•  
  •  
 

Authors

Hasan Ali Al-Tameemi, Technical Engineering College, Imam Ja’afar Al-Sadiq University (IJSU), Baghdad, Iraq
Ghadeer Ghazi Shayea, Technical Engineering College, Imam Ja’afar Al-Sadiq University (IJSU), Baghdad, Iraq
Mishall Al-Zubaidie, Department of Computer Sciences, Education College for Pure Sciences, University of Thi-Qar, Nasiriyah 64001, Iraq
Yahya Layth Khaleel, Department of Computer Science, College of Computer Science and Mathematics, Tikrit University, IraqFollow
Yahya Layth Khaleel, Department of Computer Science, College of Computer Science and Mathematics, Tikrit University, IraqFollow
Noor Al-Huda K. Hussein, Computer Technology Engineering Department, Technical College, Imam Ja’afar Al-Sadiq University (IJSU), Baghdad, Iraq
Raad Z. Homod, Department of Oil and Gas Engineering, Basra University for Oil and Gas, Iraq
Mohammad Aljanabi, Technical Engineering College, Imam Ja’afar Al-Sadiq University (IJSU), Baghdad, Iraq
O. S. Albahri, Australian Technical and Management College, Melbourne, Australia
A. H. Alamoodi, Applied Science Research Center, Applied Science Private University, Amman, Jordan
Maad M. Mijwil, College of Administration and Economics, Al-Iraqia University, Baghdad, Iraq
Mohammed A. Fadhel, College of Computer Science and Information Technology, University of Sumer, Thi Qar, Iraq
Iman Mohamad Sharaf, Department of Basic Sciences, Higher Technological Institute, Tenth of Ramadan City, Egypt
Mohanad G. Yaseen, Department of Computer, College of Education, AL-Iraqia University, Baghdad, Iraq
Ahmed Hussein Ali, Department of Computer, College of Education, AL-Iraqia University, Baghdad, Iraq
U. S. Mahmoud, College of Medical Informatics, University of Information Technology and Communications (UOITC), Baghdad, Iraq
Saleh M. Mohammed, Technical Engineering College, Imam Ja’afar Al-Sadiq University (IJSU), Baghdad, Iraq
A. S. Albahri, Technical Engineering College, Imam Ja’afar Al-Sadiq University (IJSU), Baghdad, Iraq

Document Type

Article

Keywords

Cybersecurity, Metaverse, AI-driven Security, Blockchain, Privacy Protection, Threat Detection, Intrusion Detection

Abstract

This study aims to perform a detailed systematic review that investigates and synthesizes the available literature on the challenges and strategies in cybersecurity in the Metaverse. The methodology employed was to ensure a comprehensive literary analysis of the study methods, employing databases such as ScienceDirect (SD), Scopus, IEEE Xplore (IEEE), and Web of Science (WoS). The search was conducted by employing a query that would yield articles published until September 2024, resulting in a total of 325 papers. After vigorous screening, deduplication, and application of the inclusion and exclusion criteria, 34 studies were identified for quantitative synthesis. These papers were divided into three classes: cybersecurity, AI-based security and IoT applications, and Metaverse and virtual realities. This article provides a systematic and comprehensive overview of previous studies that highlighted four fundamental challenges of cybersecurity in the Metaverse and discussed three recommendations for future improvement. A systematic science mapping analysis was conducted to synthesize the results regarding key trust issues related to security in the Metaverse. In addition, the study investigated a wide spectrum of practical applications of cybersecurity within Metaverse environments, encompassing authentication approaches, intrusion detection systems, privacy preservation frameworks, AI-based threat identification, and blockchain-enabled security proposals. Furthermore, this review explores how quantum technologies can be integrated into Metaverse cybersecurity frameworks to address advanced threat models and enhance resilience. The study also highlighted developments in cybersecurity for the Metaverse while pinpointing existing gaps, emerging threats, and directions for future research that would inform frameworks for improved security. The insights provided bear great significance for researchers, practitioners, and policy actors engaged with the Metaverse cybersecurity and applications of artificial intelligence (AI).

Share

COinS