{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T16:10:22Z","timestamp":1774541422377,"version":"3.50.1"},"reference-count":44,"publisher":"MDPI AG","issue":"2","license":[{"start":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T00:00:00Z","timestamp":1739318400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001871","name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","doi-asserted-by":"publisher","award":["2022.09235.PTDC"],"award-info":[{"award-number":["2022.09235.PTDC"]}],"id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001871","name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","doi-asserted-by":"publisher","award":["UIDB\/04524\/2020"],"award-info":[{"award-number":["UIDB\/04524\/2020"]}],"id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001871","name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","doi-asserted-by":"publisher","award":["CEECINS\/00051\/2018"],"award-info":[{"award-number":["CEECINS\/00051\/2018"]}],"id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>Over recent decades, internet-based communication has grown exponentially, accompanied by a surge in cyber threats from malicious actors targeting users and organizations, heightening the demand for robust security and privacy measures. With the emergence of physical\u2013digital environments based on Mixed Reality (MR) and the Metaverse, new cybersecurity, privacy, and confidentiality challenges have surfaced, requiring innovative approaches. This work examines the current landscape of cybersecurity concerns in MR and Metaverse environments, focusing on their unique vulnerabilities and the risks posed to users and their data. Key challenges include authentication issues, data breaches, and risks to user anonymity. The work also explores advancements in secure design frameworks, encryption techniques, and regulatory approaches to safeguard these technologies. Additionally, it identifies opportunities for further research and innovation to strengthen data protection and ensure a safe, trustworthy experience in these environments.<\/jats:p>","DOI":"10.3390\/fi17020083","type":"journal-article","created":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T12:12:16Z","timestamp":1739362336000},"page":"83","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Security and Privacy in Physical\u2013Digital Environments: Trends and Opportunities"],"prefix":"10.3390","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-1020-0340","authenticated-orcid":false,"given":"Carolina","family":"Pereira","sequence":"first","affiliation":[{"name":"Computer Science and Communication Research Center (CIIC), Escola Superior de Tecnologia e Gest\u00e3o (ESTG), Polytechnic University of Leiria, 2411-901 Leiria, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6005-288X","authenticated-orcid":false,"given":"Anabela","family":"Marto","sequence":"additional","affiliation":[{"name":"Computer Science and Communication Research Center (CIIC), Escola Superior de Tecnologia e Gest\u00e3o (ESTG), Polytechnic University of Leiria, 2411-901 Leiria, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1547-4674","authenticated-orcid":false,"given":"Roberto","family":"Ribeiro","sequence":"additional","affiliation":[{"name":"Computer Science and Communication Research Center (CIIC), Escola Superior de Tecnologia e Gest\u00e3o (ESTG), Polytechnic University of Leiria, 2411-901 Leiria, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5966-3218","authenticated-orcid":false,"given":"Alexandrino","family":"Gon\u00e7alves","sequence":"additional","affiliation":[{"name":"Computer Science and Communication Research Center (CIIC), Escola Superior de Tecnologia e Gest\u00e3o (ESTG), Polytechnic University of Leiria, 2411-901 Leiria, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0953-6018","authenticated-orcid":false,"given":"Nuno","family":"Rodrigues","sequence":"additional","affiliation":[{"name":"Computer Science and Communication Research Center (CIIC), Escola Superior de Tecnologia e Gest\u00e3o (ESTG), Polytechnic University of Leiria, 2411-901 Leiria, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7332-4397","authenticated-orcid":false,"given":"Carlos","family":"Rabad\u00e3o","sequence":"additional","affiliation":[{"name":"Computer Science and Communication Research Center (CIIC), Escola Superior de Tecnologia e Gest\u00e3o (ESTG), Polytechnic University of Leiria, 2411-901 Leiria, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2306-7585","authenticated-orcid":false,"given":"Rog\u00e9rio Lu\u00eds de Carvalho","family":"Costa","sequence":"additional","affiliation":[{"name":"Computer Science and Communication Research Center (CIIC), Escola Superior de Tecnologia e Gest\u00e3o (ESTG), Polytechnic University of Leiria, 2411-901 Leiria, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6883-7996","authenticated-orcid":false,"given":"Leonel","family":"Santos","sequence":"additional","affiliation":[{"name":"Computer Science and Communication Research Center (CIIC), Escola Superior de Tecnologia e Gest\u00e3o (ESTG), Polytechnic University of Leiria, 2411-901 Leiria, Portugal"}]}],"member":"1968","published-online":{"date-parts":[[2025,2,12]]},"reference":[{"key":"ref_1","first-page":"1321","article-title":"A Taxonomy of Mixed Reality Visual Displays","volume":"E77-D","author":"Milgram","year":"1994","journal-title":"IEICE Trans. Inf. Syst."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"282","DOI":"10.1117\/12.197321","article-title":"Augmented reality: A class of displays on the reality-virtuality continuum","volume":"Volume 2351","author":"Milgram","year":"1995","journal-title":"Proceedings of the Telemanipulator and Telepresence Technologies"},{"key":"ref_3","unstructured":"Stephenson, N. (2003). Snow Crash: A Novel, Bantam Books (US)."},{"key":"ref_4","unstructured":"(2025, February 06). qianw211. What Is Mixed Reality?\u2014Mixed Reality\u2014learn.microsoft.com. Available online: https:\/\/learn.microsoft.com\/en-us\/windows\/mixed-reality\/discover\/mixed-reality."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Rokhsaritalemi, S., Sadeghi-Niaraki, A., and Choi, S.M. (2020). A review on mixed reality: Current trends, challenges and prospects. Appl. Sci., 10.","DOI":"10.3390\/app10020636"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Ikeuchi, K., Matsushita, Y., Sagawa, R., Kawasaki, H., Mukaigawa, Y., Furukawa, R., Miyazaki, D., Ikeuchi, K., Matsushita, Y., and Sagawa, R. (2020). Visualization\/AR\/VR\/MR Systems. Active Lighting and Its Application for Computer Vision: 40 Years of History of Active Lighting Techniques, Springer.","DOI":"10.1007\/978-3-030-56577-0"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Setiawan, K.D., Anthony, A. (2022, January 11\u201312). The Essential Factor of Metaverse for Business Based on 7 Layers of Metaverse \u2013 Systematic Literature Review. Proceedings of the 2022 International Conference on Information Management and Technology (ICIMTech), Semarang, Indonesia.","DOI":"10.1109\/ICIMTech55957.2022.9915136"},{"key":"ref_8","unstructured":"Sun, J., Gan, W., Chao, H.C., and Yu, P.S. (2022). Metaverse: Survey, applications, security, and opportunities. arXiv."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1152\/advan.00054.2011","article-title":"The use of virtual patients in medical school curricula","volume":"36","author":"Cendan","year":"2012","journal-title":"Adv. Physiol. Educ."},{"key":"ref_10","unstructured":"Association of American Medical Colleges (2007). Effective Use of Educational Technology in Medical Education: Summary Report of the 2006 AAMC Colloquium on Educational Technology, Association of American Medical Colleges."},{"key":"ref_11","unstructured":"Pase, S. (2025, February 06). Ethical Considerations in Augmented Reality Applications. Available online: https:\/\/worldcomp-proceedings.com\/proc\/p2012\/EEE6059.pdf."},{"key":"ref_12","unstructured":"Zuboff, S. (2019). The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power, PublicAffairs."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1145\/764008.763957","article-title":"Persuasive technology: Using computers to change what we think and do","volume":"2002","author":"Fogg","year":"2002","journal-title":"Ubiquity"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"401","DOI":"10.1177\/1461444815609081","article-title":"Beyond the quantified self: Thematic exploration of a dataistic paradigm","volume":"19","author":"Ruckenstein","year":"2017","journal-title":"New Media Soc."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1007\/s00146-021-01199-9","article-title":"The ethical application of biometric facial recognition technology","volume":"37","author":"Smith","year":"2022","journal-title":"Ai Soc."},{"key":"ref_16","unstructured":"Helberger, N. (2025, February 06). Profiling and Targeting Consumers in the Internet of Things\u2014A New Challenge for Consumer Law. Available online: https:\/\/dare.uva.nl\/search?identifier=81275d9e-284a-4975-8555-77c74f54cc75."},{"key":"ref_17","first-page":"149","article-title":"Privacy in context: Technology, policy, and the integrity of social life","volume":"1","author":"Nissenbaum","year":"2011","journal-title":"J. Inf. Policy"},{"key":"ref_18","unstructured":"Whittaker, M., Crawford, K., Dobbe, R., Fried, G., Kaziunas, E., Mathur, V., West, S.M., Richardson, R., Schultz, J., and Schwartz, O. (2018). AI Now Report 2018, AI Now Institute at New York University."},{"key":"ref_19","unstructured":"Journal, J. (2025, February 06). Why You Need a Metaverse Strategy|The Jabian Journal \u2014 journal.jabian.com. Available online: https:\/\/journal.jabian.com\/why-you-need-a-metaverse-strategy\/."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Chen, Z., Wu, J., Gan, W., and Qi, Z. (2022, January 17\u201320). Metaverse security and privacy: An overview. Proceedings of the 2022 IEEE International Conference on Big Data (Big Data), Osaka, Japan.","DOI":"10.1109\/BigData55660.2022.10021112"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Mingxiao, D., Xiaofeng, M., Zhe, Z., Xiangwei, W., and Qijun, C. (2017, January 5\u20138). A review on consensus algorithm of blockchain. Proceedings of the 2017 IEEE International Conference on Systems, Man, and Cybernetics (SMC), Banff, AB, Canada.","DOI":"10.1109\/SMC.2017.8123011"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Islam, A., Masuduzzaman, M., Akter, A., and Shin, S.Y. (2020, January 21\u201323). Mr-block: A blockchain-assisted secure content sharing scheme for multi-user mixed-reality applications in internet of military things. Proceedings of the 2020 International Conference on Information and Communication Technology Convergence (ICTC), Jeju, Republic of Korea.","DOI":"10.1109\/ICTC49870.2020.9289327"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Wu, M., Dai, S.L., and Yang, C. (2020). Mixed reality enhanced user interactive path planning for omnidirectional mobile robot. Appl. Sci., 10.","DOI":"10.3390\/app10031135"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1016\/j.procs.2016.07.335","article-title":"A study on data storage security issues in cloud computing","volume":"92","author":"Vurukonda","year":"2016","journal-title":"Procedia Comput. Sci."},{"key":"ref_25","first-page":"1","article-title":"Security and privacy approaches in mixed reality: A literature survey","volume":"52","author":"Thilakarathna","year":"2019","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"871","DOI":"10.1109\/TCBB.2019.2940583","article-title":"A method of information protection for collaborative deep learning under GAN model attack","volume":"18","author":"Yan","year":"2019","journal-title":"IEEE\/ACM Trans. Comput. Biol. Bioinform."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1016\/j.procs.2021.04.118","article-title":"attackGAN: Adversarial Attack against Black-box IDS using Generative Adversarial Networks","volume":"187","author":"Zhao","year":"2021","journal-title":"Procedia Comput. Sci."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1109\/COMST.2022.3202047","article-title":"A survey on metaverse: Fundamentals, security, and privacy","volume":"25","author":"Wang","year":"2022","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Asad, U., Khan, M., Khalid, A., and Lughmani, W.A. (2023). Human-centric digital twins in industry: A comprehensive review of enabling technologies and implementation strategies. Sensors, 23.","DOI":"10.3390\/s23083938"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"5494","DOI":"10.1109\/TII.2021.3110808","article-title":"A verifiable privacy-preserving machine learning prediction scheme for edge-enhanced HCPSs","volume":"18","author":"Li","year":"2021","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Roesner, F., Denning, T., Newell, B.C., Kohno, T., and Calo, R. (2014, January 13\u201317). Augmented reality: Hard problems of law and policy. Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication, Seattle, WA, USA.","DOI":"10.1145\/2638728.2641709"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1109\/MC.2017.9","article-title":"The emergence of edge computing","volume":"50","author":"Satyanarayanan","year":"2017","journal-title":"Computer"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Schilit, B., Adams, N., and Want, R. (1994, January 8\u20139). Context-aware computing applications. Proceedings of the 1994 First Workshop on Mobile Computing Systems and Applications, Santa Cruz, CA, USA.","DOI":"10.1109\/WMCSA.1994.16"},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Chen, S., Li, Z., Dangelo, F., Gao, C., and Fu, X. (2018, January 5\u20138). A case study of security and privacy threats from augmented reality (ar). Proceedings of the 2018 International Conference on Computing, Networking and Communications (ICNC), Maui, HI, USA.","DOI":"10.1109\/ICCNC.2018.8390291"},{"key":"ref_35","unstructured":"Alves, M., Ribeiro, T., Santos, L., Marto, A., Gon\u00e7alves, A., Rabad\u00e3o, C., and Costa, R.L.d.C. (2024, January 18\u201320). Evaluating Service-based Privacy-Protection for Augmented Reality Applications. Proceedings of the 16th International Conference on Management of Digital Ecosystems (MEDES 2024), Naples, Italy."},{"key":"ref_36","unstructured":"Ribeiro, T., Marto, A., Gon\u00e7alves, A., Santos, L., Rabad\u00e3o, C., and Costa, R.L.d.C. (2024, January 5\u20136). SafeARUnity: Real-Time Image Processing to Enhance Privacy Protection in LBARGs. Proceedings of the 14th International Conference on Videogame Sciences and Arts (VideoJogos 2024), Leiria, Portugal."},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Cruz, A.C., Costa, R.L.d.C., Santos, L., Rabad\u00e3o, C., Marto, A., and Gon\u00e7alves, A. (2025). Assessing User Perceptions and Preferences on Applying Obfuscation Techniques for Privacy Protection in Augmented Reality. Future Internet, 17.","DOI":"10.3390\/fi17020055"},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"234","DOI":"10.26599\/BDMA.2022.9020047","article-title":"Security and Privacy in Metaverse: A Comprehensive Survey","volume":"6","author":"Huang","year":"2023","journal-title":"Big Data Min. Anal."},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Sharma, R.C., and Zamfiroiu, A. (2023, January 18\u201320). Cybersecurity Threats and Vulnerabilities in the Metaverse. Proceedings of the 2023 International Conference on Intelligent Metaverse Technologies & Applications (iMETA), Tartu, Estonia.","DOI":"10.1109\/iMETA59369.2023.10294950"},{"key":"ref_40","unstructured":"Qian, L., Zhu, Z., Hu, J., and Liu, S. (2015, January 10\u201311). Research of SQL injection attack and prevention technology. Proceedings of the 2015 International Conference on Estimation, Detection and Information Fusion (ICEDIF), Harbin, China."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"5467","DOI":"10.1109\/OJCOMS.2024.3397044","article-title":"User Safety and Security in the Metaverse: A Critical Review","volume":"5","author":"Sharma","year":"2024","journal-title":"IEEE Open J. Commun. Soc."},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Li, X.Y., Zhang, C., Jung, T., Qian, J., and Chen, L. (2016, January 10\u201314). Graph-based privacy-preserving data publication. Proceedings of the IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer Communications, San Francisco, CA, USA.","DOI":"10.1109\/INFOCOM.2016.7524584"},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1109\/MCOM.001.1900367","article-title":"Endogenous security defense against deductive attack: When artificial intelligence meets active defense for online service","volume":"58","author":"Zhou","year":"2020","journal-title":"IEEE Commun. Mag."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"624","DOI":"10.1109\/TCCN.2020.3018159","article-title":"Collaborative cloud-edge-end task offloading in mobile-edge computing networks with limited communication capability","volume":"7","author":"Kai","year":"2020","journal-title":"IEEE Trans. Cogn. Commun. Netw."}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/17\/2\/83\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T16:31:57Z","timestamp":1760027517000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/17\/2\/83"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,12]]},"references-count":44,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2025,2]]}},"alternative-id":["fi17020083"],"URL":"https:\/\/doi.org\/10.3390\/fi17020083","relation":{},"ISSN":["1999-5903"],"issn-type":[{"value":"1999-5903","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,2,12]]}}}