Attack Modeling and Security Analysis Using Machine Learning Algorithms Enabled with Augmented Reality and Virtual Reality

PDF (614KB), PP.118-129

Views: 0 Downloads: 0

Author(s)

Momina Mushtaq 1 Rakesh Kumar Jha 2,* Manish C. Sabraj 1 Shubha Jain 3

1. Shri Mata Vaishno Devi University/Electronics and Communication Engineering, Katra, 182320, India

2. IIITDM Jabalpur/Electronics and Communication Engineering, Katra, 182320, India and Central University Jammu, Bagla Suchani, Jammu and Kashmir, India

3. Department of Telecommunication, University of Maryland, College Park, Maryland, USA

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2024.04.08

Received: 24 May 2023 / Revised: 19 Oct. 2023 / Accepted: 13 Dec. 2023 / Published: 8 Aug. 2024

Index Terms

Algorithms, Augmented Reality (AR), Machine Learning, Security, Virtual Reality (VR)

Abstract

Augmented Reality (AR) and Virtual Reality (VR) are innovative technologies that are experiencing a widespread recognition. These technologies possess the capability to transform and redefine our interactions with the surrounding environment. However, as these technologies spread, they also introduce new security challenges. In this paper, we discuss the security challenges posed by Augmented reality and Virtual Reality, and propose a Machine Learning-based approach to address these challenges. We also discuss how Machine Learning can be used to detect and prevent attacks in Augmented reality and Virtual Reality. By leveraging the power of Machine Learning algorithms, we aim to bolster the security defences of Augmented reality and Virtual Reality systems. To accomplish this, we have conducted a comprehensive evaluation of various Machine Learning algorithms, meticulously analysing their performance and efficacy in enhancing security. Our results show that Machine Learning can be an effective way to improve the security of Augmented reality and virtual reality systems.

Cite This Paper

Momina Mushtaq, Rakesh Kumar Jha, Manish C. Sabraj, Shubha Jain, "Attack Modeling and Security Analysis Using Machine Learning Algorithms Enabled with Augmented Reality and Virtual Reality", International Journal of Computer Network and Information Security(IJCNIS), Vol.16, No.4, pp.118-129, 2024. DOI:10.5815/ijcnis.2024.04.08

Reference

[1]P. Bhattacharya et al., “Coalition of 6G and Blockchain in AR/VR Space: Challenges and Future Directions,” IEEE Access, vol. 9, pp. 168455–168484, 2021, doi: 10.1109/ACCESS.2021.3136860.
[2]W. Wazir, H. A. Khattak, A. Almogren, M. A. Khan, and I. Ud Din, “Doodle-Based Authentication Technique Using Augmented Reality,” IEEE Access, vol. 8, pp. 4022–4034, 2020, doi: 10.1109/ACCESS.2019.2963543.
[3]R. Chengoden et al., “Metaverse for Healthcare: A Survey on Potential Applications, Challenges and Future Directions,” IEEE Access, vol. 11, pp. 12764–12794, 2023, doi: 10.1109/ACCESS.2023.3241628.
[4]T. Everson, M. Joordens, H. Forbes, and B. Horan, “Virtual Reality and Haptic Cardiopulmonary Resuscitation Training Approaches: A Review,” IEEE Syst J, vol. 16, no. 1, pp. 1391–1399, Mar. 2022, doi: 10.1109/JSYST.2020.3048140.
[5]S. K. Sharma, I. Woungang, A. Anpalagan, and S. Chatzinotas, “Toward Tactile Internet in beyond 5G Era: Recent Advances, Current Issues, and Future Directions,” IEEE Access, vol. 8, pp. 56948–56991, 2020, doi: 10.1109/ACCESS.2020.2980369.
[6]Y. Wang et al., “A Survey on Metaverse: Fundamentals, Security, and Privacy,” IEEE Communications Surveys and Tutorials, 2022, doi: 10.1109/COMST.2022.3202047.
[7]Y. Siriwardhana, P. Porambage, M. Liyanage, and M. Ylianttila, “A Survey on Mobile Augmented Reality with 5G Mobile Edge Computing: Architectures, Applications, and Technical Aspects,” IEEE Communications Surveys and Tutorials, vol. 23, no. 2. Institute of Electrical and Electronics Engineers Inc., pp. 1160–1192, Apr. 01, 2021. doi: 10.1109/COMST.2021.3061981.
[8]Q. Cheng, S. Zhang, S. Bo, D. Chen, and H. Zhang, “Augmented Reality Dynamic Image Recognition Technology Based on Deep Learning Algorithm,” IEEE Access, vol. 8, pp. 137370–137384, 2020, doi: 10.1109/ACCESS.2020.3012130.
[9]P. H. Lin and S. Y. Chen, “Design and Evaluation of a Deep Learning Recommendation Based Augmented Reality System for Teaching Programming and Computational Thinking,” IEEE Access, vol. 8, pp. 45689–45699, 2020, doi: 10.1109/ACCESS.2020.2977679.
[10]A. Apicella et al., “Enhancement of SSVEPs Classification in BCI-Based Wearable Instrumentation Through Machine Learning Techniques,” IEEE Sens J, vol. 22, no. 9, pp. 9087–9094, May 2022, doi: 10.1109/JSEN.2022.3161743.
[11]S. J. Yoo and S. H. Choi, “Indoor AR Navigation and Emergency Evacuation System Based on Machine Learning and IoT Technologies,” IEEE Internet Things J, vol. 9, no. 21, pp. 20853–20868, Nov. 2022, doi: 10.1109/JIOT.2022.3175677.
[12]Y. Tai, B. Gao, Q. Li, Z. Yu, C. Zhu, and V. Chang, “Trustworthy and Intelligent COVID-19 Diagnostic IoMT through XR and Deep-Learning-Based Clinic Data Access,” IEEE Internet Things J, vol. 8, no. 21, pp. 15965–15976, Nov. 2021, doi: 10.1109/JIOT.2021.3055804.
[13]S. V. Mahadevkar et al., “A Review on Machine Learning Styles in Computer Vision - Techniques and Future Directions,” IEEE Access, vol. 10. Institute of Electrical and Electronics Engineers Inc., pp. 107293–107329, 2022. doi: 10.1109/ACCESS.2022.3209825.
[14]M. Gupta, R. K. Jha, and S. Jain, “Tactile based Intelligence Touch Technology in IoT configured WCN in B5G/6G-A Survey,” IEEE Access, 2022, doi: 10.1109/ACCESS.2022.3148473.
[15]S. Jeong, J. G. D. Hester, W. Su, and M. M. Tentzeris, “Read/Interrogation Enhancement of Chipless RFIDs Using Machine Learning Techniques,” IEEE Antennas Wirel Propag Lett, vol. 18, no. 11, pp. 2272–2276, Nov. 2019, doi: 10.1109/LAWP.2019.2937055.