A survey on metaverse-empowered 6G wireless systems: A security perspective

Latif U. Khan*, Mohsen Guizani, Ibrar Yaqoob, Dusit Niyato, Ala Al-Fuqaha, Choong Seon Hong

*Corresponding author for this work

    Research output: Contribution to journalReview articlepeer-review

    1 Citation (Scopus)

    Abstract

    Recent trends in emerging applications have motivated researchers to design advanced wireless systems to meet their evolving requirements. These emerging applications include digital healthcare, intelligent transportation systems, Industry 5.0, and more. To address the evolving requirements, leveraging a metaverse to empower 6G wireless systems is a viable solution. A metaverse-empowered 6G wireless system can offer numerous benefits, but it may also be vulnerable to a wide variety of security attacks. In this survey, we discuss potential security attacks in metaverse-empowered 6G wireless systems. We introduce an architecture designed to enhance security within metaverse-empowered 6G wireless systems. This architecture comprises two key spaces: the meta space and the physical space. We present physical space attacks and outline effective solutions to secure metaverse-empowered 6G wireless systems. We provide invaluable insights and discussions on meta space attacks, along with promising solutions. Finally, we discuss open challenges and provide future recommendations.

    Original languageEnglish
    Article number101325
    JournalInternet of Things (Netherlands)
    Volume28
    DOIs
    Publication statusPublished - Dec 2024

    Keywords

    • 6G
    • Blockchain
    • Eavesdropping
    • Homomorphic encryption
    • Machine learning
    • Metaverse

    Fingerprint

    Dive into the research topics of 'A survey on metaverse-empowered 6G wireless systems: A security perspective'. Together they form a unique fingerprint.

    Cite this