User Authentication Mechanisms Based on Immersive Technologies: A Systematic Review

被引:1
|
作者
Anastasaki, Ioanna [1 ]
Drosatos, George [2 ]
Pavlidis, George [2 ]
Rantos, Konstantinos [1 ]
机构
[1] Int Hellenic Univ, Dept Comp Sci, Kavala 65404, Greece
[2] Athena Res Ctr, Inst Language & Speech Proc, Xanthi 67100, Greece
关键词
virtual reality; augmented reality; mixed reality; immersive technologies; user authentication; SECURITY;
D O I
10.3390/info14100538
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Immersive technologies are revolutionary technological advancements that offer users unparalleled experiences of immersion in a virtual or mixed world of virtual and real elements. In such technology, user privacy, security, and anonymity are paramount, as users often share private and sensitive information. Therefore, user authentication is a critical requirement in these environments. This paper presents a systematic literature review of recently published research papers on immersive technology-based user authentication mechanisms. After conducting the literature search in September 2023 using Scopus, the selection process identified 36 research publications that were further analyzed. The analysis revealed three major types of authentications related to immersive technologies, consistent with previous works: knowledge-based, biometric, and multi-factor methods. The reviewed papers are categorized according to these groups, and the methods used are scrutinized. To the best of our knowledge, this systematic literature review is the first that provides a comprehensive consolidation of immersive technologies for user authentication in virtual, augmented, and mixed reality.
引用
下载
收藏
页数:23
相关论文
共 50 条
  • [41] The Use of Immersive Technologies in Karate Training: A Scoping Review
    Lygouras, Dimosthenis
    Tsinakos, Avgoustos
    MULTIMODAL TECHNOLOGIES AND INTERACTION, 2024, 8 (04)
  • [42] A Scoping Review on Immersive Technologies in the Oil and Gas Industry
    Sarvesh, Muskan
    Marzban, Mehdi
    Kang, Ryan
    Park, Simon
    Hugo, Ron
    Kim, Kangsoo
    2024 IEEE CONFERENCE ON VIRTUAL REALITY AND 3D USER INTERFACES ABSTRACTS AND WORKSHOPS, VRW 2024, 2024, : 761 - 762
  • [43] Geoheritage and immersive technologies: bibliometric analysis and literature review
    Hincapie, Mauricio
    Cifuentes, Lina Marcela
    Valencia-Arias, Alejandro
    Quiroz-Fabra, Jefferson
    EPISODES, 2023, 46 (01): : 101 - 115
  • [44] A Comprehensive Review on Secure Biometric-Based Continuous Authentication and User Profiling
    Ayeswarya, S.
    Singh, K. John
    IEEE ACCESS, 2024, 12 : 82996 - 83021
  • [45] A Review of EEG-Based User Authentication: Trends and Future Research Directions
    Fidas, Christos A.
    Lyras, Dimitrios
    IEEE ACCESS, 2023, 11 : 22917 - 22934
  • [46] User Authentication Based on Representative Users
    Schclar, Alon
    Rokach, Lior
    Abramson, Adi
    Elovici, Yuval
    IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS, 2012, 42 (06): : 1669 - 1678
  • [47] RRAM Based Lightweight User Authentication
    Arafin, Md Tanvir
    Qu, Gang
    2015 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN (ICCAD), 2015, : 139 - 145
  • [48] User authentication based on foot motion
    Gafurov, Davrondzhon
    Bours, Patrick
    Snekkenes, Einar
    SIGNAL IMAGE AND VIDEO PROCESSING, 2011, 5 (04) : 457 - 467
  • [49] GRAPHICAL AUTHENTICATION BASED ON USER BEHAVIOUR
    Al-Khazzar, Ahmed
    Savage, Nick
    SECRYPT 2010: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2010, : 86 - 89
  • [50] User Authentication Based on Keystroke Dynamics
    Das, Rajat Kumar
    Mukhopadhyay, Sudipta
    Bhattacharya, Puranjoy
    IETE JOURNAL OF RESEARCH, 2014, 60 (03) : 229 - 239