11. Curriculum Vitae of MS Scholar 12. Undertaking 2
  • 3. 2-INTRODUCTION 1. Metaverse “Metaverse is the universe that lies beyond the real universe, virtual with persistent multiuser environment merging both digital and physical world.” 2. AI-Blockchain “Blockchain as a decentralized platform with distributed ledger database can bring a blend of centralized and distributed ecosystem. ” 3. Blockchain-Metaverse convergence “Many blockchain-based systems now use non-fungible tokens and cryptocurrency to create, own, and monetize decentralized digital assets. Due to the inherent flaws of centralized data storage, blockchain exists as a decentralized, distributed database secured by encryption, allowing users access to any digital place, particularly in a blockchain-based metaverse. ” 3
  • 4. 2-INTRODUCTION • Title A decentralized authentication model for the metaverse using AI- Based blockchain technology • Significance Immutable AI models empower the authentication mechanism with better efficiency and seamless user experience to the metaverse users. [1] • Literature Review • Research Gap With respect to the above Literature Review centralized authentication framework needs to be formulated for metaverse users to provide Immersive and Continuous User experience. • Research Question How to integrate blockchain with AI in metaverse? No Category Factors 1 Knowledge Password [2] 2 Knowledge key [3] 3 Biometric physiology [4] 4 Biometric Behavior [5] 5 Knowledge+Biometric Multi-factor [6] 4
  • 5. 3-PROBLEM STATEMENT 1. Authentication in re-logging in metaverse 2. Lack of immersive user experience 3. Different authentication mechanism for different metaverse enabled environments 4. Attacks on AI based frameworks (Adversarial AI) 5
  • 6. 4-RESEARCH QUESTIONS 1. How to integrate blockchain with AI in metaverse? 2. How blockchain based strategy can be efficient with respect to authentication? 3. Which environment can be used to test the efficiency? 4. What ML model can be efficient for handling authentication issue in Blockchain assisted metaverse system? 5. What are the metrics that can be efficient for testing the proposed ML based methodology? 6. Which dataset is suitable to test in the environment of blockchain assisted metaverse application? 6
  • 7. 5-STATEMENT OF OBJECTIVES 1. Integration of AI model with blockchain 2. Formulate an authentication framework which provide a seamless user experience for metaverse applications 3. Find which database is best suitable for the authentication for users in metaverse. 4. Find the best metrics for the proposed framework 7
  • 8. 6-SCOPE OF RESEARCH A decentralized authentication model for the metaverse using AI-Based blockchain technology No Research Question Research Objective Methodology Outcome 1 How to integrate blockchain with AI in metaverse? Integration of AI model with blockchain (Objective 1) a. Literature search b. Systematic Literature Review c. Proof of concept Literature collected about the fusion of Blockchain and AI and integration with Metaverse 2 How blockchain based strategy can be efficient with respect to authentication? Formulate an authentication framework which provide a seamless user experience for metaverse applications (Objective 2) a. Data collection b. Initial Framework Design c. Final Framework Design d. Proof of concept AI-Blockchain based authentication framework 3 Which environment can be used to test the efficiency? Find which database is best suitable for the authentication for users in metaverse (Objective 3) a. Training of AI model b. Perform Simulation Setup of testing environment 4 What ML model can be efficient for handling authentication issue in Blockchain assisted metaverse system? Integration of AI model with blockchain (Objective 1) a. Literature search b. Systematic Literature Review c. Proof of concept Literature collected about the fusion of Blockchain and AI and integration with Metaverse 5 What are the metrics that can be efficient for testing the proposed ML based methodology? Find the best metrics for the proposed framework (Objective 4) a. Testing Framework using simulation b. Validating and Tunning Simulated Prototype of Authentication Framework for metaverse 6 Which dataset is suitable to test in the environment of blockchain assisted metaverse application? Find which database is best suitable for the authentication for users in metaverse (Objective 3) a. Training of AI model b. Perform Simulation Setup of testing environment 8
  • 9. 7-LITERATURE REVIEW 03 04 05 Trusted AI with Blockchain to Empower Metaverse – Secure AI training and AI deployed model [1]. 01 02 Password-Authenticated Decentralized Identities - self- sovereign username-password pairs [2] OcuLock: Exploring Human Visual System for Authentication in Virtual Reality Headmounted Display – Authentication between devices [4] PrivBioMTAuth: Privacy Preserving Biometrics-Based and User Centric Protocol for User Authentication From Mobile Phones. – Required Password and keep the system as a key [6] Design of Secure Mutual Authentication Scheme for Metaverse Environments Using Blockchain – Identity based Authentication [7] 9
  • 10. 7-LITERATURE REVIEW (Table) No Category Factors Virtual Physical Immersive Continous Mutual session key 1 Knowledge Password [2] Yes No No No Yes Yes 2 Knowledge Key [3] No Yes Yes Yes Yes Yes 3 Biometric Physiology [4] Yes Yes Yes No No No 4 Biometric Behavior [5] Yes Yes Yes Yes No No 5 Knowledge + Biometric Multi-factor [6] Yes Yes No No Yes Yes 10
  • 12. 12 12
  • 13. 8.1-PROTOCOL FOR DATA COLLECTION • Best suitable ML model (Based on Performance and accuracy) • Finding best dataset for model training ( Kaggle ) • Integration of blockchain and AI ( SLR ) • Feature Extraction (Huggyfaces, SIFT, SURF and OpenCV) 13
  • 14. 9-EXPECTED RESULTS 01 02 03 04 USER Authentication paramets AI MODEL Authentication For multiple metaverse environments METAVERSE Immersive user experience Prediction based auth 14
  • 15. 10-TIMELINE Months/Stages Oct 2022 Nov. 2022 Dec. 2022 Jan. 2023 Feb. 2023 Mar. 2023 May. 2023 Literature review Literature review Problem formulation Problem formulation Solving Problem Solving Problem Paper Submission Paper Submission More extensions of problem More extensions of problem Write up and submission of thesis Write up Submission of thesis 15
  • 16. 11-REFERENCES 1. Badruddoja, S., Dantu, R., He, Y., Thompson, M., Salau, A., & Upadhyay, K. (2022, September). Trusted AI with Blockchain to Empower Metaverse. In 2022 Fourth International Conference on Blockchain Computing and Applications (BCCA) (pp. 237-244). IEEE. 2. Szalachowski, P. (2021). Password-Authenticated Decentralized Identities. IEEE Transactions on Information Forensics and Security, 16, 4801-4810.. 3. Gope, P., & Sikdar, B. (2018). Lightweight and privacy-preserving two-factor authentication scheme for IoT devices. IEEE Internet of Things Journal, 6(1), 580-589. 4. Luo, S., Nguyen, A., Song, C., Lin, F., Xu, W., & Yan, Z. (2020, January). OcuLock: Exploring human visual system for authentication in virtual reality head-mounted display. In 2020 Network and Distributed System Security Symposium (NDSS). 5. Lee, S., Choi, W., & Lee, D. H. (2021, November). Usable user authentication on a smartwatch using vibration. In Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security (pp. 304-319). 6. Gunasinghe, H., & Bertino, E. (2017). PrivBioMTAuth: Privacy preserving biometrics-based and user centric protocol for user authentication from mobile phones. IEEE Transactions on Information Forensics and Security, 13(4), 1042-1057. 7. Ryu, J., Son, S., Lee, J., Park, Y., & Park, Y. (2022). Design of Secure Mutual Authentication Scheme for Metaverse Environments Using Blockchain. Ieee Access, 10, 98944-98958. 16
  • 17. Curriculum Vitae of MS Scholar Name: Muhammad Zeeshan Arshad Father’s Name: Muhammad Arshad khokhar Registration Number: 211824 Contact Information: Address: Flat no A-38/12, PAF Complex E-9, Islamabad. Phone: 0334-5088829 E-mail(s): 211824@students.au.edu.pk Specialization Area: Blockchain, Machine Learning, Metaverse 17
  • 18. Undertaking I certify that the research work titled “A decentralized authentication model for the metaverse using AI-Based blockchain technology” is my own work. The work has not been presented elsewhere for assessment in whole or in part, and where the material has been used from other sources, it has been properly acknowledged/referred. 18

Editor's Notes

  1. [2] designed a password-authenticated decentralized identity by which users register their self-sovereign username-password pairs and use them as universal credentials. This kind of password-authenticated method can realize the security authentication between the device and the service provider. However, these methods require the user to enter a password during the authentication process, which fails to achieve immersive authentication [4] Current mutual authentication schemes primarily focus on onetime authentication between devices as in and have not yet considered dynamic authentication between avatars [6] introduces a three-factor authentication scheme based on a signed identity token that encodes the user’s biometric identifier and the password entered by the user into the token. Although this method requires users to enter a password during the authentication process
  2. [2] designed a password-authenticated decentralized identity by which users register their self-sovereign username-password pairs and use them as universal credentials. This kind of password-authenticated method can realize the security authentication between the device and the service provider. However, these methods require the user to enter a password during the authentication process, which fails to achieve immersive authentication [4] Current mutual authentication schemes primarily focus on onetime authentication between devices as in and have not yet considered dynamic authentication between avatars [6] introduces a three-factor authentication scheme based on a signed identity token that encodes the user’s biometric identifier and the password entered by the user into the token. Although this method requires users to enter a password during the authentication process