{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,25]],"date-time":"2026-01-25T08:58:30Z","timestamp":1769331510455,"version":"3.49.0"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,6,12]],"date-time":"2025-06-12T00:00:00Z","timestamp":1749686400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,6,12]],"date-time":"2025-06-12T00:00:00Z","timestamp":1749686400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,7]]},"DOI":"10.1007\/s12083-025-02020-w","type":"journal-article","created":{"date-parts":[[2025,6,12]],"date-time":"2025-06-12T09:56:40Z","timestamp":1749722200000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Blockchain-based decentralized identifier in metaverse environment for secure and privacy-preserving authentication with improved key management and cryptosystem"],"prefix":"10.1007","volume":"18","author":[{"given":"Vijitha","family":"S","sequence":"first","affiliation":[]},{"given":"Anandan","family":"R","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,12]]},"reference":[{"key":"2020_CR1","doi-asserted-by":"crossref","unstructured":"Zhang X, Huang X, Yin H, Huang J, Chai S, Xing B, ... Zhao L (2022) Llakep: A low-latency authentication and key exchange protocol for energy internet of things in the metaverse era.\u00a0Mathematics\u00a010(14):2545","DOI":"10.3390\/math10142545"},{"key":"2020_CR2","unstructured":"Ahsani V, Rahimi A, Letafati M, Khalaj BH (2023) Unlocking metaverse-as-a-service the three pillars to watch: Privacy and security, edge computing, and blockchain.\u00a0arXiv preprint arXiv preprint arXiv:2301.01221"},{"key":"2020_CR3","unstructured":"Wang H, Li H, Smahi A, Zhao F, Yao Y, Chan CC, ... Li SYR (2023) MIS: A multi-identifier management and resolution system based on consortium blockchain in metaverse.\u00a0arXiv preprint arXiv:2301.03529"},{"issue":"2","key":"2020_CR4","doi-asserted-by":"publisher","first-page":"1208","DOI":"10.1109\/TII.2020.2983209","volume":"17","author":"M Wang","year":"2020","unstructured":"Wang M, Xu C, Chen X, Zhong L, Wu Z, Wu DO (2020) BC-mobile device cloud: A blockchain-based decentralized truthful framework for mobile device cloud. IEEE Trans Industr Inf 17(2):1208\u20131219","journal-title":"IEEE Trans Industr Inf"},{"key":"2020_CR5","doi-asserted-by":"crossref","unstructured":"Nguyen CT, Hoang DT, Nguyen DN, Xiao Y, Niyato D, Dutkiewicz E (2023) Metashard: A novel sharding blockchain platform for metaverse applications.\u00a0IEEE Transactions on Mobile Computing","DOI":"10.1109\/TMC.2023.3290955"},{"issue":"7","key":"2020_CR6","first-page":"1","volume":"20","author":"Q Zhang","year":"2024","unstructured":"Zhang Q, Xiong Z, Zhu J, Gao S, Yang W (2024) A Privacy-preserving Auction Mechanism for Learning Model as an NFT in Blockchain-Driven Metaverse. ACM Trans Multimed Comput Commun Appl 20(7):1\u201324","journal-title":"ACM Trans Multimed Comput Commun Appl"},{"issue":"10","key":"2020_CR7","first-page":"1","volume":"29","author":"A Aldweesh","year":"2023","unstructured":"Aldweesh A (2023) Enhancing Metaverse Security with Block Chain Authentication: Methods and Analysis. Comput Integr Manuf Syst 29(10):1\u201313","journal-title":"Comput Integr Manuf Syst"},{"key":"2020_CR8","doi-asserted-by":"crossref","unstructured":"Ghantous N, Fakhri C (2022) Empowering metaverse through machine learning and blockchain technology: A study on machine learning, blockchain, and their combination to enhance metaverse.\u00a0ScienceOpen Preprints","DOI":"10.14293\/S2199-1006.1.SOR-.PP97BSJ.v1"},{"issue":"3","key":"2020_CR9","doi-asserted-by":"publisher","first-page":"1353","DOI":"10.3390\/app13031353","volume":"13","author":"D Mourtzis","year":"2023","unstructured":"Mourtzis D, Angelopoulos J, Panopoulos N (2023) Blockchain integration in the era of industrial metaverse. Appl Sci 13(3):1353","journal-title":"Appl Sci"},{"key":"2020_CR10","doi-asserted-by":"crossref","unstructured":"Truong V, Le LB (2023) MetaCIDS: A metaverse collaborative intrusion detection system based on blockchain and federated learning.\u00a0Authorea Preprints","DOI":"10.36227\/techrxiv.22816568"},{"key":"2020_CR11","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1016\/j.future.2023.02.008","volume":"143","author":"TR Gadekallu","year":"2023","unstructured":"Gadekallu TR, Wang W, Yenduri G, Ranaweera P, Pham QV, da Costa DB, Liyanage M (2023) Blockchain for the metaverse: A review. Futur Gener Comput Syst 143:401\u2013419","journal-title":"Futur Gener Comput Syst"},{"key":"2020_CR12","doi-asserted-by":"crossref","unstructured":"Zhong H, Huang C, Zhang X, Pan M (2023) Metaverse CAN: Embracing Continuous, Active, and Non-intrusive Biometric Authentication.\u00a0IEEE Network","DOI":"10.1109\/MNET.2023.3318890"},{"issue":"19","key":"2020_CR13","doi-asserted-by":"publisher","first-page":"4073","DOI":"10.3390\/electronics12194073","volume":"12","author":"M Kim","year":"2023","unstructured":"Kim M, Oh J, Son S, Park Y, Kim J, Park Y (2023) Secure and privacy-preserving authentication scheme using decentralized identifier in metaverse environment. Electronics 12(19):4073","journal-title":"Electronics"},{"key":"2020_CR14","doi-asserted-by":"publisher","first-page":"98944","DOI":"10.1109\/ACCESS.2022.3206457","volume":"10","author":"J Ryu","year":"2022","unstructured":"Ryu J, Son S, Lee J, Park Y, Park Y (2022) Design of secure mutual authentication scheme for metaverse environments using blockchain. Ieee Access 10:98944\u201398958","journal-title":"Ieee Access"},{"issue":"1","key":"2020_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.hcc.2022.100088","volume":"3","author":"M Xu","year":"2023","unstructured":"Xu M, Guo Y, Hu Q, Xiong Z, Yu D, Cheng X (2023) A trustless architecture of blockchain-enabled metaverse. High-confidence computing 3(1):100088","journal-title":"High-confidence computing"},{"key":"2020_CR16","doi-asserted-by":"publisher","first-page":"3817","DOI":"10.1109\/TIFS.2023.3288689","volume":"18","author":"K Yang","year":"2023","unstructured":"Yang K, Zhang Z, Youliang T, Ma J (2023) A secure authentication framework to guarantee the traceability of avatars in metaverse. IEEE Trans Inf Forensics Secur 18:3817\u20133832","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"2020_CR17","doi-asserted-by":"crossref","unstructured":"Truong VT, Le LB (2023) MetaCIDS: Privacy-preserving collaborative intrusion detection for metaverse based on blockchain and online federated learning.\u00a0IEEE Open Journal of the Computer Society","DOI":"10.36227\/techrxiv.23183642.v1"},{"key":"2020_CR18","doi-asserted-by":"crossref","unstructured":"Khowaja SA, Dahri K, Jarwar MA, Lee IH (2023) Spike learning based privacy preservation of Internet of Medical Things in Metaverse.\u00a0IEEE Journal of Biomedical and Health Informatics","DOI":"10.1109\/JBHI.2023.3306704"},{"key":"2020_CR19","doi-asserted-by":"crossref","unstructured":"Le HD, Truong VT, Hoang DN, Nguyen TV, Le LB (2024) MetaCrowd: Blockchain-Empowered Metaverse via Decentralized Machine Learning Crowdsourcing. In\u00a02024 IEEE Wireless Communications and Networking Conference (WCNC)\u00a0(pp 1\u20136). IEEE","DOI":"10.1109\/WCNC57260.2024.10570920"},{"issue":"7","key":"2020_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3594542","volume":"20","author":"Y Ren","year":"2024","unstructured":"Ren Y, Lv Z, Xiong NN, Wang J (2024) HCNCT: A cross-chain interaction scheme for the blockchain-based metaverse. ACM Trans Multimed Comput Commun Appl 20(7):1\u201323","journal-title":"ACM Trans Multimed Comput Commun Appl"},{"key":"2020_CR21","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1016\/j.future.2023.09.022","volume":"151","author":"J Seo","year":"2024","unstructured":"Seo J, Park S (2024) SBAC: Substitution cipher access control based on blockchain for protecting personal data in metaverse. Futur Gener Comput Syst 151:85\u201397","journal-title":"Futur Gener Comput Syst"},{"key":"2020_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2021.102448","volume":"115","author":"OA Khashan","year":"2021","unstructured":"Khashan OA, Ahmad R, Khafajah NM (2021) An automated lightweight encryption scheme for secure and energy-efficient communication in wireless sensor networks. Ad Hoc Netw 115:102448","journal-title":"Ad Hoc Netw"},{"issue":"3","key":"2020_CR23","doi-asserted-by":"publisher","first-page":"2915","DOI":"10.1007\/s40747-021-00305-0","volume":"9","author":"DVK Vengala","year":"2023","unstructured":"Vengala DVK, Kavitha D, Kumar AS (2023) Three factor authentication system with modified ECC based secured data transfer: untrusted cloud environment. Complex & Intelligent Systems 9(3):2915\u20132928","journal-title":"Complex & Intelligent Systems"},{"issue":"1","key":"2020_CR24","doi-asserted-by":"publisher","first-page":"9210050","DOI":"10.1155\/2021\/9210050","volume":"2021","author":"L Xie","year":"2021","unstructured":"Xie L, Han T, Zhou H, Zhang ZR, Han B, Tang A (2021) Tuna swarm optimization: a novel swarm-based metaheuristic algorithm for global optimization. Comput Intell Neurosci 2021(1):9210050","journal-title":"Comput Intell Neurosci"},{"key":"2020_CR25","doi-asserted-by":"publisher","first-page":"1126450","DOI":"10.3389\/fmech.2022.1126450","volume":"8","author":"M Dehghani","year":"2023","unstructured":"Dehghani M, Trojovsk\u00fd P (2023) Osprey optimization algorithm: A new bio-inspired metaheuristic algorithm for solving engineering optimization problems. Frontiers in Mechanical Engineering 8:1126450","journal-title":"Frontiers in Mechanical Engineering"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02020-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-02020-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02020-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T15:22:55Z","timestamp":1758986575000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-02020-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,12]]},"references-count":25,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,7]]}},"alternative-id":["2020"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-02020-w","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6,12]]},"assertion":[{"value":"5 April 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 May 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 June 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not Applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"The authors declare no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not Applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to publish"}}],"article-number":"210"}}