earticle

논문검색

Poster Session Ⅱ

Security Vulnerability Analysis in Deploying Avatar in the Metaverse

초록

영어

Cyberattacks have affected every technology in recent years, and the metaverse is not an exception. Users can engage with other users by navigating the metaverse with their avatar's associated user data. Attackers using the user data associated with avatars masquerade as users or penetrate through the metaverse's vulnerable infrastructure. There are multiple components of the metaverse infrastructure that are vulnerable to attack. The infrastructure becomes insecure when these components are developed without security in consideration. Cyberattacks that take advantage of these vulnerabilities compromise user privacy and cause the loss of sensitive data. This highlights the necessity of comprehending the infrastructure and the data flow through its essential components so that appropriate countermeasures can be built. Our study proposed a model that clarifies the data flow among the infrastructure's components for creating an avatar in the metaverse. We also identify the major threat causing cyberattacks per component. We state in our study's conclusion that such threats will have an impact on the metaverse's avatar and user data.

목차

Abstract
I. INTRODUCTION
II. RELATED WORK
III. PROPOSED MODEL
IV. THREAT IDENTIFICATION ON THE MODEL
A. AI Model(component A)
B. Cloud Computing (component B)
C. IoT Devices (component C)
D. Network Analysis (component D)
V. CONCLUSION
ACKNOWLEDGMENT
REFERENCES

저자정보

  • Arpita Dinesh Sarang SysCore Lab. (Convergence Engineering for Intelligent Drone) Sejong University
  • Ki-Woong Park Dept. of Computer and Information Security Sejong University

참고문헌

자료제공 : 네이버학술정보

    함께 이용한 논문

      0개의 논문이 장바구니에 담겼습니다.