Proposed Methodology for Cyber Criminal Profiling

New citation alert added.

This alert has been successfully added and will be sent to:

You will be notified whenever a record that you have chosen has been cited.

To manage your alert preferences, click on the button below.

New Citation Alert!

Please log in to your account

Information & Contributors

Bibliometrics & citations, view options.

  • Meland P Nesheim D Bernsmed K Sindre G (2022) Assessing cyber threats for storyless systems Journal of Information Security and Applications 10.1016/j.jisa.2021.103050 64 :C Online publication date: 1-Feb-2022 https://dl.acm.org/doi/10.1016/j.jisa.2021.103050
  • Haga K Meland P Sindre G (2020) Breaking the Cyber Kill Chain by Modelling Resource Costs Graphical Models for Security 10.1007/978-3-030-62230-5_6 (111-126) Online publication date: 22-Jun-2020 https://dl.acm.org/doi/10.1007/978-3-030-62230-5_6

Recommendations

Criminal profiling and insider cyber crime.

On a global scale, cyber crime has skyrocketed with the advancement of the electronic medium. While progress is being made in combating cyber crime (particularly with the Council of Europe's Convention on Cyber Crime), a large gap continues to exist in ...

Criminal profiling and industrial security

Criminal profiling' may provide an effective measure for industrial security. While criminal profiling has been frequently applied to support the prevention and investigation of crimes, particularly violent crimes, it has not been applied to industrial ...

Towards a Methodology for Profiling Cyber Criminals

The progress of future e-business and e- commerce will depend on the ability of our legal institutions to protect general users from cyber crimes. While there has been substantial progress in the development and implementation of tools for detecting and ...

Information

Published in.

Taylor & Francis, Inc.

United States

Publication History

Contributors, other metrics, bibliometrics, article metrics.

  • 2 Total Citations View Citations
  • 0 Total Downloads
  • Downloads (Last 12 months) 0
  • Downloads (Last 6 weeks) 0

View options

Login options.

Check if you have access through your login credentials or your institution to get full access on this article.

Full Access

Share this publication link.

Copying failed.

Share on social media

Affiliations, export citations.

  • Please download or close your previous search result export first before starting a new bulk export. Preview is not available. By clicking download, a status dialog will open to start the export process. The process may take a few minutes but once it finishes a file will be downloadable from your browser. You may continue to browse the DL while the export process is in progress. Download
  • Download citation
  • Copy citation

We are preparing your search results for download ...

We will inform you here when the file is ready.

Your file of search results citations is now ready.

Your search export query has expired. Please try again.

Proposed Methodology for Cyber Criminal Profiling

Buy article:.

$71.00 + tax ( Refund Policy )

Pressing the buy now button more than once may result in multiple purchases

Author: Warikoo

Source: Information Security Journal: A Global Perspective , Volume 23, Numbers 4-6, 4 July 2014, pp. 172-178(7)

Publisher: Taylor and Francis Ltd

DOI: https://doi.org/10.1080/19393555.2014.931491

  • < previous article
  • view table of contents
  • Supplementary Data
  • Suggestions

Keywords: cyber attacks ; cyber criminal profiling ; forensics ; profiling framework

Document Type: Research Article

Affiliations: Jersey City, New Jersey, USA

Publication date: July 4, 2014

  • Ingenta Connect
  • Ingenta DOI
  • Latest TOC RSS Feed
  • Recent Issues RSS Feed
  • Accessibility

Share Content

  • Free content
  • Partial Free content
  • New content
  • Open access content
  • Partial Open access content
  • Subscribed content
  • Partial Subscribed content
  • Free trial content

Academia.edu no longer supports Internet Explorer.

To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to  upgrade your browser .

Enter the email address you signed up with and we'll email you a reset link.

  • We're Hiring!
  • Help Center

paper cover thumbnail

Profiling the Cybercriminal: A Systematic Review of Research

Profile image of Maria Bada

As cybercrime becomes one of the most significant threats facing society today, it is of utmost importance to better understand the perpetrators behind such attacks. In this article, we seek to advance research and practitioner understanding of the cybercriminal (cyber-offender) profiling domain by conducting a rigorous systematic review. This work investigates the aforementioned domain to answer the question: what is the state-of-the-art in the academic field of understanding, characterising and profiling cybercriminals. Through the application of the PRISMA systematic literature review technique, we identify 39 works from the last 14 years (2006-2020). Our findings demonstrate that overall, there is lack of a common definition of profiling for cyber-offenders. The review found that one of the primary types of cybercriminals that studies have focused on is hackers and the majority of papers used the deductive approach as a preferred one. This article produces an up-to-date characte...

Related Papers

SHS web of conferences

Aldona Kipāne

proposed methodology for cyber criminal profiling

Angelina Stanojoska , Kristina Nikolova

Claire Hargreaves

Computer Law & Security Review

Nick Nykodym

Research Agenda: The Human Factor in Cybercrime and Cybersecurity

Marleen Weulen Kranenbarg

Journal of Crime and Justice

Adam Bossler

Jeimy Cano , Victor Cavaller

The increasing expansion and diversification in the strategies and practices of cybercrime has become a difficult obstacle in order both to understand the extent of embedded risks and to define efficient policies of prevention for corporations, institutions and agencies. The present study represents the most comprehensive review of the origin, typologies and developments of Cybercrime phenomenon over the past decade so far. By means of this detailed study, this paper tackles the issue first describing and discussing former different criteria of classification in the field and secondly, providing a broad list of definitions and an analysis of the cybercrime practices. A conceptual taxonomy of cybercrime is introduced and described. The proposal of a classification criterion is used in conjunction with a cybercrime hierarchy derived from the degrees and scale of vulnerability and targets.

Cyber Criminology

Prof. Jaishankar Karupannan

Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)

Pradeep Ray

Loading Preview

Sorry, preview is currently unavailable. You can download the paper by clicking the button above.

RELATED PAPERS

Alice Hutchings

2015 IEEE Trustcom/BigDataSE/ISPA

Chafika BENZAID

Angie Sapherson

olumide Babatope longe

IGI Global eBooks

Anne-Marie Mohammed

Journal of Criminology

Chad Whelan

Tomoko Y . Steen

2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech)

Rebecca Cathey

Journal of Criminal Justice and Security

Andrzej Porębski , Andrzej Uhl

SSRN Electronic Journal

raghav sharma

International Journal of Cyber Criminology

Nicholas Chantler

2012 European Intelligence and Security Informatics Conference

Henrik Artman

International Journal for Research in Applied Science and Engineering Technology IJRASET

IJRASET Publication

Policing: A Journal of Policy and Practice

Jason Johnstone

Roderic Broadhurst

IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)

Lana Shehadeh

fatma A B D A L L A mabrouk

Journal in Computer Virology

MARIA PAPADAKI

The Palgrave Handbook of International Cybercrime and Cyberdeviance

Adrienne McCarthy

International Journal of Innovative Research in Engineering and Management (IJIREM)

IJIREM JOURNAL

  •   We're Hiring!
  •   Help Center
  • Find new research papers in:
  • Health Sciences
  • Earth Sciences
  • Cognitive Science
  • Mathematics
  • Computer Science
  • Academia ©2024
  • DOI: 10.1109/HICSS.2008.460
  • Corpus ID: 16823461

Towards a Methodology for Profiling Cyber Criminals

  • Leonard Kwan , P. Ray , Greg Stephens
  • Published in Proceedings of the 41st… 7 January 2008
  • Computer Science, Law
  • Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)

Figures from this paper

figure 1

22 Citations

Cyber criminal profiling, proposed methodology for cyber criminal profiling, a case study on host based data analysis & cyber criminal profiling in honeynets, criminal profiling using machine learning, profiling the cyberstalker, open issues in cybercriminal profiling, proposed model for automatic evidence collection in ids, application of intrusion detection system in automatic evidence collection using digital forensics, profiling the cybercriminal: a systematic review of research, a framework for analysis attackers’ accounts, 14 references, a classification of computer security incidents based on reported attack data, the role of criminal profiling in the computer forensics process.

  • Highly Influential

Profiling cyber attacks using alert regression profiles

The honeynet project : trapping the hackers what specific threats do computer networks face from hackers who ’ s perpetrating these threats and how , an examination of digital forensic models, criminal profiling: an introduction to behavioral evidence analysis, experiences with honeypot systems: development, deployment, and analysis, a ten step process for forensic readiness, criminal profiling: an introduction to behavioural evidence analysis, getting physical with the digital investigation process, related papers.

Showing 1 through 3 of 0 Related Papers

"Proposed Methodology for Cyber Criminal Profiling."

Details and statistics.

DOI: 10.1080/19393555.2014.931491

access: closed

type: Journal Article

metadata version: 2020-03-04

proposed methodology for cyber criminal profiling

Please note: Providing information about references and citations is only possible thanks to to the open metadata APIs provided by crossref.org and opencitations.net . If citation data of your publications is not openly available yet, then please consider asking your publisher to release your citation data to the public. For more information please see the Initiative for Open Citations (I4OC) . Please also note that there is no way of submitting missing references or citation data directly to dblp.

Please also note that this feature is work in progress and that it is still far from being perfect. That is, in particular,

  • the lists below may be incomplete due to unavailable citation data,
  • reference strings may not have been successfully mapped to the items listed in dblp, and
  • we do not have complete and curated metadata for all items given in these lists.

JavaScript is requires in order to retrieve and display any references and citations for this record.

Schloss Dagstuhl - Leibniz Center for Informatics

manage site settings

To protect your privacy, all features that rely on external API calls from your browser are turned off by default . You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.

Unpaywalled article links

unpaywall.org

load links from unpaywall.org

Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy .

Archived links via Wayback Machine

web.archive.org

load content from archive.org

Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy .

Reference lists

crossref.org

load references from crossref.org and opencitations.net

Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org , opencitations.net , and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy , as well as the AI2 Privacy Policy covering Semantic Scholar.

Citation data

load citations from opencitations.net

Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.

OpenAlex data

openalex.org

load data from openalex.org

Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex .

w3c valid html

see also: Terms of Use | Privacy Policy | Imprint

dblp was originally created in 1993 at:

University of Trier

since 2018, dblp has been operated and maintained by:

Schloss Dagstuhl - Leibniz Center for Informatics

the dblp computer science bibliography is funded and supported by:

BMBF

Reinforcing Digital Forensics Through Intelligent Behavioural Evidence Analysis: Social Media Hate Speech Profiling

  • Conference paper
  • First Online: 29 January 2022
  • Cite this conference paper

proposed methodology for cyber criminal profiling

  • Barkhashree 8 &
  • Parneeta Dhaliwal 8  

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1546))

Included in the following conference series:

  • International Conference on Artificial Intelligence and Speech Technology

1071 Accesses

Cumulative boom in the use of social media for crime incidents creates a need to achieve improvement in overall efficiency by developing tools and techniques. The present manuscript discusses this issue by proposing a model which offer a feasible solution to escalate the criminal investigation by performing digital criminal profiling using social media hate speeches content. The proposed expert system will consider the hate speech content analysis along with other digital footprints of the suspects. The achieved analysis along with the proofs collected manually will be fed into the knowledge base of expert system. The system will automatically process the dataset to lower down the list of suspects using intelligent machine learning algorithms. Hate speech content analysis achieved using latest intelligent mechanisms, can perform in the boundaries of Behavioural Evidence Analysis-Standardised (BEA-S) model to create criminal profiling which again act as a base for future investigations. The whole concept and the model are discussed in the paper which surely will upgrade the current investigation process to an innovative stature of digital forensics.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save.

  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
  • Available as EPUB and PDF
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

proposed methodology for cyber criminal profiling

Impounding behavioural connotations for hate speech analysis – a view towards criminal investigation using machine learning

proposed methodology for cyber criminal profiling

Addressing Hate Speech with Data Science: An Overview from Computer Science Perspective

proposed methodology for cyber criminal profiling

Automatic Detection and Monitoring of Hate Speech in Online Multi-social Media

Anconelli, M.: Introduzione al digital profiling (2010). www.cybercrimes.it

Colombini, C.M., Colella, A., Army, I.: Digital scene of crime: technique of profiling users. J. Wirel. Mob. Netw. Ubiq. Comput. Depend. Appl. 3 (3), 50–73 (2012)

Google Scholar  

Al Mutawa, N., et al.: Behavioural digital forensics model: embedding behavioural evidence analysis into the investigation of digital crimes. Digit. Invest. 28 , 70–82 (2019)

Article   Google Scholar  

Deebak, B.D., Zahmatkesh, H.: Forensic analysis in social networking applications. In: Security in IoT Social Networks, pp. 133–17. Academic Press, (2021)

Petherick, W.A., Turvey, B.E.: Behavioral evidence analysis. In: Criminal Profiling: An Introduction to Behavioral Evidence Analysis, p. 133 (2011)

Shree, B., Dhaliwal, P.: Behavioural evidence analysis: a paradigm shift in digital forensics. Int. J. Digital Crime Forensics (IJDCF) 13 (5), 20–42 (2021)

Al Mutawa, N., Bryce, J., Franqueira, V.N., Marrington, A., Read, J.C.: Behavioural Digital forensics model: embedding behavioural evidence analysis into the investigation of digital crimes. Digit. Investig. 28 , 70–82 (2018). https://doi.org/10.1016/j.diin.2018.12.003

Al Mutawa, N., et al.: Behavioural evidence analysis applied to digital forensics: an empirical analysis of child pornography cases using P2P networks. In: 2015 10th International Conference on Availability, Reliability and Security. IEEE (2015)

Petherick, W.A., Turvey, B.: Behavioural evidence analysis: ideo-deductive method of criminal profiling. In: Criminal Profiling: An Introduction to Behavioural Evidence Analysis, pp. 133–153. Elsevier (2008)

Warikoo, A.: Proposed methodology for cyber criminal profiling. Inf. Secur. J. Global Perspect. 23 (4–6), 172–178 (2014)

Ainsworth, P.: Offender Profiling Crime Analysis. Willan, London (2013)

Book   Google Scholar  

Steel, C.M.: Idiographic digital profiling: behavioral analysis based on digital forensics. J. Digit. Forensics Secur. Law 9 (1), 1 (2014)

Rogers, M.: The role of criminal profiling in the computer forensics process. Comput. Secur. 22 (4), 292–298 (2003)

Goyal, A., et al.: Criminal profiling using machine learning. Int. Res. J. Eng. Technol. (IRJET) 07 (06) (2020)

Balogun, A.M., Zuva, T.: Criminal profiling in digital forensics: assumptions, challenges and probable solution. In: 2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC). IEEE (2018)

Tapley, J., Davies, P.: Victimology: a conversion of narratives.. In: Victimology, pp. 1–16. Palgrave Macmillan, Cham (2020)

Jaishankar, K.: Cyber victimology: a new sub-discipline of the twenty-first century victimology. In: Joseph, J., Jergenson, S. (eds.) An International Perspective on Contemporary Developments in Victimology, pp. 3–19. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-41622-5_1

Chapter   Google Scholar  

Vogel, I., Meghana, M.: Profiling hate speech spreaders on twitter: SVM vs. Bi-LSTM. In: CLEF (2021)

Bevendorff, J., et al.: Overview of PAN 2021: authorship verification, profiling hate speech spreaders on twitter, and style change detection: extended abstract. In: Hiemstra, D., Moens, M.-F., Mothe, J., Perego, R., Potthast, M., Sebastiani, F. (eds.) Advances in Information Retrieval: 43rd European Conference on IR Research, ECIR 2021, Virtual Event, March 28 – April 1, 2021, Proceedings, Part II, pp. 567–573. Springer International Publishing, Cham (2021). https://doi.org/10.1007/978-3-030-72240-1_66

Iqbal, S., Alharbi, S.A.: Advancing automation in digital forensic investigations using machine learning forensics. Digit. Forensic Sci. 3 (2020)

Mullah, N., Zainon, W.: Advances in machine learning algorithms for hate speech detection in social media: a review. IEEE Access 9 , 88364–88376 (2021)

Zimmerman, S., Kruschwitz, U., Fox, C.: Improving hate speech detection with deep learning ensembles. In: Proceedings of the Eleventh International Conference on Language Resources and Evaluation (LREC 2018) (2018)

Download references

Author information

Authors and affiliations.

Manav Rachna University, Faridabad, Haryana, India

Barkhashree & Parneeta Dhaliwal

You can also search for this author in PubMed   Google Scholar

Editor information

Editors and affiliations.

Indira Gandhi Delhi Technical University for Women, Delhi, India

Kamrah Institute of Information Technology, Gurgaon, India

S. S. Agrawal

Arun Sharma

Rights and permissions

Reprints and permissions

Copyright information

© 2022 Springer Nature Switzerland AG

About this paper

Cite this paper.

Barkhashree, Dhaliwal, P. (2022). Reinforcing Digital Forensics Through Intelligent Behavioural Evidence Analysis: Social Media Hate Speech Profiling. In: Dev, A., Agrawal, S.S., Sharma, A. (eds) Artificial Intelligence and Speech Technology. AIST 2021. Communications in Computer and Information Science, vol 1546. Springer, Cham. https://doi.org/10.1007/978-3-030-95711-7_52

Download citation

DOI : https://doi.org/10.1007/978-3-030-95711-7_52

Published : 29 January 2022

Publisher Name : Springer, Cham

Print ISBN : 978-3-030-95710-0

Online ISBN : 978-3-030-95711-7

eBook Packages : Computer Science Computer Science (R0)

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

  • Publish with us

Policies and ethics

  • Find a journal
  • Track your research

IEEE Account

  • Change Username/Password
  • Update Address

Purchase Details

  • Payment Options
  • Order History
  • View Purchased Documents

Profile Information

  • Communications Preferences
  • Profession and Education
  • Technical Interests
  • US & Canada: +1 800 678 4333
  • Worldwide: +1 732 981 0060
  • Contact & Support
  • About IEEE Xplore
  • Accessibility
  • Terms of Use
  • Nondiscrimination Policy
  • Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2024 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.

A comprehensive methodology for profiling cyber-criminals

  • January 2011

Tennakoon Hemamali at University of Aberdeen

  • University of Aberdeen

Discover the world's research

  • 25+ million members
  • 160+ million publication pages
  • 2.3+ billion citations

No full-text available

Request Full-text Paper PDF

To read the full-text of this research, you can request a copy directly from the author.

Marshall Rich

  • Melissa Martineau
  • Elena Spiridon

Aldona Kipāne

  • Venelin Georgiev
  • Alice Silde

Olga Angelopoulou

  • Adedayo M. Balogun

Tranos Zuva

  • Recruit researchers
  • Join for free
  • Login Email Tip: Most researchers use their institutional email address as their ResearchGate login Password Forgot password? Keep me logged in Log in or Continue with Google Welcome back! Please log in. Email · Hint Tip: Most researchers use their institutional email address as their ResearchGate login Password Forgot password? Keep me logged in Log in or Continue with Google No account? Sign up

Information

  • Author Services

Initiatives

You are accessing a machine-readable page. In order to be human-readable, please install an RSS reader.

All articles published by MDPI are made immediately available worldwide under an open access license. No special permission is required to reuse all or part of the article published by MDPI, including figures and tables. For articles published under an open access Creative Common CC BY license, any part of the article may be reused without permission provided that the original article is clearly cited. For more information, please refer to https://www.mdpi.com/openaccess .

Feature papers represent the most advanced research with significant potential for high impact in the field. A Feature Paper should be a substantial original Article that involves several techniques or approaches, provides an outlook for future research directions and describes possible research applications.

Feature papers are submitted upon individual invitation or recommendation by the scientific editors and must receive positive feedback from the reviewers.

Editor’s Choice articles are based on recommendations by the scientific editors of MDPI journals from around the world. Editors select a small number of articles recently published in the journal that they believe will be particularly interesting to readers, or important in the respective research area. The aim is to provide a snapshot of some of the most exciting work published in the various research areas of the journal.

Original Submission Date Received: .

  • Active Journals
  • Find a Journal
  • Proceedings Series
  • For Authors
  • For Reviewers
  • For Editors
  • For Librarians
  • For Publishers
  • For Societies
  • For Conference Organizers
  • Open Access Policy
  • Institutional Open Access Program
  • Special Issues Guidelines
  • Editorial Process
  • Research and Publication Ethics
  • Article Processing Charges
  • Testimonials
  • Preprints.org
  • SciProfiles
  • Encyclopedia

computers-logo

Article Menu

proposed methodology for cyber criminal profiling

  • Subscribe SciFeed
  • Recommended Articles
  • Google Scholar
  • on Google Scholar
  • Table of Contents

Find support for a specific problem in the support section of our website.

Please let us know what you think of our products and services.

Visit our dedicated information section to learn more about MDPI.

JSmol Viewer

Slacpss: secure lightweight authentication for cyber–physical–social systems.

proposed methodology for cyber criminal profiling

1. Introduction

Click here to enlarge figure

2. Metaverse and Security Threats

2.1. metaverse architecture, 2.1.1. human society, 2.1.2. physical infrastructures, 2.1.3. interconnection of virtual worlds, 2.1.4. metaverse engine, 2.1.5. in-world information flow.

  • In the physical world, sensing and control infrastructure driven by IoT technologies is a key element in the digital transformation of the physical world, utilizing pervasive sensors and actuators. The resulting massive data from IoT devices are transmitted and processed through network and computing infrastructures.
  • Within the digital realm, the metaverse engine efficiently processes and organizes digital information gathered from both the physical and human spheres, enabling the construction and presentation of vast metaverses while offering a selection of metaverse services.

2.1.6. Information Flow across Worlds

  • By employing human–computer interface (HCI) technologies, humans can engage with physical objects, and XR technologies allow them to immerse themselves in virtually augmented reality, such as holographic telepresence.
  • The connection between the human world and the digital world is facilitated by the Internet, which is the largest computer network globally. Through smart devices like smartphones, wearable sensors, and VR helmets, users can engage with the digital realm for purposes such as knowledge creation, sharing, and acquisition.
  • The interconnection of smart devices in the IoT infrastructure facilitates the seamless exchange of information between the physical and digital realms, enabling effective digitalization [ 26 ].

2.2. Security Threats to the Metaverse

2.2.1. threats to authentication in the metaverse.

  • Identity Theft: If a user’s identity is stolen in the metaverse, their avatars, digital belongings, social connections, and digital life may be at risk of being exposed and lost, posing a more significant threat than in traditional information systems.
  • Impersonation Attack: Within the metaverse, an impersonation attack can be executed when an attacker pretends to be an authorized entity, allowing the attacker to gain access to services or systems without proper authorization [ 28 ].
  • Avatar Authentication Issue: Verifying the authenticity of avatars, such as confirming friends’ avatars, presents a more complex task in the metaverse than real-world identity authentication. This complexity arises from the necessity to validate facial features, voice, video recordings, and similar aspects.
  • Trusted and Interoperable Authentication: To achieve the security, efficiency, and reliability of diverse service domains and virtual worlds in the metaverse, users and avatars must promptly establish a robust cross-platform and cross-domain identity verification system. This system should be able to operate seamlessly across various platforms, including blockchains.

2.2.2. Threats to Data Management in the Metaverse

  • Data Tampering Attacks: Integrity characteristics play a crucial role in ensuring the efficient monitoring and identification of changes that occur during data exchange across ternary worlds and diverse sub-metaverses. Adversaries can manipulate, counterfeit, substitute, and eliminate unprocessed data throughout the metaverse data services’ lifecycle to disrupt the normal activities of users, avatars, or physical entities [ 29 ].
  • False Data Injection Attacks: Attackers can inject falsified information, including false messages and incorrect instructions, to mislead metaverse systems [ 30 ]. For example, the use of AI-aided content creation can contribute to an enhanced user experience during the initial phase of the metaverse. However, adversaries can exploit this by injecting adversary training samples or poisoned gradients into centralized or distributed AI training, thereby generating biased AI models.
  • Issues in Managing New Types of Metaverse Data: When examining the metaverse in relation to the existing Internet, it becomes evident that new hardware and devices are necessary to collect diverse forms of data (e.g., eye movement, facial expression, and head movement) that were previously uncollected. Data collection is vital for enabling fully immersive user experiences [ 31 ].
  • Threats to the Data Quality of User-Generated Content (UGC) and Physical Input: In the metaverse, self-centered users or avatars might upload low-quality content in UGC mode to reduce expenses, consequently impacting user experience by creating an artificial environment.
  • Threats to User-Generated Content (UGC) Ownership and Provenance: Contrary to the government’s regulated asset registration process in the physical realm, the metaverse exists as an open and fully autonomous domain with no centralized authority in place.
  • Threats to Intellectual Property Protection: In contrast to the real world, the definition of intellectual property in the metaverse should be modified to establish clear licensing boundaries and usage rights for owners as the metaverse expands [ 32 ].

2.2.3. Privacy Threats in the Metaverse

  • Pervasive Data Collection: For a truly immersive experience with an avatar, it is essential to conduct comprehensive user profiling at an exceedingly granular level [ 33 ], which includes facial expressions, eye and hand movements, speech patterns, biometric features, and even brainwave patterns.
  • Privacy Leakage in Data Transmission: Personally identifiable information obtained from wearables such as Head-Mounted Displays (HMDs) is extensively gathered in metaverse systems and then transmitted through wired and wireless means, with strict measures in place to safeguard the confidentiality of these data from unauthorized parties [ 34 ].
  • Privacy Leakage in Data Processing: Metaverse services rely on the collection and analysis of large amounts of data from people and their environments to develop avatars and virtual settings, posing a risk of sensitive information exposure [ 35 ].
  • Privacy Leakage in Cloud/Edge Storage: Storing private and sensitive information, such as user profiling, for a significant number of users on cloud servers or edge devices can give rise to privacy disclosure concerns. Hackers can potentially deduce users’ privacy information by leveraging frequent queries through differential attacks [ 36 ].
  • Rogue or Compromised End Devices: In the metaverse, an increased number of wearable sensors will be utilized on human bodies and their surroundings to enable avatars to establish natural eye contact, interpret hand gestures, mirror facial expressions, and more in real-time.
  • Threats to Digital Footprints: Avatars in the metaverse can exhibit behavior patterns, preferences, habits, and activities that mirror those of their physical counterparts, enabling attackers to gather digital footprints and exploit the similarity to real users for accurate user profiling and potentially illegal activities [ 37 ].
  • Identity Linkability in Ternary Worlds: As the metaverse incorporates reality within itself, the seamless integration of the human, physical, and virtual worlds gives rise to concerns regarding identity linkability across these ternary realms [ 32 ].
  • Threats to Accountability: XR and HCI devices inherently capture a higher degree of sensitive data, such as user locations, behavior patterns, and surroundings, than traditional smart devices.
  • Threats to Customized Privacy: Different users within specific sub-metaverses [ 38 ] tend to have unique privacy preferences for various services or interaction objects, similar to what is seen on other service platforms on the Internet.

2.2.4. Threats to Metaverse Network

2.2.5. threats to the metaverse economy.

  • Service Trust Issues in UGC and Virtual Object Trading: Avatars in the open metaverse marketplace can be considered untrustworthy entities due to the absence of prior interactions. This poses inherent risks of fraud, such as repudiation and refusal to pay, during user-generated content and virtual object trading among various stakeholders in the metaverse. Additionally, when constructing virtual objects using digital twin technologies, the metaverse must ensure the authenticity and trustworthiness of the produced and deployed digital copies [ 39 ].
  • Threats to Digital Asset Ownership: The distributed metaverse system, lacking a central authority and featuring intricate circulation and ownership structures such as collective ownership and shared ownership [ 40 ], poses substantial challenges in the lifecycle of digital assets within the creator economy. These challenges encompass the generation, pricing, trusted trading, and ownership traceability of such assets.

2.2.6. Threats to the Physical World and Human Society

  • Threats to Personal Safety: In the metaverse, hackers can exploit wearable devices, XR helmets, and indoor sensors like cameras to gather information on users’ daily routines and monitor their live locations, ultimately aiding in criminal activities such as burglary and endangering their safety [ 42 ].
  • Threats to Infrastructure Safety: The identification of software or system vulnerabilities within the complex metaverse allows hackers to use compromised devices as entry points for launching APT attacks on critical national infrastructures like power grid systems and high-speed rail systems.
  • Social Effects: Despite the appeal of the metaverse as a digital society, it can lead to severe side effects in human society, such as addiction, the spread of rumors, child exploitation, biased outcomes, extortion, cyberbullying, cyberstalking, and even simulated terrorist activities [ 43 ].

2.2.7. Threats to Metaverse Governance

3. related works, 4. preliminaries, 4.1. elliptic curve cryptography (ecc), 4.2. biohashing.

  • A vector, V € R n , is used to represent a biometric characteristic derived from the fingerprint.
  • Using the Blum–Blum–Shub method, a set of r i € Rn (i = 1···n) pseudo-random numbers is generated.
  • The Gram–Schmidt procedure is used to change the basis r i into an or i € Rn (i = 1, ···n) using generated pseudo-random numbers.
  • The inner product between V and ori is obtained, followed by the calculation for the biohash code bi:

5. Proposed Secure Lightweight Authentication for Cyber–Physical–Social System (SLACPSS)

5.1. system model.

  • Certificate authority (CA): The certificate authority is a completely reliable entity that sets the initial system parameters and shares public information. The certificate authority obtains the user’s pseudo-identity, public key, and personal details from the user, which will be used to verify the user’s identity and are then stored in the database. Moreover, the certificate authority generates user credentials that need to be authenticated by the user and the platform servers. These credentials are then delivered to the user.
  • User: The user submits their pseudo-identity, public key, and personal details to the certificate authority for verification of their identity in order to join the metaverse. Subsequently, the user can interact with different platform servers by undergoing an authentication procedure that relies on the user’s pseudo-identity and credential information. Following that, the user can design an avatar and enter different virtual environments overseen by the platform servers. Moreover, the user can verify their identity with other avatars by utilizing the pseudo-identity and public key saved in the database, ensuring secure interactions between avatars in virtual spaces.
  • Platform Server: Each platform server offers a range of immersive services, including education and gaming, to users within virtual spaces. When a user tries to log into the platform server, their credentials and pseudo-identity are verified using the database and the public key of the certificate authority.
  • The certificate authority requires users to share their pseudo-identity, public key, and personal information to verify their identity and grant access credentials for interacting with metaverse environments.
  • On each platform server, an avatar can be created using the user’s pseudo-identity, public key, and credential information. The user then sends an authentication message to the suitable platform server to gain access to the pertinent virtual spaces.
  • If the authentication process goes well, the platform server will provide the user with a session key.
  • The session key will then be used to establish a secure connection between the user and the platform server.
  • A user can communicate with other avatars after entering a virtual environment using an avatar. The avatar authentication phase can be handled by the user for safe interactions between avatars.

5.1.1. Initialization Step

5.1.2. user setup step.

  • ID i, PW i, and B i are entered by the Ui into SDi, which then makes a random integer, RN i, and a private key, ki. The public key (PK i = k i · P) and pseudo-identity (PID i = h (ID i || RN i)) are then calculated by Ui. Then, the Ui transmits the message {PID i, PK i, info i } to CA across a trust line, where info (i) is the Ui’s private information.
  • CA verifies the information and examines the database’s (PID I; PK i) uniqueness. If this process is finished successfully, CA makes a random number, xi, and calculates X i = x i · p, Sig i_ca = x i + h (PID i || PK i || X i) · k ca, where Sig i_ca is the signature value used to verify that Ui has been approved by the CA. Afterward, the CA transmits V i = (X i, Sig i-ca) and saves (PID i, PK i) in the database.
  • The CA transmits {Vi} to U i by the trusted line.
  • U i calculates Z = Vi ⊕ h (ID i || PW i|| RN i) and then saves Z in SD.

5.1.3. Creating an Avatar

  • To enter the virtual environment managed by the St, the Ui creates an avatar using SDi during the creating an avatar stage, and the avatar making process is shown in Table 4 , which is detailed below.
  • ID i, PW i, and B i are entered by the U i into SDi and then they create and calculate a random number, RN I, and a private key (k i) and public key (PK i = k i · P). Then, Vi* = Z + h (IDi ||PWi||RNi) is calculated, and the user creates a random number (n i) and calculates Ni = ni · P and EM i = (N i||Sig i_ca) ⊕ h (avatar i||PID i||RN i).
  • Through a secure channel, the Ui transmits {avatar i, PID i, EM i } to the St.
  • The St retrieves PK i after checking PID i in the database, the St confirms the database’s uniqueness of (avatar i, PK i), and the St calculates (Ni ||Sig i_ca) = EMi ⊕ h (avatar i || PID i|| RN i) and Sig i_ca · P = x i · P + h (PID i ||PK i || X i) · PK ca.
  • The St saves (avatar i, PK i) in the database and publishes (avatar i, PK i).

5.1.4. Login and Authentication Step

  • ID i, PW i, and B i are entered by the U i into SDi, and then a random number (n 1 and T1) is created and calculated.
  • The U i calculates N 1 = n 1 · P, Ver i - st = h (avatar i||PID i||T1) · K i, and EM 1 = (avatar i|| PID i|| Ver i - st) + h (N1||T1).
  • The U i transmits {EM 1, T 1} to St by a public channel.
  • Then, St receives {EM 1, T 1} from U i.
  • T1 is checked by the condition |T1* − T1|.
  • St calculates Ver i - st · P = ? h (avatar i|| PID i||T1) · PK i.
  • St creates T2 and n 2 and calculates N 2 = n 2 ·P.
  • SKi- st = h (avatar i||N2||T2) ·K st.
  • St calculates EM 2 = h (avatar i||PID i||N 2||T 2) ⊕ (SKi- st||T 2).
  • St transmits {EM 2, T 2} to U i by a public channel.
  • As soon as the U i receives {EM 2, T 2} from St, T2 is checked by the condition |T2* − T2|, and the user calculates SKi- st · P = h (avatar i||N2||T2) · PK st and EM*2 = h (a vatar i||PID i || N2||T 2) ⊕ (SKi- st||T 2) and verifies EM*2 =? EM 2.
User (Ui)                           Platform Server (St)
Input ID i, PW i, B i
Generate random number, n1 and T1
Compute N1 = P· n1
Compute Ver i – st = h (avatar i|| PID i||T1) · K i
EM 1 = (avatar i|| PID i||Ver i - st) + h (N1 ||T1)
                         { EM1, T 1}
           
                         Check | T1* − T1|
                         Ver i - st·P =? h (avatar i|| PID i|| T1) · PK i
                       Generate T2 and n2
                       Compute N2 = P · n2
                       SKi - st = h (avatar i|| N2||T2) · K st
                       EM 2 = h (avatar i || PID i || N2||T 2) ⊕ (Ski – st || T 2)
            { EM2, T 2}
           
Check |T2* − T2|
SKi - st · P = h (avatar i|| N2 || T2) · PK st
EM*2 = h (avatar i||PID i||N2||T 2) ⊕ (SKi - st||T 2)
Verifies EM*2 = ? EM 2

5.1.5. Avatar Authentication Step

  • U i creates a random number (n 3 and T3) and calculates N 3 = n 3 · P.
  • Ui calculates Ver i = h (avatar i|| avatar j || PID i|| PID j ||T3) · K i.
  • EM 3 = (PID i|| Ver i) ⊕ h (N3|| T3) is calculated.
  • U i calculates Req = SYE SK i-st (avatar j, EM 3, T3).
  • U i transmits {Req} to St by a public channel.
  • St calculates (avatar j, EM 3, T3) = SYD SKi-st (Req).
  • St calculates Req i j = SYE SK j-st (EM 3, T3).
  • St transmits {Req ij} to U j by a public channel.
  • U j calculates (EM 3, T3) = SYD SKj-st (Req i j).
  • PK i is retrieved by Uj after U j verifies PID in database.
  • U j verifies Ver i · P = ? h (avatar i ||avatar j ||PID i || PID j ||T3) · PK i.
  • U j creates T4 and n 4 and calculates N 4 = n 4 · P.
  • ver j = h (avatar j||avatar i||PID j ||PID i||T4) · K j.
  • EM 4 = (PID j || Ver j) h (N4|| T4).
  • Res = SYE SK j – st (avatar i, EM 4, N4, T4).
  • U j transmits {Res} to St by a public channel.
  • St calculates (avatar i, EM 4, N4, T4) = SYD SK j – st (Res).
  • Res i j = SYE SK i-st (EM 4, N4, T4).
  • St transmits {Res i j} to U i.
  • User i calculates (EM 4, N4, T4) = SYD SK i- st (Res i j).
  • (PID j ||Ver j) = EM 4 ⊕ h (N4||T4).
  • PK j is retrieved by Ui after Ui verifies PID j in database.
  • ver j · P = ? h (avatar j ||avatar i ||PID j||PID i||T4) · PK j is verified.
  • If every stage is successfully performed, the U i and U j can demonstrate their ownership of avatar i and avatar j.

6. Security Analysis

6.1. the theft of a smart device, 6.2. offline guessing of passwords, 6.3. impersonation attacks, 6.4. platform server spoofing attacks, 6.5. attacks by replay and mitm, 6.6. forward secrecy, 6.7. insider attacks, 6.8. superior insiders attacks, 6.9. temporary or ephemeral secret leakage attack.

  • An adversary obtains the ephemeral secret values n1 and n2 to compute SKi-st.
  • Assume that the adversary captures the long-part secret values Xi, ki, and K st to compute SKi-st.
  • Without knowing the ephemeral numbers n1 and n2, S1 cannot be obtained.

6.10. User Anonymity

6.11. mutual authentication, 7. conclusions, author contributions, data availability statement, conflicts of interest.

  • Zhu, Y.; Tan, Y.; Li, R.; Luo, X. Cyber-physical-social-thinking modeling and computing for geological information service system. In Proceedings of the International Conference on Identification, Information, and Knowledge in the Internet of Things (IIKI), Beijing, China, 22–23 October 2015. [ Google Scholar ]
  • Xiong, G.; Zhu, F.; Liu, X.; Dong, X.; Huang, W.; Chen, S.; Zhao, K. Cyber-physical-social system in intelligent transportation. IEEE CAA J. Autom. Sin. 2015 , 2 , 320–333. [ Google Scholar ] [ CrossRef ]
  • Cassandras, C.G. Smart cities as cyber-physical social systems. Engineering 2016 , 2 , 156–158. [ Google Scholar ] [ CrossRef ]
  • Gharib, M.; Lollini, P.; Bondavalli, A. Towards an Approach for Analyzing Trust in Cyber-Physical-Social Systems. In Proceedings of the 12th System of Systems Engineering Conference (SoSE), Waikoloa, HI, USA, 18–21 June 2017; pp. 18–21. [ Google Scholar ]
  • Ashari, I.F. Implementation of cyber-physical-social system based on service oriented architecture in smart tourism. J. Appl. Inform. Comput. 2020 , 4 , 66–73. [ Google Scholar ] [ CrossRef ]
  • Perno, J.; Probst, C.W. Behavioural profiling in cyber-social systems. In Human Aspects of Information Security, Privacy and Trust ; Springer: Cham, Switzerland, 2017; pp. 507–517. [ Google Scholar ]
  • Camtepe, S.A.; Yener, B. Modeling and detection of complex attacks. In Proceedings of the Third International Conference on Security and Privacy in Communications Networks and the Workshops—Secure Comm, Nice, France, 17–21 September 2007; pp. 234–243. [ Google Scholar ]
  • Pasandideh, S.; Pereira, P.; Gomes, L. Cyber-Physical-Social Systems: Taxonomy, Challenges, and Opportunities. IEEE Access 2022 , 10 , 42404–42419. [ Google Scholar ] [ CrossRef ]
  • Ayiter, E. Integrative art education in a metaverse: Ground. Technoetic Arts 2008 , 6 , 41–53. [ Google Scholar ] [ CrossRef ]
  • Collins, C. Looking to the future: Higher education in the Metaverse. Educ. Rev. 2008 , 43 , 50–52. [ Google Scholar ]
  • Díaz, J.; Saldaña, C.; Avila, C. Virtual world as a resource for hybrid education. Int. J. Emerg. Technol. Learn. 2020 , 15 , 94–109. [ Google Scholar ] [ CrossRef ]
  • Suh, W.; Ahn, S. Utilizing the metaverse for learner-centered constructivist education in the postpandemicera: An analysis of elementary school students. J. Intell. 2022 , 10 , 17. [ Google Scholar ] [ CrossRef ]
  • Miks, J.; McIlwaine, J. Keeping the World’s Children Learning through COVID-19. Available online: https://www.unicef.org/coronavirus/keeping-worlds-children-learning-through-covid-19 (accessed on 20 December 2023).
  • Maharg, P.; Owen, M. Simulations, learning and the metaverse: Changing cultures in legal education. J. Inf. Law Technol. 2007 , 5 , 1–19. [ Google Scholar ]
  • Kanematsu, H.; Fukumura, Y.; Ogawa, N.; Okuda, A.; Taguchi, R.; Nagai, H. Practice and Evaluation of Problem Based Learning in Metaverse. In Proceedings of the ED-MEDIA 2009 (World Conference on Educational Multimedia, Hypermedia & Telecommunications), Honolulu, HI, USA, 22–26 June 2009; Association for the Advancement of Computing in Education: Waynesville, NC, USA, 2009; pp. 2862–2870. [ Google Scholar ]
  • Mystakidis, S. Metaverse. Encyclopedia 2022 , 2 , 486–497. [ Google Scholar ] [ CrossRef ]
  • Skalidis, I.; Muller, O.; Fournier, S. Cardioverse: The cardiovascular medicine in the era of metaverse. Trends Cardiovasc. Med. 2022 , 33 , 471–476. [ Google Scholar ] [ CrossRef ]
  • Smith, A.H.; Milton, R.; Dearden, J.; Batty, M. Virtual Cities: Digital Mirrors into a Recursive World ; Centre for Advanced Spatial Analysis: London, UK, 2008. [ Google Scholar ]
  • Aurigi, A. Smart cities, metaverses, and the relevance of place. IET Smart Cities 2022 , 4 , 157–159. [ Google Scholar ] [ CrossRef ]
  • Duan, H.; Li, J.; Fan, S. Metaverse for Social Good: A University Campus Prototype. In Proceedings of the Association for Computing Machinery, Virtual, 20–24 October 2021; pp. 153–161. [ Google Scholar ]
  • Heller, L.; Goodman, L. What do avatars want now? Posthuman embodiment and the technological sublime. In Proceedings of the 22nd International Conference on Virtual System & Multimedia (VSMM), Kuala Lumpur, Malaysia, 17–21 October 2016; pp. 1–4. [ Google Scholar ]
  • Genay, A.C.S.; Lecuyer, A.; Hachet, M. Being an avatar for real: A survey on virtual embodiment in augmented reality. IEEE Trans. Vis. Comput. Graph. 2021 , 28 , 5071–5090. [ Google Scholar ] [ CrossRef ] [ PubMed ]
  • ISO/IEC 23005 (MPEG-V) Standards. Available online: https://mpeg.chiariglione.org/standards/mpeg-v.html (accessed on 20 December 2023).
  • IEEE 2888 Standards. Available online: https://sagroups.ieee.org/2888/ (accessed on 20 December 2023).
  • Xu, M.; Ng, W.C.; Lim, W.Y.B.; Kang, J.; Xiong, Z.; Niyato, D.; Yang, Q.; Shen, X.; Miao, C. A full dive into realizing the edge-enabled metaverse: Visions, enabling technologies, and challenges. IEEE Commun. Surv. Tutor. 2023 , 25 , 656–700. [ Google Scholar ] [ CrossRef ]
  • Jayasinghe, U.; Lee, G.M.; Um, T.W.; Shi, Q. Machine learning based trust computational model for IoT services. IEEE Trans. Sustain. Comput. 2019 , 4 , 39–52. [ Google Scholar ] [ CrossRef ]
  • Wang, Y.; Su, Z.; Zhang, N.; Xing, R.; Liu, D.; Luan, T.H.; Shen, X. A Survey on Metaverse: Fundamentals, Security, and Privacy. IEEE Commun. Surv. 2022 , 25 , 319–352. [ Google Scholar ] [ CrossRef ]
  • Hu, P.; Li, H.; Fu, H.; Cansever, D.; Mohapatra, P. Dynamic defense strategy against advanced persistent threat with insiders. In Proceedings of the IEEE Conference on Computer Communications (INFOCOM), Hong Kong, China, 26 April–1 May 2015; pp. 747–755. [ Google Scholar ]
  • Su, Z.; Wang, Y.; Xu, Q.; Zhang, N. LVBS: Lightweight vehicular blockchain for secure data sharing in disaster rescue. IEEE Trans. Dependable Secur. Comput. 2022 , 19 , 19–32. [ Google Scholar ] [ CrossRef ]
  • Liang, G.; Weller, S.R.; Zhao, J.; Luo, F.; Dong, Z.Y. The 2015 Ukraine blackout: Implications for false data injection attacks. IEEE Trans. Power Syst. 2017 , 32 , 3317–3318. [ Google Scholar ] [ CrossRef ]
  • Kumar, S.; Chhugani, J.; Kim, C.; Kim, D.; Nguyen, A.; Dubey, P.; Bienia, C.; Kim, Y. Second life and the new generation of virtual worlds. Computer 2008 , 41 , 46–53. [ Google Scholar ] [ CrossRef ]
  • Hendaoui, A.; Limayem, M.; Thompson, C.W. 3D social virtual worlds: Research issues and challenges. IEEE Internet Comput. 2008 , 12 , 88–92. [ Google Scholar ] [ CrossRef ]
  • Falchuk, B.; Loeb, S.; Neff, R. The social metaverse: Battle for privacy. IEEE Technol. Soc. Mag. 2018 , 37 , 52–61. [ Google Scholar ] [ CrossRef ]
  • Ometov, A.; Bezzateev, S.V.; Kannisto, J.; Harju, J.; Andreev, S.; Koucheryavy, Y. Facilitating the delegation of use for private devices in the era of the internet of wearable things. IEEE Internet Things J. 2017 , 4 , 843–854. [ Google Scholar ] [ CrossRef ]
  • Li, X.; He, J.; Vijayakumar, P.; Zhang, X.; Chang, V. A verifiable privacy-preserving machine learning prediction scheme for edge-enhanced HCPSs. IEEE Trans. Ind. Inform. 2021 , 18 , 5494–5503. [ Google Scholar ] [ CrossRef ]
  • Wei, J.; Li, J.; Lin, Y.; Zhang, J. LDP-based social content protection for trending topic recommendation. IEEE Internet Things J. 2021 , 8 , 4353–4372. [ Google Scholar ] [ CrossRef ]
  • Ning, H.; Wang, H.; Lin, Y.; Wang, W.; Dhelim, S.; Farha, F.; Ding, J.; Daneshmand, M. A survey on metaverse: The state-of-the-art, technologies, applications, and challenges. IEEE Internet Things J. 2021 , 10 , 14671–14688. [ Google Scholar ]
  • Song, H.; Luo, T.; Wang, X.; Li, J. Multiple sensitive values-oriented personalized privacy preservation based on randomized response. IEEE Trans. Inf. Forensics Secur. 2020 , 15 , 2209–2224. [ Google Scholar ] [ CrossRef ]
  • Liao, S.; Wu, J.; Bashir, A.K.; Yang, W.; Li, J.; Tariq, U. Digital twin consensus for blockchain-enabled intelligent transportation systems in smart cities. IEEE Trans. Intell. Transp. Syst. 2021 , 23 , 22619–22629. [ Google Scholar ] [ CrossRef ]
  • Ritzdorf, H.; Soriente, C.; Karame, G.O.; Marinovic, S.; Gruber, D.; Capkun, S. Toward shared ownership in the cloud. IEEE Trans. Inf. Forensics Secur. 2018 , 13 , 3019–3034. [ Google Scholar ] [ CrossRef ]
  • Zhou, Y.; Yu, F.R.; Chen, J.; Kuo, Y. Cyber-physical-social systems: A state-of-the-art survey, challenges and opportunities. IEEE Commun. Surv. Tutor. 2020 , 22 , 389–425. [ Google Scholar ] [ CrossRef ]
  • Casey, P.; Baggili, I.; Yarramreddy, A. Immersive virtual reality attacks and the human joystick. IEEE Trans. Dependable Secur. Comput. 2021 , 18 , 550–562. [ Google Scholar ] [ CrossRef ]
  • The Metaverse Offers a Future Full of Potential—For Terrorists and Extremists, Too. Available online: https://theconversation.com/the-metaverse-offers-a-future-full-of-potential-for-terrorists-and-extremists-too-173622 (accessed on 7 January 2024).
  • Almeida, V.; Filgueiras, F.; Doneda, D. The ecosystem of digital content governance. IEEE Internet Comput. 2021 , 25 , 13–17. [ Google Scholar ] [ CrossRef ]
  • Bruun, A.; Stentoft, M.L. Lifelogging in the wild: Participant experiences of using lifelogging as a research tool. In Proceedings of the IFIP Conference on Human-Computer Interaction, Paphos, Cyprus, 2–6 September 2019; pp. 431–451. [ Google Scholar ]
  • Lim, W.Y.B.; Xiong, Z.; Niyato, D.; Cao, X.; Miao, C.; Sun, S.; Yang, Q. Realizing the metaverse with edge intelligence: A match made in heaven. IEEE Wirel. Commun. 2023 , 30 , 64–71. [ Google Scholar ] [ CrossRef ]
  • Facebook Inc. Rebrands as Meta to Stress “Metaverse” Plan ; Facebook Inc.: Menlo Park, CA, USA, 2021. [ Google Scholar ]
  • Leenes, R. Privacy in the metaverse: Regulating a complex social construct in a virtual world. In The Future of Identity in the Information Society ; Springer: Berlin/Heidelberg, Germany, 2008; pp. 95–112. [ Google Scholar ]
  • Shang, J.; Chen, S.; Wu, J.; Yin, S. ARSpy: Breaking location-based multi-player augmented reality application for user location tracking. IEEE Trans. Mob. Comput. 2022 , 21 , 433–447. [ Google Scholar ] [ CrossRef ]
  • Nevelsteen, K.J. Virtual world, defined from a technological perspective and applied to video games, mixed reality, and the metaverse. Comput. Animat. Virtual Worlds 2018 , 29 , e1752. [ Google Scholar ] [ CrossRef ]
  • Nguyen, C.T.; Hoang, D.T.; Nguyen, D.N.; Dutkiewicz, E. Metachain: A novel blockchain-based framework for metaverse applications. In Proceedings of the IEEE 95th Vehicular Technology Conference: (VTC2022-Spring), Helsinki, Finland, 19–22 June 2022. [ Google Scholar ]
  • Sanchez, J. Second life: An interactive qualitative analysis. In Proceedings of the Society for Information Technology & Teacher Education International Conference, San Antonio, TX, USA, 26 March 2007; pp. 1240–1243. [ Google Scholar ]
  • Gan, L.; Wang, D.; Wang, C.; Xiao, D.; Zhang, M.; Wang, Z.; Li, F. Design and implementation of multimedia teaching platform for situational teaching of music appreciation course based on virtual reality. Int. J. Electr. Eng. Educ. 2021 , 60 , 40–48. [ Google Scholar ] [ CrossRef ]
  • Ryu, J.; Son, S.; Lee, J.; Park, Y.; Park, Y. Design of secure mutual authentication scheme for metaverse environments using blockchain. IEEE Access 2022 , 10 , 98944–98958. [ Google Scholar ] [ CrossRef ]
  • Panda, P.K.; Chattopadhyay, S. A secure mutual authentication protocol for iot environment. J. Reliab. Intell. Environ. 2020 , 6 , 79–94. [ Google Scholar ] [ CrossRef ]
  • Haq, I.U.; Wang, J.; Zhu, Y. Secure two-factor lightweight authentication protocol using self-certified public key cryptography for multi-server 5G networks. J. Netw. Comput. Appl. 2020 , 161 , 102660. [ Google Scholar ] [ CrossRef ]
  • Li, Y.; Xu, M.; Xu, G. Blockchain-based mutual authentication protocol without CA. J. Supercomput. 2022 , 78 , 17261–17283. [ Google Scholar ] [ CrossRef ]
  • Chen, F.; Xiao, Z.; Xiang, T.; Fan, J.; Truong, H.L. A Full Lifecycle Authentication Scheme for Large-scale Smart IoT Application. IEEE Trans. Dependable Secur. Comput. 2022 , 20 , 2221–2237. [ Google Scholar ] [ CrossRef ]
  • Kumar, P.; Om, H. A secure and efficient authentication protocol for wireless applications in multi-server environment. Peer--Peer Netw. Appl. 2022 , 15 , 1939–1952. [ Google Scholar ] [ CrossRef ]
  • Yang, Q.; Zhao, Y.; Huang, H.; Xiong, Z.; Kang, J.; Zheng, Z. Fusing blockchain and AI with metaverse: A survey. IEEE Open J. Comput. Soc. 2022 , 3 , 122–136. [ Google Scholar ] [ CrossRef ]
  • Koblitz, N. Elliptic curve cryptosystems. Math. Comput. 1987 , 48 , 203–209. [ Google Scholar ] [ CrossRef ]
  • Ryu, J.; Oh, J.; Kwon, D.; Son, S.; Lee, J.; Park, Y.; Park, Y. Secure ECC-based three-factor mutual authentication protocol for telecare medi1 cal information system. IEEE Access 2022 , 10 , 11511–11526. [ Google Scholar ] [ CrossRef ]
  • Teoh, A.B.J.; Ngo, D.; Goh, A. BioHashing: Two factor authen1 tication featuring fingerprint data and tokenized random number. Pattern Recognit. 2004 , 37 , 2245–2255. [ Google Scholar ]
  • Siddhartha, V.; Gaba, G.S.; Kansal, L. A Lightweight Authentication Protocol using Implicit Certificates for Securing IoT Systems. In Proceedings of the International Conference on Computational Intelligence and Data Science (ICCIDS 2019), Punjab, India, 6–7 September 2019; pp. 85–96. [ Google Scholar ]
  • Sciancalepore, S.; Capossele, A.; Piro, G.; Boggia, G.; Bianchi, G. Key Management Protocol with Implicit Certificates for IoT systems. In Proceedings of the 2015 Workshop on IoT challenges in Mobile and Industrial Systems, Florence, Italy, 18 May 2015; pp. 37–42. [ Google Scholar ]
  • Porambage, P.; Kumar, P.; Schmitt, C.; Gurtov, A.; Ylianttila, M. Certificate-Based Pairwise Key Establishment Protocol for Wireless Sensor Networks. In Proceedings of the IEEE 16th International Conference on Computational Science and Engineering, Sydney, NSW, Australia, 3–5 December 2013; pp. 667–674. [ Google Scholar ]
  • Kumar, P.; Gurtov, A.; Iinatti, J.; Ylianttila, M.; Sain, M. Lightweight and Secure Session-Key Establishment Scheme in Smart Home Environments. IEEE Sens. J. 2016 , 16 , 254–264. [ Google Scholar ] [ CrossRef ]
  • Kumar, P.; Braeken, A.; Gurtov, A.; Iinatti, J.; Ha, P.H. Anonymous Secure Framework in Connected Smart Home Environments. IEEE Trans. Inf. Forensics Secur. 2017 , 12 , 968–979. [ Google Scholar ] [ CrossRef ]
  • Li, Y. Design of a Key Establishment Protocol for Smart Home Energy Management System. In Proceedings of the Fifth International Conference on Computational Intelligence, Communication Systems and Networks, Madrid, Spain, 5–7 June 2013; pp. 88–93. [ Google Scholar ]
  • Vaidya, B.; Makrakis, D.; Mouftah, H. Device Authentication mechanism for smart energy home area networks. In Proceeding of the IEEE, International Conference on Consumer Electronics (ICCE), Las Vegas, NV, USA, 9–12 January 2011; pp. 787–788. [ Google Scholar ]
  • Han, K.; Kim, J.; Shon, T.; Ko, D. A novel secure key paring protocol for rf4ce ubiquitous smart home systems. Pers. Ubiquitous Comput. 2013 , 17 , 945–949. [ Google Scholar ] [ CrossRef ]
  • Sciancalepore, S.; Piro, G.; Boggia, G.; Bianchi, G. Public Key Authentication and Key Agreement in IoT Devices with Minimal Airtime Consumption. IEEE Embed. Syst. Lett. 2017 , 9 , 1–4. [ Google Scholar ] [ CrossRef ]
  • Patel, S.; Patel, D.R.; Navik, A.P. Energy efficient integrated authentication and access control mechanisms for Internet of Things. In Proceedings of the IEEE International Conference on Internet of Things and Applications (IOTA), Pune, India, 22–24 January 2016; pp. 304–309. [ Google Scholar ]
  • Hossain, M.; Noor, S.; Hasan, R. HSC-IoT: A Hardware and Software Co-Verification Based Authentication Scheme for Internet of Thing. In Proceedings of the 5th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud), San Francisco, CA, USA, 6–8 April 2017; pp. 109–116. [ Google Scholar ]
No.NotationDescription
1UGCUser-Generated Content
2MITMMan in the Middle
3HMDsHead-Mounted Displays
4CACertificate Authority
5U iUser
6StPlatform Server
7ID iIdentity of Ui
8PIDiPseudo-Identity of Ui
9PWiPassword of Ui
10B iBiometric Information of Ui
11SD iSmart Device of Ui
12AvatariAvatar Identity of U i
13info iPersonal Information of U i
14PK ca, PK i, PK stPublic Key of CA, U i, and St
15K ca, K i, K stPrivate Key of CA, U i, and St
16Sig i_caSignature Value Generated by CA
17RNi, xi, ni, n1, n2, n3, n4 Random Numbers
18T1, T2, T3, T4Timestamp
19SKSession Key
20SYE K, SYD KSymmetric Encryption and Dec
21h (·)One-Side Hashing Method
22h b (·)Biohash Function
23Exclusive OR Operation
24||Concatenation
Certificate Authority (CA)
Over Fp, CA chooses a nonsingular Elliptic Curve EP (u, r).
A base point is chosen using CA (P on EP (u, r)).
CA chooses a secret key, k ca
PK ca = kca + P is created by CA.
The following system parameters are published by CA:
EP (u, r); P; PK ca; h (•); h b (•)
 User (Ui)                     Certificate Authority (CA)
Input ID i, PW i, B i
Generate random number, RN i
Generate private key, k i
PK i = k i·P
Compute PID i = h (ID i|| RN i)
                { PIDi, PK i, info i}
           
                  Check the uniqueness (PID i, PK i) in database
                  Verify info i
                  Generate random number x i
                  Compute X i = x i·p
                  Sig i_ca = x i + h (PID i || PK i||X i) · kca
                  V i = (Xi, Sig i_ca)
                  saves (PID i, PK i) in database
         {Vi}
   

Compute Z = Vi ⊕ h (IDi || PW i || RN i)
save {Z} in SD i
User (Ui)                                  Platform Server (St)
Input ID i, PW i, B i
Compute Vi* = Z + h (ID i|| PW i|| RN i)
Verify Vi* = Vi
Generate avatar i and random number, n i
Compute Ni = n i · P
EM i = (N i||Sig i_ca) ⊕ h (avatar i || PID i || RN i)

                    { avatari, PID i, EM i}
                  

                    Check PID in database and retrieve PK i
                    Check uniqueness (avatar i, PK i) in database
                      Compute (N i|| Sig i_ca) = EM i ⊕ h (avatar i|| PIDi ||RNi)
                      Sig i – ca · P = x i · P + h (PID i|| PK i ||Xi) · k ca · P
                      Sig i_ca·P =X i + h (PID i || PK i|| X i) · Pk ca
                      save {avatar i, PK i} in database
                      Publish { avatar i, PK i } in virtual space
 User (U)          Platform Server (St)          User (Uj)
Generate n3 and T3
Compute N3 = P · n3
Compute Ver i = h (avatar i|| avatar j || PID i|| PID j||T3) · K i
EM 3 = (PID i||Ver i) ⊕ h (N3 ||T3)
Req = SYE (avatar j, EM 3, T3)
               { Req }
          
                 Computes
               (avatar j, EM 3,T3) = SYD (Req)
               Req i j = SYE SK (EM 3,T3)
                          { Req i j}
                   
                        Compute (EM 3, T3) = SYD (Reqi j)
                        Check PID in database and retrieve PKi
                        Verify
                           Ver i · P = ? h (avatar i||avatar j ||PID i||PID j||T3) ·PK i
                        Generate n 4 and T4
                        Compute N4 = P· n4
                        ver j = h (avatar j || avatar i|| PID j || PID i||T4) · K j
                        EM 4 = (PID j|| Ver j) ⊕ h (N4||T4)
                     {Res }   Res = SYE (avatar i, EM 4, N4, T4)
            
                Compute
                (avatar i, EM 4, N4, T4) = SYD (Res)
                Res i j = SYE (EM 4, N4, T4)
   { Resij}

Compute
(EM 4, N4, T4) = SYD SK (Res i j)
(PID j|| Ver j) = EM 4 ⊕ h (N4||T4)
Check PID j in database and retrieves PK j
Verifies
ver j · P = ?h (avatar j || avatar i|| PID j || PID i||T4) · PK j
If okay, U i and U j can demonstrate that avatars i and j are authenticated
ProtocolsTheft of a Smart DeviceOffline Guessing of PasswordsImpersonationPlatform Server Spoofing AttacksEphemeral Secret Leakage AttackInsider Attack
Sciancalepore et al. [ ], 2015××××
Porambage et al. [ ], 2013××
Kumar et al. [ ], 2016××
Kumar et al. [ ], 2017×××
Li et al. [ ], 2013××××
Vaidya et al. [ ], 2011××
Han et al. [ ], 2013××××
Sciancalepore et al. [ ], 2017×××
Patel et al. [ ], 2016×××××
Hossain et al. [ ], 2017××××××
Siddhartha et al. [ ], 2019×
RYU et al. [ ], 2022
Proposed protocol (SLACPSS)
Sciancalepore et al. [ ], 2015××
Porambage et al. [ ], 2013×
Kumar et al. [ ], 2016
Kumar et al. [ ], 2017×
Li et al. [ ], 2013××
Vaidya et al. [ ], 2011××
Han et al. [ ], 2013×
Sciancalepore et al. [ ], 2017××
Patel et al. [ ], 2016×
Hossain et al. [ ], 2017××
Siddhartha et al. [ ], 2019×
RYU et al. [ ], 2022
Proposed protocol (SLACPSS)
The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

Abed, A.Z.M.; Abdelkader, T.; Hashem, M. SLACPSS: Secure Lightweight Authentication for Cyber–Physical–Social Systems. Computers 2024 , 13 , 225. https://doi.org/10.3390/computers13090225

Abed AZM, Abdelkader T, Hashem M. SLACPSS: Secure Lightweight Authentication for Cyber–Physical–Social Systems. Computers . 2024; 13(9):225. https://doi.org/10.3390/computers13090225

Abed, Ahmed Zedaan M., Tamer Abdelkader, and Mohamed Hashem. 2024. "SLACPSS: Secure Lightweight Authentication for Cyber–Physical–Social Systems" Computers 13, no. 9: 225. https://doi.org/10.3390/computers13090225

Article Metrics

Further information, mdpi initiatives, follow mdpi.

MDPI

Subscribe to receive issue release notifications and newsletters from MDPI journals

IMAGES

  1. Methodology proposed for detection and location of cyber-attacks

    proposed methodology for cyber criminal profiling

  2. (PDF) Profile of Cyber Criminal

    proposed methodology for cyber criminal profiling

  3. (PDF) Cyberprofiling: offender profiling and geographic profiling of

    proposed methodology for cyber criminal profiling

  4. (PDF) CYBER CRIME INVESTIGATION THROUGH BEOS PROFILING

    proposed methodology for cyber criminal profiling

  5. Profiling Computer Criminals

    proposed methodology for cyber criminal profiling

  6. (PDF) Cyber-Crime Prevention Methodology

    proposed methodology for cyber criminal profiling

VIDEO

  1. Feedback on the proposed rules of the Cyber Incident Reporting? #CISA #News #finance #cybersecurity

  2. Criminal Profiling Building a Profile of Serial Offenders

  3. CIVIL DESIGNER Software: Speed Profiling & Auxiliary lanes

  4. Mind Set Maps Profiling Tool Training

  5. Social Investigation Methodology

  6. 22

COMMENTS

  1. Proposed Methodology for Cyber Criminal Profiling

    Criminal profiling is an important tool employed by law enforcement agencies in their investigations. Criminal profiling is much more than an educated guess; it requires a scientific-based methodology. Cyber crimes are occurring at an alarming rate globally. Law enforcement agencies follow similar techniques to traditional crimes.

  2. Proposed Methodology for Cyber Criminal Profiling

    Download Citation | Proposed Methodology for Cyber Criminal Profiling | Criminal profiling is an important tool employed by law enforcement agencies in their investigations. Criminal profiling is ...

  3. Proposed Methodology for Cyber Criminal Profiling

    Proposed Methodology for Cyber Criminal Profiling. Author: Arun Warikoo Authors Info & Claims. Information Security Journal: A Global Perspective, Volume 23, Issue 4-6. Pages 172 - 178. ... Criminal profiling' may provide an effective measure for industrial security. While criminal profiling has been frequently applied to support the prevention ...

  4. Proposed Methodology for Cyber Criminal Profiling

    This paper proposes a cyber criminal profiling methodology based on the hybrid technique, including inductive and deductive profiling, and the need for employing a hybrid technique that incorporates both inductives and deductives. ABSTRACT Criminal profiling is an important tool employed by law enforcement agencies in their investigations. Criminal profiling is much more than an educated guess ...

  5. Profiling the Cybercriminal: A Systematic Review of Research

    Proposed methodology for cyber criminal profiling. ... This article utilizes a systematic review of the current literature on cyber profiling as a foundation for the development of a ...

  6. CBR‐Based Decision Support Methodology for Cybercrime Investigation

    The last approach is the case-centric analysis, and our methodology falls into this category. Overall, only several proposals can be applied to the traditional investigation method, such as criminal profiling methods, to the cyber incident investigation; however, many systematic approaches are currently under development.

  7. Profiling the Cybercriminal: A Systematic Review of Research

    Criminal profiling is an investigative approach based on the assumption that the crime scene provides details about the offense and the offender [8]. One paper provided a specific definition of cybercriminal profiling [10]. That paper also focused more on the motivations behind engaging in cybercrime.

  8. Deep Learning Assisted Cyber Criminal Profiling

    This paper presents an approach for cybercriminal profiling using pre-trained DistilBert, LSTM, and BERT models. By analyzing criminal behaviors and linking them to offender characteristics, the proposed method utilizes structural and parameter learning techniques. Digital forensics, as a means to locate criminal and cybercriminal activity, is highlighted as increasingly important. The ...

  9. Profiling the Cybercriminal: A Systematic Review of Research

    As cybercrime becomes one of the most significant threats facing society today, it is of utmost importance to better understand the perpetrators behind such attacks. In this article, we seek to advance research and practitioner understanding of the cybercriminal (cyber-offender) profiling domain by conducting a rigorous systematic review. This work investigates the afore-mentioned domain to ...

  10. Proposed Methodology for Cyber Criminal Profiling

    Criminal profiling is an important tool employed by law enforcement agencies in their investigations. Criminal profiling is much more than an educated guess; it requires a scientific-based methodology. Cyber crimes are occurring at an alarming rate globally. Law enforcement agencies follow similar techniques to traditional crimes.

  11. A Comprehensive Framework for Cyber Behavioral Analysis Based on a

    A Comprehensive Framework for Cyber Behavioral ...

  12. Deep Learning Assisted Cyber Criminal Profiling

    The results of the case studies demonstrate that our proposed methodology is beneficial for understanding the behaviour and motivation of the hacker and that our proposed data-driven analytic ...

  13. Profiling the Cybercriminal: A Systematic Review of Research

    For example, the proposed methodology for cyber criminal profiling by [57] employs six Profile Identification Metrics to determine the offender's modus operandi, psychology, and behavior characteristics. These are: attack signature, attack method, motivation level, capability factor, attack severity, demographics.

  14. Exploring Cybercriminal Activities, Behaviors, and Profiles

    Overview and Method of Analysis. In this study, our method of analysis draws on the different factors and abilities described in models such as the Deductive Cybercriminal Profile Model (Nykodym et al., 2005) and the Theoretical Model of Profiling a Hacker (Lickiewicz, 2011).These models guide the collection of information required in order to create a holistic profile.

  15. proposed methodology for cyber criminal profiling

    Proposed Methodology for Cyber Criminal Profiling. Cite this article; https://doi.org/10.1080/19393555.2014.931491; Full Article; Figures & data; Reprints ...

  16. Towards a Methodology for Profiling Cyber Criminals

    Proposed Methodology for Cyber Criminal Profiling. Arun Warikoo. Computer Science, Law. Inf. Secur. J. A Glob. Perspect. 2014; TLDR. This paper proposes a cyber criminal profiling methodology based on the hybrid technique, including inductive and deductive profiling, and the need for employing a hybrid technique that incorporates both ...

  17. ‪Arun Warikoo‬

    Proposed Methodology for Cyber Criminal Profiling. A Warikoo. Information Security Journal: A Global Perspective, 2014. 44: 2014: Methods for optimizing an automated determination in real-time of a risk rating of cyber-attack and devices thereof. ... Why Cyber Security is a Socio-Technical Challenge: New Concepts and Practical Measures to ...

  18. The use of criminal profiling in cybercrime investigations

    profiling is defined as "the process of investigating and examining criminal behavior in orde r to. help identify the type of person responsible" (Turvey, 2011, p. 136). Investigators try to ...

  19. "Proposed Methodology for Cyber Criminal Profiling."

    Bibliographic details on Proposed Methodology for Cyber Criminal Profiling. We are hiring! We are looking for a highly motivated Computer Scientist (f/m/d) ... Proposed Methodology for Cyber Criminal Profiling. Inf. Secur. J. A Glob. Perspect. 23 (4-6): 172-178 (2014) a service of . home. blog; statistics; browse. persons; conferences;

  20. Reinforcing Digital Forensics Through Intelligent Behavioural Evidence

    The need of criminal profiling, the methods to achieve it and role of victimology in the process is also discussed. Last sub-section also confers the need of hate speech for criminal profiling along with the proposed workflow for digital criminal profiling. Section 4 of the research manuscript presents the proposed expert system framework for ...

  21. Towards a Methodology for Profiling Cyber Criminals

    The progress of future e-business and e-commerce will depend on the ability of our legal institutions to protect general users from cyber crimes. While there has been substantial progress in the development and implementation of tools for detecting and preventing cyber attacks, there is a lack of effective methodologies to prosecute the perpetrators of cyber crimes (cyber criminals ...

  22. Sci-Hub

    Warikoo, A. (2014). Proposed Methodology for Cyber Criminal Profiling. Information Security Journal: A Global Perspective, 23(4-6), 172-178. doi:10.1080/19393555. ...

  23. A comprehensive methodology for profiling cyber-criminals

    In the work, comprehensive methodology for profiling cyber-criminals by Hemamali Tennakoon, the author compares crimes in physical world and the digital world, brief about the criminal behavior [15].

  24. SLACPSS: Secure Lightweight Authentication for Cyber-Physical-Social

    The concept of Cyber-Physical-Social Systems (CPSSs) has emerged as a response to the need to understand the interaction between Cyber-Physical Systems (CPSs) and humans. This shift from CPSs to CPSSs is primarily due to the widespread use of sensor-equipped smart devices that are closely connected to users. CPSSs have been a topic of interest for more than ten years, gaining increasing ...