User Authentication Mechanisms Based on Immersive Technologies: A Systematic Review

被引:1
|
作者
Anastasaki, Ioanna [1 ]
Drosatos, George [2 ]
Pavlidis, George [2 ]
Rantos, Konstantinos [1 ]
机构
[1] Int Hellenic Univ, Dept Comp Sci, Kavala 65404, Greece
[2] Athena Res Ctr, Inst Language & Speech Proc, Xanthi 67100, Greece
关键词
virtual reality; augmented reality; mixed reality; immersive technologies; user authentication; SECURITY;
D O I
10.3390/info14100538
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Immersive technologies are revolutionary technological advancements that offer users unparalleled experiences of immersion in a virtual or mixed world of virtual and real elements. In such technology, user privacy, security, and anonymity are paramount, as users often share private and sensitive information. Therefore, user authentication is a critical requirement in these environments. This paper presents a systematic literature review of recently published research papers on immersive technology-based user authentication mechanisms. After conducting the literature search in September 2023 using Scopus, the selection process identified 36 research publications that were further analyzed. The analysis revealed three major types of authentications related to immersive technologies, consistent with previous works: knowledge-based, biometric, and multi-factor methods. The reviewed papers are categorized according to these groups, and the methods used are scrutinized. To the best of our knowledge, this systematic literature review is the first that provides a comprehensive consolidation of immersive technologies for user authentication in virtual, augmented, and mixed reality.
引用
下载
收藏
页数:23
相关论文
共 50 条
  • [1] Immersive technologies for tourism: a systematic review
    Eko Harry Pratisto
    Nik Thompson
    Vidyasagar Potdar
    Information Technology & Tourism, 2022, 24 : 181 - 219
  • [2] Immersive technologies for tourism: a systematic review
    Pratisto, Eko Harry
    Thompson, Nik
    Potdar, Vidyasagar
    INFORMATION TECHNOLOGY & TOURISM, 2022, 24 (02) : 181 - 219
  • [3] A Systematic Literature Review of User Evaluation in Immersive Analytics
    Friedl-Knirsch, J.
    Pointecker, F.
    Pfistermueller, S.
    Stach, C.
    Anthes, C.
    Roth, D.
    COMPUTER GRAPHICS FORUM, 2024, 43 (03)
  • [4] Integrating immersive technologies with STEM education: a systematic review
    Tene, Talia
    Marcatoma Tixi, Jessica Alexandra
    Palacios Robalino, Maria de Lourdes
    Mendoza Salazar, Maria Jose
    Vacacela Gomez, Cristian
    Bellucci, Stefano
    FRONTIERS IN EDUCATION, 2024, 9
  • [5] The use of immersive technologies in distance education: A systematic review
    Turan, Zeynep
    Karabey, Sinem Cilligol
    EDUCATION AND INFORMATION TECHNOLOGIES, 2023, 28 (12) : 16041 - 16064
  • [6] The use of immersive technologies in distance education: A systematic review
    Zeynep Turan
    Sinem Cilligol Karabey
    Education and Information Technologies, 2023, 28 : 16041 - 16064
  • [7] Challenges and Opportunities of Immersive Technologies for Mindfulness Meditation: A Systematic Review
    Doellinger, Nina
    Wienrich, Carolin
    Latoschik, Marc Erich
    FRONTIERS IN VIRTUAL REALITY, 2021, 2
  • [8] IMMERSIVE TECHNOLOGIES APPLIED TO COMPUTER PROGRAMMING TEACHING: A SYSTEMATIC REVIEW
    Paula, Luciano Bernardes de
    Augusto, Eryka Eugenia Fernandes
    Pereira, Luis Fernando Pacheco
    Jesus, Diego Andrade de
    Frota, Francisco Hudson Coelho
    RISUS-JOURNAL ON INNOVATION AND SUSTAINABILITY, 2021, 12 (03): : 127 - 137
  • [9] A Systematic Review of Immersive Technologies for Physical Training in Fitness and Sports
    Thuong Hoang
    Aggarwal, Deepti
    Wood-Bradley, Guy
    Lee, Tsz-Kwan
    Wang, Rui
    Ferdous, Hasan
    Baldwin, Alexander
    2023 IEEE INTERNATIONAL SYMPOSIUM ON MIXED AND AUGMENTED REALITY, ISMAR, 2023, : 611 - 621
  • [10] An experimental comparison of secret-based user authentication technologies
    Irakleous, I.
    Furnell, S.M.
    Dowland, P.S.
    Papadaki, M.
    Information Management and Computer Security, 2002, 10 (2-3): : 100 - 108