<listing id="l9bhj"><var id="l9bhj"></var></listing>
<var id="l9bhj"><strike id="l9bhj"></strike></var>
<menuitem id="l9bhj"></menuitem>
<cite id="l9bhj"><strike id="l9bhj"></strike></cite>
<cite id="l9bhj"><strike id="l9bhj"></strike></cite>
<var id="l9bhj"></var><cite id="l9bhj"><video id="l9bhj"></video></cite>
<menuitem id="l9bhj"></menuitem>
<cite id="l9bhj"><strike id="l9bhj"><listing id="l9bhj"></listing></strike></cite><cite id="l9bhj"><span id="l9bhj"><menuitem id="l9bhj"></menuitem></span></cite>
<var id="l9bhj"></var>
<var id="l9bhj"></var>
<var id="l9bhj"></var>
<var id="l9bhj"><strike id="l9bhj"></strike></var>
<ins id="l9bhj"><span id="l9bhj"></span></ins>
Volume 44 Issue 4
Apr.  2022
Turn off MathJax
Article Contents
WANG Wen-xi, ZHOU Fang, WAN Yue-liang, NING Huan-sheng. A survey of metaverse technology[J]. Chinese Journal of Engineering, 2022, 44(4): 744-756. doi: 10.13374/j.issn2095-9389.2022.01.15.003
Citation: WANG Wen-xi, ZHOU Fang, WAN Yue-liang, NING Huan-sheng. A survey of metaverse technology[J]. Chinese Journal of Engineering, 2022, 44(4): 744-756. doi: 10.13374/j.issn2095-9389.2022.01.15.003

A survey of metaverse technology

doi: 10.13374/j.issn2095-9389.2022.01.15.003
More Information
  • Corresponding author: E-mail: zhoufang@ies.ustb.edu.cn
  • Received Date: 2022-01-15
    Available Online: 2022-03-14
  • Publish Date: 2022-04-02
  • As an emerging concept, metaverse has attracted extensive attention from industry, academia, media, and the public, prompting many companies worldwide about its layout. However, the layout is inseparable from strong technical support. In the early developmental stage of the metaverse, its technology is the core foundation. The development and innovation of technology are the top priority. This paper dived into the metaverse from the technical view. First, the paper discussed the metaverse’s concept and connotation from the perspective of science and technology and summarized the opinions of practitioners, experts, and scholars about it. Second, it outlined the key technologies of the metaverse, including network and operating technology (5G, 6G, Internet of things, cloud computing, fog computing, and edge computing); management technology (energy consumption, resource, session, and spatiotemporal consistency managements); virtual real object connection, modeling and management technology (Internet of X, identity modeling, social computing, and decentralized management); and virtual real space interaction and fusion technology (extend reality, video game, and brain–computer interface). The metaverse is not a novel technology but an all-inclusive internet application. The progress and development of technology play a solid foundation for realizing and applying the metaverse. At the same time, metaverse development also promotes upgrading existing technologies to drive the product, scenario, and application innovation. Finally, this paper looked into many challenges facing metaverse development. Metaverse enables the connection and integration of the real and virtual worlds. It may become a novel form of social development and change people’s way of life. Meanwhile, the growth of the metaverse concept, its development speed, ultimate form, and even its impact on philosophy, culture, society, and economic governance, as well as human beings, are unknown. By implementing a metaverse prototype, the enabling economy will also be of major interest. Moreover, the government adheres to policy guidelines to enable the real economy with technology, which will still apply in the metaverse era. No matter what trend we are in, we should have a clear understanding, make rational decisions, and steadily explore the metaverse!

     

  • loading
  • [1]
    最近大火的元宇宙是什么?[EB/OL]. 央廣網(2021-9-13) [2021-11-18].https://baijiahao.baidu.com/s?id=1710776745437385158&wfr=spider&for=pc

    What is the metaverse of the recent fire? [EB/OL]. CNR(2021-09-13) [2021-11-18].https://baijiahao.baidu.com/s?id=1710776745437385158&wfr=spider&for=pc
    [2]
    最近大火的“元宇宙”到底是什么[EB/OL]. 鴻蒙開發大熊老師(2021-11-09) [2021-11-18].https://baijiahao.baidu.com/s?id=1715932153689619383&wfr=spider&for=pc

    What is the metaverse of the recent fire [EB/ OL]. Mr. Xiong Hongmeng development (2021-11-09) [2021-11-18].https://baijiahao.baidu.com/s?id=1715932153689619383&wfr=spider&for=pc
    [3]
    陳剛. 北京大學學者發布元宇宙特征與屬性START圖譜[EB/OL]. 光明網(2021-11-19) [2021-11-22].https://view.inews.qq.com/a/20211119A02CIJ00

    Chen G. Scholar of Peking University released the start Atlas of metaverse characteristics and attributes [EB/OL]. Guangming. com (2021-11-19) [2021-11-22].https://view.inews.qq.com/a/20211119A02CIJ00
    [4]
    O’Brien M, Chan K. Explainer: What is the metaverse and how will it work? [EB/OL]. AP News (2021-10-29) [2021-11-22].https://apnews.com/article/meta-facebook-explaining-the-metaverse-f57e01cd5739840945e89fd668b0fa27
    [5]
    Lin X. Metaverse: What? Why? When? [EB/OL]. Solactive (2021-12-20) [2022-01-03].https://www.solactive.com/metaverse-what-why-when/
    [6]
    Hackl C. Defining the metaverse today [EB/OL]. Forbes (2021-05-02) [2021-11-22].https://www.forbes.com/sites/cathyhackl/2021/05/02/defining-the-metaverse-today/?sh=8204e5964485
    [7]
    Ning H S, Ye X Z, Bouras M A, et al. General cyberspace: Cyberspace and cyber-enabled spaces. IEEE Internet Things J, 2018, 5(3): 1843 doi: 10.1109/JIOT.2018.2815535
    [8]
    Lee L H, Braud T, Zhou P Y, et al. All one needs to know about metaverse: A complete survey on technological singularity, virtual ecosystem, and research agenda [EB/OL]. arXiv preprint (2021-10-12) [2022-01-15].https://arxiv.org/abs/2110.05352
    [9]
    Siddiqi, Yu, Joung. 5G ultra-reliable low-latency communication implementation challenges and operational issues with IoT devices. Electronics, 2019, 8(9): 981 doi: 10.3390/electronics8090981
    [10]
    Torres Vega M, Liaskos C, Abadal S, et al. Immersive interconnected virtual and augmented reality: A 5G and IoT perspective. J Netw Syst Manag, 2020, 28(4): 796 doi: 10.1007/s10922-020-09545-w
    [11]
    Kumar N, Ahmad A. ANFIS-based reactive strategy for uRLLC and eMBB traffic multiplexing in 5G new radio. Adv Commun Comput Technol, 2021: 1409
    [12]
    Malik H, Alam M M, le Moullec Y, et al. Interference-aware radio resource allocation for 5G ultra-reliable low-latency communication // 2018 IEEE Globecom Workshops. Abu Dhabi, 2018: 1
    [13]
    Buccheri L, Mandelli S, Saur S, et al. Hybrid retransmission scheme for QoS-defined 5G ultra-reliable low-latency communications // 2018 IEEE Wireless Communications and Networking Conference. Barcelona, 2018: 1
    [14]
    You X H, Wang C X, Huang J, et al. Towards 6G wireless communication networks: Vision, enabling technologies, and new paradigm shifts. Sci China Inf Sci, 2020, 64(1): 1
    [15]
    Chowdhury M Z, Shahjalal M, Ahmed S, et al. 6G wireless communication systems: Applications, requirements, technologies, challenges, and research directions. IEEE Open J Commun Soc, 2020, 1: 957 doi: 10.1109/OJCOMS.2020.3010270
    [16]
    Gong B, Zhang Y, Wang Y B. A remote attestation mechanism for the sensing layer nodes of the Internet of Things. Future Gener Comput Syst, 2018, 78: 867 doi: 10.1016/j.future.2017.07.034
    [17]
    Wang X Y, Wang X Y, Mao S W. RF sensing in the Internet of Things: A general deep learning framework. IEEE Commun Mag, 2018, 56(9): 62 doi: 10.1109/MCOM.2018.1701277
    [18]
    Ye N, Zhu Y, Wang R C, et al. An efficient authentication and access control scheme for perception layer of Internet of Things. Appl Math Inf Sci, 2014, 8(4): 1617 doi: 10.12785/amis/080416
    [19]
    Norouzi Shad M, Maadani M, Nesari Moghadam M. GAPSO-SVM: An IDSS-based energy-aware clustering routing algorithm for IoT perception layer. Wirel Pers Commun, 2021: 1
    [20]
    Kou L, Shi Y Q, Zhang L G, et al. A lightweight three-factor user authentication protocol for the information perception of IoT. Comput Mater Continua, 2019, 58(2): 545 doi: 10.32604/cmc.2019.03760
    [21]
    Shafiq M, Tian Z H, Bashir A K, et al. CorrAUC: A malicious bot-IoT traffic detection method in IoT network using machine-learning techniques. IEEE Internet Things J, 2021, 8(5): 3242 doi: 10.1109/JIOT.2020.3002255
    [22]
    Hafeez I, Antikainen M, Ding A Y, et al. IoT-KEEPER: Detecting malicious IoT network activity using online traffic analysis at the edge. IEEE Trans Netw Serv Manag, 2020, 17(1): 45 doi: 10.1109/TNSM.2020.2966951
    [23]
    Sun X, Ansari N. Dynamic resource caching in the IoT application layer for smart cities. IEEE Internet Things J, 2018, 5(2): 606 doi: 10.1109/JIOT.2017.2764418
    [24]
    Sun X, Ansari N. Traffic load balancing among brokers at the IoT application layer. IEEE Trans Netw Serv Manag, 2018, 15(1): 489 doi: 10.1109/TNSM.2017.2787859
    [25]
    Deogirikar J, Vidhate A. An improved publish-subscribe method in application layer protocol for IoT // 2017 International Conference on Smart Technologies For Smart Nation (SmartTechCon). Bengaluru, 2017: 1070
    [26]
    Mohanta B K, Panda S S, Satapathy U, et al. Trustworthy management in decentralized IoT application using blockchain // 2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT). Kanpur, 2019: 1
    [27]
    Shi F F, Ning H S, Huangfu W, et al. Recent progress on the convergence of the Internet of Things and artificial intelligence. IEEE Netw, 2020, 34(5): 8 doi: 10.1109/MNET.011.2000009
    [28]
    Ning H S, Liu H. Cyber-physical-social-thinking space based science and technology framework for the Internet of Things. Sci China Inf Sci, 2015, 58(3): 1
    [29]
    Ning H S, Farha F, Mohammad Z N, et al. A survey and tutorial on “connection exploding meets efficient communication” in the Internet of Things. IEEE Internet Things J, 2020, 7(11): 10733 doi: 10.1109/JIOT.2020.2996615
    [30]
    Cui S, Farha F, Ning H S, et al. A survey on the bottleneck between applications exploding and user requirements in IoT. IEEE Internet Things J, 2022, 9(1): 261 doi: 10.1109/JIOT.2021.3097634
    [31]
    Fettweis G P. The tactile Internet: Applications and challenges. IEEE Veh Technol Mag, 2014, 9(1): 64 doi: 10.1109/MVT.2013.2295069
    [32]
    Sachs J, Andersson L A A, Araújo J, et al. Adaptive 5G low-latency communication for tactile InternEt services. Proc IEEE, 2019, 107(2): 325 doi: 10.1109/JPROC.2018.2864587
    [33]
    Antonakoglou K, Xu X, Steinbach E, et al. Toward haptic communications over the 5G tactile Internet. IEEE Commun Surv Tutor, 2018, 20(4): 3034 doi: 10.1109/COMST.2018.2851452
    [34]
    Matsubara M, Oguchi M. Evaluation of Metaverse Server in a Widely-Distributed Environment // On the Move to Meaningful Internet Systems: OTM 2010 Workshops. Berlin, 2010: 307
    [35]
    Singh S P, Nayyar A, Kumar R, et al. Fog computing: From architecture to edge computing and big data processing. J Supercomput, 2019, 75(4): 2070 doi: 10.1007/s11227-018-2701-2
    [36]
    Zhang W S, Sun H Y, Zhao D H, et al. A streaming cloud platform for real-time video processing on embedded devices. IEEE Trans Cloud Comput, 2021, 9(3): 868 doi: 10.1109/TCC.2019.2894621
    [37]
    王德政, 申山宏, 周寧寧. 云計算環境下的數據存儲. 計算機技術與發展, 2011, 21(4):81 doi: 10.3969/j.issn.1673-629X.2011.04.021

    Wang D Z, Shen S H, Zhou N N. Data storage in cloud computing environment. Comput Technol Dev, 2011, 21(4): 81 doi: 10.3969/j.issn.1673-629X.2011.04.021
    [38]
    Sharma P, Jindal R, Borah M D. Blockchain technology for cloud storage. ACM Comput Surv, 2021, 53(4): 1
    [39]
    Qiu H, Noura H, Qiu M K, et al. A user-centric data protection method for cloud storage based on invertible DWT. IEEE Trans Cloud Comput, 2021, 9(4): 1293 doi: 10.1109/TCC.2019.2911679
    [40]
    Doan V T, Khang V Q H, Nguyen H H C, et al. A novel solution for virtual Server on the data consistency maintenance in cloud storage systems // International Conference on Computing and Information Technology. Bangkok, 2019: 227
    [41]
    賈維嘉, 周小杰. 霧計算的概念、相關研究與應用. 通信學報, 2018, 39(5):153 doi: 10.11959/j.issn.1000-436x.2018086

    Jia W J, Zhou X J. Concepts, issues, and applications of fog computing. J Commun, 2018, 39(5): 153 doi: 10.11959/j.issn.1000-436x.2018086
    [42]
    吳江, 曹喆, 陳佩, 等. 元宇宙視域下的用戶信息行為: 框架與展望. 信息資源管理學報,https://kns.cnki.net/kcms/detail/42.1812.g2.20211129.1429.004.html

    Wu J, Cao Z, Chen P, et al. User information behaviour from the perspective of the metaverse: Framework and prospect. J Inf Resour Manag, https://kns.cnki.net/kcms/detail/42.1812.g2.20211129.1429.004.html
    [43]
    Kim W S. Edge Computing server deployment technique for cloud VR-based multi-user metaverse content. J Korea Multimed Soc, 2021, 24(8): 1090
    [44]
    Ren J K, Yu G D, He Y H, et al. Collaborative cloud and edge computing for latency minimization. IEEE Trans Veh Technol, 2019, 68(5): 5031 doi: 10.1109/TVT.2019.2904244
    [45]
    Elbamby M S, Perfecto C, Liu C F, et al. Wireless edge computing with latency and reliability guarantees. Proc IEEE, 2019, 107(8): 1717 doi: 10.1109/JPROC.2019.2917084
    [46]
    徐恒. 全真互聯網: 騰訊準備好了嗎?[J/OL]. 中國電子報(2021-08-20) [2022-01-11]. http://epaper.cena.com.cn/content/1/2021-08/20/02/2021082002_pdf.pdf

    Xu H. Quanzhen internet: Is Tencent ready? [J/OL]. China Electronic News (2021-08-20) [2022-01-11]. http://epaper.cena.com.cn/content/1/2021-08/20/02/2021082002_pdf.pdf
    [47]
    Somula R S, Sasikala R. A survey on mobile cloud computing: Mobile computing + cloud computing (MCC = MC + CC). Scalable Comput Pract Exp, 2018, 19(4): 309 doi: 10.12694/scpe.v19i4.1411
    [48]
    Bi M N, Wang Y J, Cai Z P, et al. A privacy-preserving mechanism based on local differential privacy in edge computing. China Commun, 2020, 17(9): 50 doi: 10.23919/JCC.2020.09.005
    [49]
    寧煥生, 朱濤. 廣義網絡空間. 北京: 電子工業出版社, 2017

    Ning H S, Zhu T. Generalized cyberspace. Beijing: Publishing House of Electronics industry, 2017
    [50]
    Nunes L H, Estrella J C, Perera C, et al. The elimination-selection based algorithm for efficient resource discovery in Internet of Things environments // 2018 15th IEEE Annual Consumer Communications & Networking Conference. Las Vegas, 2018: 1
    [51]
    Kim J H, Kim S G. An efficient session management scheme for low-latency communications in 5G systems. J Korea Soc Comput Inf, 2020, 25(2): 83
    [52]
    Park K Y, Soyer O. Advances in Computer Science and Ubiquitous Computing. Singapore: Springer, 2021
    [53]
    Nadar V M, Chatterjee M, Jacob L. A defensive approach for CSRF and broken authentication and session management attack. In: Perez G, Tiwari S, Trivedi M, Mishra K eds. Ambient Communications and Computer Systems. Advances in Intelligent Systems and Computing, vol 696. Singapore: Springer, 2018
    [54]
    Marlinspike M, Perrin T. The Sesame Algorithm: Session Management for Asynchronous Message Encryption, Revision 2. 2017
    [55]
    Atluri G, Karpatne A, Kumar V. Spatio-temporal data mining. ACM Comput Surv, 2019, 51(4): 1
    [56]
    Shi F F, Wang W X, Wang H, et al. The Internet of people: A survey and tutorial[J/OL]. arXiv preprint (2021-04-06) [2022-01-15].https://arxiv.org/abs/2104.04079
    [57]
    Zhang Z M, Yin R, Ning H S. Internet of brain, thought, thinking, and creation. Chinese J Electron, http://cje.ejournal.org.cn/article/doi/10.1049/cje.2021.00.236
    [58]
    Ning H S, Hu S, He W, et al. nID-based internet of things and its application in airport aviation risk management. Chin J Electron, 2012, 21(2): 209
    [59]
    Verma M. Modeling identity management system based on blockchain technology. Int J Res Rev 2021, 2(4): 450
    [60]
    Ning H S, Zhen Z, Shi F F, et al. A survey of identity modeling and identity addressing in Internet of Things. IEEE Internet Things J, 2020, 7(6): 4697 doi: 10.1109/JIOT.2020.2971773
    [61]
    Bouras M A, Lu Q H, Dhelim S, et al. A lightweight blockchain-based IoT identity management approach. Future Internet, 2021, 13(2): 24 doi: 10.3390/fi13020024
    [62]
    葉曉貞, 寧煥生, 夏博明, 等, 廣義網絡空間研究綜述. 計算機科學與應用, 2020, 10(5): 893

    Ye X Z, Ning H S, Xia B M, et al. A review of generalized cyberspace. Comput Sci Appl, 2020, 10(5): 893
    [63]
    Merwe D. The Metaverse as Virtual Heterotopia // 3rd World Conference on Research in Social Sciences. Vienna, 2021
    [64]
    Zhai S P, Yang Y Y, Li J, et al. Research on the application of cryptography on the blockchain. J Phys:Conf Ser, 2019, 1168: 032077 doi: 10.1088/1742-6596/1168/3/032077
    [65]
    朱巖, 王巧石, 秦博涵, 等. 區塊鏈技術及其研究進展. 工程科學學報, 2019, 41(11):1361

    Zhu Y, Wang Q S, Qin B H, et al. Survey of blockchain technology and its advances. Chin J Eng, 2019, 41(11): 1361
    [66]
    Iq. 元宇宙概念龍頭幣[J/OL]. 幣圈子(2021-11-03) [2021-12-28]. http://www.elecfans.com/d/1726181.html

    Iq. The metaverse concept leading coin [J/OL]. Coin Circle (2021-11-03) [2021-12-28]. http://www.elecfans.com/d/1726181.html
    [67]
    Jentzsch C. Decentralized Autonomous Organization to Automate Governance [EB/OL]. 2016. https://lawofthelevel.lexblogplatformthree.com/wp-content/uploads/sites/187/2017/07/WhitePaper-1.pdf
    [68]
    一文了解去中心化交易所發展歷史[J/OL]. UUPool雙優礦池(2021-04-20) [2021-12-28].https://baijiahao.baidu.com/s?id=1697546275667027545&wfr=spider&for=pc

    Learn about the development history of decentralized exchange [J/OL]. Uupool Double Excellent Ore Pool (2021-04-20) [2021-12-28].https://baijiahao.baidu.com/s?id=1697546275667027545&wfr=spider&for=pc
    [69]
    喬雙全. 基于區塊鏈的去中心化數據安全共享平臺[學位論文]. 天津: 天津理工大學, 2020

    Qiao S Q. Decentralized Secure Data Sharing Platform Based on Blockchain [Dissertation]. Tianjin: Tianjin University of Technology, 2020
    [70]
    符純浩. 基于分布式賬本的去中心化存儲系統框[學位論文]. 成都: 電子科技大學, 2020

    Fu C H. The Frame of Decentralized Storage System Based on Distributed Ledger [Dissertation]. Chengdu: University of Electronic Science and Technology, 2020
    [71]
    Zhang X, Yao L, Wang X Z, et al. A survey on deep learning based brain computer interface: Recent advances and new frontiers[J/OL]. arXiv preprint (2021-10-12) [2022-01-15]. https://arxiv.org/abs/1905.04149
    [72]
    孫瀚, 張雄, 張玉, 等. 基于腦電信號的腦機接口技術. 安徽科技, 2015(4):54 doi: 10.3969/j.issn.1007-7855.2015.04.027

    Sun H, Zhang X, Zhang Y, et al. Brain-computer interface technology based on EEG signals. Anhui Sci Technol, 2015(4): 54 doi: 10.3969/j.issn.1007-7855.2015.04.027
    [73]
    Abiri R, Borhani S, Sellers E W, et al. A comprehensive review of EEG-based brain-computer interface paradigms. J Neural Eng, 2019, 16(1): 011001 doi: 10.1088/1741-2552/aaf12e
    [74]
    Fahimi F, Dosen S, Ang K K, et al. Generative adversarial networks-based data augmentation for brain-computer interface. IEEE Trans Neural Netw Learn Syst, 2020, 32(9): 4039
    [75]
    Aggarwal S, Chugh N. Signal processing techniques for motor imagery brain computer interface: A review. Array, 2019, 1-2: 100003 doi: 10.1016/j.array.2019.100003
    [76]
    Ning H S, Wang H, Lin Y J, et al. A survey on metaverse: The state-of-the-art, technologies, applications, and challenges[J/OL]. arXiv preprint (2021-11-18) [2022-01-15].https://arxiv.org/abs/2111.09673
    [77]
    Zhang Z M, Ning H S, Shi F F, et al. Artificial intelligence in cyber security: Research advances, challenges, and opportunities. Artif Intell Rev, 2022, 55(2): 1029 doi: 10.1007/s10462-021-09976-0
    [78]
    Falchuk B, Loeb S, Neff R. The social metaverse: Battle for privacy. IEEE Technol Soc Mag, 2018, 37(2): 52 doi: 10.1109/MTS.2018.2826060
    [79]
    Jeon H, Youn H, Ko S, et al. Blockchain and AI meet in the metaverse // Fernández-Caramés T M, Fraga-Lamas P, Eds, Advances in the Convergence of Blockchain and Artificial Intelligence. London: IntechOpen, 2021
    [80]
    張智敏, 石飛飛, 萬月亮, 等. 人工智能在軍事對抗中的應用進展. 工程科學學報, 2020, 42(9):1106

    Zhang Z M, Shi F F, Wan Y L, et al. Application progress of artificial intelligence in military confrontation. Chin J Eng, 2020, 42(9): 1106
  • 加載中

Catalog

    通訊作者: 陳斌, bchen63@163.com
    • 1. 

      沈陽化工大學材料科學與工程學院 沈陽 110142

    1. 本站搜索
    2. 百度學術搜索
    3. 萬方數據庫搜索
    4. CNKI搜索

    Figures(1)  / Tables(5)

    Article views (6349) PDF downloads(1390) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return
    久色视频