{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T06:13:04Z","timestamp":1772691184321,"version":"3.50.1"},"reference-count":176,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/access.2025.3587015","type":"journal-article","created":{"date-parts":[[2025,7,8]],"date-time":"2025-07-08T13:39:17Z","timestamp":1751981957000},"page":"120209-120243","source":"Crossref","is-referenced-by-count":3,"title":["Privacy and Security in the Metaverse: Trends, Challenges, and Future Directions"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1935-8307","authenticated-orcid":false,"given":"Jagdeep","family":"Singh","sequence":"first","affiliation":[{"name":"Department of Information Technology, Guru Nanak Dev Engineering College, Ludhiana, Punjab, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0750-6309","authenticated-orcid":false,"given":"Parminder","family":"Singh","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Lovely Professional University, Phagwara, Punjab, India"}]},{"given":"Ranjodh","family":"Kaur","sequence":"additional","affiliation":[{"name":"Department of Information Technology, Guru Nanak Dev Engineering College, Ludhiana, Punjab, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3534-4121","authenticated-orcid":false,"given":"Avinash","family":"Kaur","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Lovely Professional University, Phagwara, Punjab, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7872-4469","authenticated-orcid":false,"given":"Mustapha","family":"Hedabou","sequence":"additional","affiliation":[{"name":"School of Computing, University Mohammed VI Polytechnic, Ben Guerir, Morocco"}]}],"member":"263","reference":[{"issue":"1","key":"ref1","first-page":"17","article-title":"A content analysis of the metaverse articles","volume":"1","author":"Narin","year":"2021","journal-title":"J. Metaverse"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-47508-5_32"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3390\/encyclopedia2010031"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.3991\/ijim.v16i13.33187"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MTS.2018.2826060"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3241809"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2024.103457"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-99-4641-9_8"},{"issue":"4","key":"ref9","first-page":"1","article-title":"Procedures for performing systematic reviews","volume":"33","author":"Kitchenham","year":"2004","journal-title":"Keele Univ."},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.57019\/jmv.1286526"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1002\/cav.2150"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1186\/s12891-024-07436-8"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.3390\/su15032186"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MetaCom57706.2023.00033"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2480741.2480751"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2022.105581"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/OJCS.2022.3188249"},{"key":"ref18","article-title":"All one needs to know about metaverse: A complete survey on technological singularity, virtual ecosystem, and research agenda","author":"Lee","year":"2021","journal-title":"arXiv:2110.05352"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3278329"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3140175"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2022.3221119"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-79026-8_7"},{"key":"ref23","article-title":"When creators meet the metaverse: A survey on computational arts","author":"Lee","year":"2021","journal-title":"arXiv:2111.13486"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s10660-009-9030-8"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.3991\/ijet.v15i15.13025"},{"key":"ref26","article-title":"Guidelines for performing systematic literature reviews in software engineering","author":"Kitchenham","year":"2014"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2372233.2372235"},{"key":"ref28","volume-title":"IEEE 2888 Standards","year":"2023"},{"key":"ref29","volume-title":"ISO\/IEC 23005 (MPEG-V) Standards","year":"2023"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2022.3233588"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.23919\/ICACT56868.2023.10079642"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/IOTM.001.2200258"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/VRW58643.2023.00319"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/VRW58643.2023.00311"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.3390\/su15097573"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/s42486-022-00094-6"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-19-8730-4_7"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/SOSE55356.2022.00026"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.011.2300042"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-31420-9_10"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3511095.3532574"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3290911"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3288689"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/CICC53496.2022.9772810"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-33631-7_7"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.12730\/is.1261876"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ISADS56919.2023.10091996"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/SEC54971.2022.00021"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/SmartWorld-UIC-ATC-ScalCom-DigitalTwin-PriComp-Metaverse56740.2022.00339"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ASIANCON55314.2022.9909315"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.57019\/jmv.1126135"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-99-4641-9_18"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-15546-8_23"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1002\/9781119865810"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.3390\/app122412600"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1080\/14794713.2023.2198535"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.62273\/JMZA1065"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/LT58159.2023.10092352"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/OJCS.2024.3468445"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-443-24049-2.00007-8"},{"key":"ref61","first-page":"407","article-title":"Privacy in the metaverse, artificial intelligence and big data. data protection and righ to honor","volume":"39","author":"Romero","year":"2023","journal-title":"Ann. Fac. Der. U. Extremadura"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1002\/sdtp.17226"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1002\/9781119865810.ch9"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/ICACITE60783.2024.10616939"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/iMETA59369.2023.10294768"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-33631-7_2"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2024.103828"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-33080-3_36"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1038\/s42256-022-00549-6"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1145\/3590837.3590938"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1007\/s43762-022-00051-0"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.3390\/s23094201"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-023-02236-1"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.018.2300095"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3304790"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.26599\/BDMA.2022.9020047"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-24359-2_7"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.69554\/JENW1541"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.2478\/raft-2022-0050"},{"issue":"4","key":"ref80","first-page":"45","article-title":"Application and prospect of blockchain in metaverse","volume":"8","author":"Song","year":"2022","journal-title":"Chin. J. Netw. Inf. Secur."},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/CSCI58124.2022.00173"},{"issue":"1","key":"ref82","first-page":"8","article-title":"Applying digital twins in metaverse: User interface, security and privacy challenges","volume":"2","author":"Far","year":"2022","journal-title":"J. Metaverse"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/ecai58194.2023.10193962"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-99-0252-1_17"},{"key":"ref85","volume-title":"The Metaverse and Homeland Security: Opportunities and Risks of Persistent Virtual Environments","author":"Marler","year":"2023"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-6684-6097-9.ch009"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1145\/3595353.3595880"},{"issue":"2","key":"ref88","first-page":"648","article-title":"Cyber security and human rights considering the metaverse","volume":"9","author":"Banciu","year":"2021","journal-title":"J. Freedom Consci."},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.2196\/40410"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12061379"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-29132-6_14"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.19165\/ELIM4426"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/SICTIM56495.2023.10104998"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.3390\/s23020565"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1051\/sands\/2023005"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-19-8563-8_6"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1051\/e3sconf\/202338804057"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3222521"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2022.12.031"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-22018-0_30"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/HCCS55241.2022.10090250"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/ICMACC54824.2022.10093534"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/iGETblockchain56591.2022.10087104"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3257029"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2022.3226717"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2023.3347172"},{"key":"ref107","article-title":"NFT-based blockchain-oriented security framework for metaverse applications","author":"Manzoor","year":"2023","journal-title":"arXiv:2307.10342"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-29132-6_8"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2024.3351882"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2023.103262"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12153362"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102923"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1177\/14614448231184249"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/INCOFT55651.2022.10094401"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/jbhi.2023.3306704"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1515\/eng-2022-0476"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/ICDEW58674.2023.00040"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/TLT.2022.3210828"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-27762-7_29"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2023.3290955"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1016\/j.eij.2023.05.004"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1002\/9781119875437.ch9"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1145\/3565287.3610271"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-6684-8851-5.ch023"},{"key":"ref125","first-page":"236","article-title":"Study of AI based cyber security methods in metaverse","volume-title":"Proc. Korean Soc. Commun. Stud. Conf.","author":"Pooyandeh"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/ICISS55894.2022.9915055"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1109\/ICEST55168.2022.9828791"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1109\/VTC2022-Spring54318.2022.9860983"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12020391"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1109\/IETC57902.2023.10152191"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1108\/ITSE-01-2023-0017"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2022.3202047"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1145\/3549015.3554212"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.014.2200620"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103127"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-6684-8851-5.ch021"},{"key":"ref137","article-title":"Unlocking metaverse-as-a-service the three pillars to watch: Privacy and security, edge computing, and blockchain","author":"Ahsani","year":"2023","journal-title":"arXiv:2301.01221"},{"key":"ref138","first-page":"1","article-title":"Metaq: A quantum approach for secure and optimized metaverse environment","volume":"12","author":"Kwon","year":"2022","journal-title":"Hum.-Centric Comput. Inf. Sci."},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/SmartNets55823.2022.9994013"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1109\/ICCA56443.2022.10039672"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2023.3296222"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1080\/08839514.2023.2222496"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-6684-5732-0.ch012"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1016\/j.jretconser.2023.103509"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2023.3257340"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2023.01.318"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1109\/COINS57856.2023.10189285"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1109\/ICBATS57792.2023.10111122"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3281303"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1109\/TPSISA52974.2021.00032"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1109\/IRI54793.2022.00051"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1108\/K-10-2022-1432"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3302159"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-6684-8898-0.ch011"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2023.102899"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1109\/ICICT57646.2023.10134108"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1007\/s00132-023-04400-7"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC58020.2023.10182956"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1109\/LT58159.2023.10092363"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1007\/s10639-023-12127-3"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-6684-8958-1.ch013"},{"issue":"3","key":"ref162","first-page":"396","article-title":"A metaverse-oriented digital citizen authentication scheme","volume":"4","author":"Lyu","year":"2022","journal-title":"Chin. J. Intell. Sci. Techn."},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1016\/j.hcc.2022.100088"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1109\/SmartNets58706.2023.10215677"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1109\/OJCS.2022.3217565"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2006.07.009"},{"issue":"11","key":"ref167","first-page":"1","article-title":"Prevention of blackhole attack in wireless sensor network using IPSec protocol","volume":"4","author":"Singh","year":"2013","journal-title":"Int. J. Adv. Res. Comput. Sci."},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1177\/17562872231151853"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1016\/j.clon.2022.06.011"},{"issue":"60","key":"ref170","first-page":"1","article-title":"The future of metaverse: Security issues, requirements, and solutions","volume":"12","author":"Choi","year":"2022","journal-title":"Hum.-Centric Comput. Inf. Sci."},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.1900367"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2022.3144219"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2020.3018159"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1109\/ICCS54944.2021.00018"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3095506"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3131711"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10820123\/11072680.pdf?arnumber=11072680","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,17]],"date-time":"2025-07-17T18:00:44Z","timestamp":1752775244000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11072680\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":176,"URL":"https:\/\/doi.org\/10.1109\/access.2025.3587015","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}