Citation: | WANG Wen-xi, ZHOU Fang, WAN Yue-liang, NING Huan-sheng. A survey of metaverse technology[J]. Chinese Journal of Engineering, 2022, 44(4): 744-756. doi: 10.13374/j.issn2095-9389.2022.01.15.003 |
[1] |
最近大火的元宇宙是什么?[EB/OL]. 央廣網(2021-9-13) [2021-11-18].https://baijiahao.baidu.com/s?id=1710776745437385158&wfr=spider&for=pc
What is the metaverse of the recent fire? [EB/OL]. CNR(2021-09-13) [2021-11-18].https://baijiahao.baidu.com/s?id=1710776745437385158&wfr=spider&for=pc
|
[2] |
最近大火的“元宇宙”到底是什么[EB/OL]. 鴻蒙開發大熊老師(2021-11-09) [2021-11-18].https://baijiahao.baidu.com/s?id=1715932153689619383&wfr=spider&for=pc
What is the metaverse of the recent fire [EB/ OL]. Mr. Xiong Hongmeng development (2021-11-09) [2021-11-18].https://baijiahao.baidu.com/s?id=1715932153689619383&wfr=spider&for=pc
|
[3] |
陳剛. 北京大學學者發布元宇宙特征與屬性START圖譜[EB/OL]. 光明網(2021-11-19) [2021-11-22].https://view.inews.qq.com/a/20211119A02CIJ00
Chen G. Scholar of Peking University released the start Atlas of metaverse characteristics and attributes [EB/OL]. Guangming. com (2021-11-19) [2021-11-22].https://view.inews.qq.com/a/20211119A02CIJ00
|
[4] |
O’Brien M, Chan K. Explainer: What is the metaverse and how will it work? [EB/OL]. AP News (2021-10-29) [2021-11-22].https://apnews.com/article/meta-facebook-explaining-the-metaverse-f57e01cd5739840945e89fd668b0fa27
|
[5] |
Lin X. Metaverse: What? Why? When? [EB/OL]. Solactive (2021-12-20) [2022-01-03].https://www.solactive.com/metaverse-what-why-when/
|
[6] |
Hackl C. Defining the metaverse today [EB/OL]. Forbes (2021-05-02) [2021-11-22].https://www.forbes.com/sites/cathyhackl/2021/05/02/defining-the-metaverse-today/?sh=8204e5964485
|
[7] |
Ning H S, Ye X Z, Bouras M A, et al. General cyberspace: Cyberspace and cyber-enabled spaces. IEEE Internet Things J, 2018, 5(3): 1843 doi: 10.1109/JIOT.2018.2815535
|
[8] |
Lee L H, Braud T, Zhou P Y, et al. All one needs to know about metaverse: A complete survey on technological singularity, virtual ecosystem, and research agenda [EB/OL]. arXiv preprint (2021-10-12) [2022-01-15].https://arxiv.org/abs/2110.05352
|
[9] |
Siddiqi, Yu, Joung. 5G ultra-reliable low-latency communication implementation challenges and operational issues with IoT devices. Electronics, 2019, 8(9): 981 doi: 10.3390/electronics8090981
|
[10] |
Torres Vega M, Liaskos C, Abadal S, et al. Immersive interconnected virtual and augmented reality: A 5G and IoT perspective. J Netw Syst Manag, 2020, 28(4): 796 doi: 10.1007/s10922-020-09545-w
|
[11] |
Kumar N, Ahmad A. ANFIS-based reactive strategy for uRLLC and eMBB traffic multiplexing in 5G new radio. Adv Commun Comput Technol, 2021: 1409
|
[12] |
Malik H, Alam M M, le Moullec Y, et al. Interference-aware radio resource allocation for 5G ultra-reliable low-latency communication // 2018 IEEE Globecom Workshops. Abu Dhabi, 2018: 1
|
[13] |
Buccheri L, Mandelli S, Saur S, et al. Hybrid retransmission scheme for QoS-defined 5G ultra-reliable low-latency communications // 2018 IEEE Wireless Communications and Networking Conference. Barcelona, 2018: 1
|
[14] |
You X H, Wang C X, Huang J, et al. Towards 6G wireless communication networks: Vision, enabling technologies, and new paradigm shifts. Sci China Inf Sci, 2020, 64(1): 1
|
[15] |
Chowdhury M Z, Shahjalal M, Ahmed S, et al. 6G wireless communication systems: Applications, requirements, technologies, challenges, and research directions. IEEE Open J Commun Soc, 2020, 1: 957 doi: 10.1109/OJCOMS.2020.3010270
|
[16] |
Gong B, Zhang Y, Wang Y B. A remote attestation mechanism for the sensing layer nodes of the Internet of Things. Future Gener Comput Syst, 2018, 78: 867 doi: 10.1016/j.future.2017.07.034
|
[17] |
Wang X Y, Wang X Y, Mao S W. RF sensing in the Internet of Things: A general deep learning framework. IEEE Commun Mag, 2018, 56(9): 62 doi: 10.1109/MCOM.2018.1701277
|
[18] |
Ye N, Zhu Y, Wang R C, et al. An efficient authentication and access control scheme for perception layer of Internet of Things. Appl Math Inf Sci, 2014, 8(4): 1617 doi: 10.12785/amis/080416
|
[19] |
Norouzi Shad M, Maadani M, Nesari Moghadam M. GAPSO-SVM: An IDSS-based energy-aware clustering routing algorithm for IoT perception layer. Wirel Pers Commun, 2021: 1
|
[20] |
Kou L, Shi Y Q, Zhang L G, et al. A lightweight three-factor user authentication protocol for the information perception of IoT. Comput Mater Continua, 2019, 58(2): 545 doi: 10.32604/cmc.2019.03760
|
[21] |
Shafiq M, Tian Z H, Bashir A K, et al. CorrAUC: A malicious bot-IoT traffic detection method in IoT network using machine-learning techniques. IEEE Internet Things J, 2021, 8(5): 3242 doi: 10.1109/JIOT.2020.3002255
|
[22] |
Hafeez I, Antikainen M, Ding A Y, et al. IoT-KEEPER: Detecting malicious IoT network activity using online traffic analysis at the edge. IEEE Trans Netw Serv Manag, 2020, 17(1): 45 doi: 10.1109/TNSM.2020.2966951
|
[23] |
Sun X, Ansari N. Dynamic resource caching in the IoT application layer for smart cities. IEEE Internet Things J, 2018, 5(2): 606 doi: 10.1109/JIOT.2017.2764418
|
[24] |
Sun X, Ansari N. Traffic load balancing among brokers at the IoT application layer. IEEE Trans Netw Serv Manag, 2018, 15(1): 489 doi: 10.1109/TNSM.2017.2787859
|
[25] |
Deogirikar J, Vidhate A. An improved publish-subscribe method in application layer protocol for IoT // 2017 International Conference on Smart Technologies For Smart Nation (SmartTechCon). Bengaluru, 2017: 1070
|
[26] |
Mohanta B K, Panda S S, Satapathy U, et al. Trustworthy management in decentralized IoT application using blockchain // 2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT). Kanpur, 2019: 1
|
[27] |
Shi F F, Ning H S, Huangfu W, et al. Recent progress on the convergence of the Internet of Things and artificial intelligence. IEEE Netw, 2020, 34(5): 8 doi: 10.1109/MNET.011.2000009
|
[28] |
Ning H S, Liu H. Cyber-physical-social-thinking space based science and technology framework for the Internet of Things. Sci China Inf Sci, 2015, 58(3): 1
|
[29] |
Ning H S, Farha F, Mohammad Z N, et al. A survey and tutorial on “connection exploding meets efficient communication” in the Internet of Things. IEEE Internet Things J, 2020, 7(11): 10733 doi: 10.1109/JIOT.2020.2996615
|
[30] |
Cui S, Farha F, Ning H S, et al. A survey on the bottleneck between applications exploding and user requirements in IoT. IEEE Internet Things J, 2022, 9(1): 261 doi: 10.1109/JIOT.2021.3097634
|
[31] |
Fettweis G P. The tactile Internet: Applications and challenges. IEEE Veh Technol Mag, 2014, 9(1): 64 doi: 10.1109/MVT.2013.2295069
|
[32] |
Sachs J, Andersson L A A, Araújo J, et al. Adaptive 5G low-latency communication for tactile InternEt services. Proc IEEE, 2019, 107(2): 325 doi: 10.1109/JPROC.2018.2864587
|
[33] |
Antonakoglou K, Xu X, Steinbach E, et al. Toward haptic communications over the 5G tactile Internet. IEEE Commun Surv Tutor, 2018, 20(4): 3034 doi: 10.1109/COMST.2018.2851452
|
[34] |
Matsubara M, Oguchi M. Evaluation of Metaverse Server in a Widely-Distributed Environment // On the Move to Meaningful Internet Systems: OTM 2010 Workshops. Berlin, 2010: 307
|
[35] |
Singh S P, Nayyar A, Kumar R, et al. Fog computing: From architecture to edge computing and big data processing. J Supercomput, 2019, 75(4): 2070 doi: 10.1007/s11227-018-2701-2
|
[36] |
Zhang W S, Sun H Y, Zhao D H, et al. A streaming cloud platform for real-time video processing on embedded devices. IEEE Trans Cloud Comput, 2021, 9(3): 868 doi: 10.1109/TCC.2019.2894621
|
[37] |
王德政, 申山宏, 周寧寧. 云計算環境下的數據存儲. 計算機技術與發展, 2011, 21(4):81 doi: 10.3969/j.issn.1673-629X.2011.04.021
Wang D Z, Shen S H, Zhou N N. Data storage in cloud computing environment. Comput Technol Dev, 2011, 21(4): 81 doi: 10.3969/j.issn.1673-629X.2011.04.021
|
[38] |
Sharma P, Jindal R, Borah M D. Blockchain technology for cloud storage. ACM Comput Surv, 2021, 53(4): 1
|
[39] |
Qiu H, Noura H, Qiu M K, et al. A user-centric data protection method for cloud storage based on invertible DWT. IEEE Trans Cloud Comput, 2021, 9(4): 1293 doi: 10.1109/TCC.2019.2911679
|
[40] |
Doan V T, Khang V Q H, Nguyen H H C, et al. A novel solution for virtual Server on the data consistency maintenance in cloud storage systems // International Conference on Computing and Information Technology. Bangkok, 2019: 227
|
[41] |
賈維嘉, 周小杰. 霧計算的概念、相關研究與應用. 通信學報, 2018, 39(5):153 doi: 10.11959/j.issn.1000-436x.2018086
Jia W J, Zhou X J. Concepts, issues, and applications of fog computing. J Commun, 2018, 39(5): 153 doi: 10.11959/j.issn.1000-436x.2018086
|
[42] |
吳江, 曹喆, 陳佩, 等. 元宇宙視域下的用戶信息行為: 框架與展望. 信息資源管理學報,https://kns.cnki.net/kcms/detail/42.1812.g2.20211129.1429.004.html
Wu J, Cao Z, Chen P, et al. User information behaviour from the perspective of the metaverse: Framework and prospect. J Inf Resour Manag, https://kns.cnki.net/kcms/detail/42.1812.g2.20211129.1429.004.html
|
[43] |
Kim W S. Edge Computing server deployment technique for cloud VR-based multi-user metaverse content. J Korea Multimed Soc, 2021, 24(8): 1090
|
[44] |
Ren J K, Yu G D, He Y H, et al. Collaborative cloud and edge computing for latency minimization. IEEE Trans Veh Technol, 2019, 68(5): 5031 doi: 10.1109/TVT.2019.2904244
|
[45] |
Elbamby M S, Perfecto C, Liu C F, et al. Wireless edge computing with latency and reliability guarantees. Proc IEEE, 2019, 107(8): 1717 doi: 10.1109/JPROC.2019.2917084
|
[46] |
徐恒. 全真互聯網: 騰訊準備好了嗎?[J/OL]. 中國電子報(2021-08-20) [2022-01-11]. http://epaper.cena.com.cn/content/1/2021-08/20/02/2021082002_pdf.pdf
Xu H. Quanzhen internet: Is Tencent ready? [J/OL]. China Electronic News (2021-08-20) [2022-01-11]. http://epaper.cena.com.cn/content/1/2021-08/20/02/2021082002_pdf.pdf
|
[47] |
Somula R S, Sasikala R. A survey on mobile cloud computing: Mobile computing + cloud computing (MCC = MC + CC). Scalable Comput Pract Exp, 2018, 19(4): 309 doi: 10.12694/scpe.v19i4.1411
|
[48] |
Bi M N, Wang Y J, Cai Z P, et al. A privacy-preserving mechanism based on local differential privacy in edge computing. China Commun, 2020, 17(9): 50 doi: 10.23919/JCC.2020.09.005
|
[49] |
寧煥生, 朱濤. 廣義網絡空間. 北京: 電子工業出版社, 2017
Ning H S, Zhu T. Generalized cyberspace. Beijing: Publishing House of Electronics industry, 2017
|
[50] |
Nunes L H, Estrella J C, Perera C, et al. The elimination-selection based algorithm for efficient resource discovery in Internet of Things environments // 2018 15th IEEE Annual Consumer Communications & Networking Conference. Las Vegas, 2018: 1
|
[51] |
Kim J H, Kim S G. An efficient session management scheme for low-latency communications in 5G systems. J Korea Soc Comput Inf, 2020, 25(2): 83
|
[52] |
Park K Y, Soyer O. Advances in Computer Science and Ubiquitous Computing. Singapore: Springer, 2021
|
[53] |
Nadar V M, Chatterjee M, Jacob L. A defensive approach for CSRF and broken authentication and session management attack. In: Perez G, Tiwari S, Trivedi M, Mishra K eds. Ambient Communications and Computer Systems. Advances in Intelligent Systems and Computing, vol 696. Singapore: Springer, 2018
|
[54] |
Marlinspike M, Perrin T. The Sesame Algorithm: Session Management for Asynchronous Message Encryption, Revision 2. 2017
|
[55] |
Atluri G, Karpatne A, Kumar V. Spatio-temporal data mining. ACM Comput Surv, 2019, 51(4): 1
|
[56] |
Shi F F, Wang W X, Wang H, et al. The Internet of people: A survey and tutorial[J/OL]. arXiv preprint (2021-04-06) [2022-01-15].https://arxiv.org/abs/2104.04079
|
[57] |
Zhang Z M, Yin R, Ning H S. Internet of brain, thought, thinking, and creation. Chinese J Electron, http://cje.ejournal.org.cn/article/doi/10.1049/cje.2021.00.236
|
[58] |
Ning H S, Hu S, He W, et al. nID-based internet of things and its application in airport aviation risk management. Chin J Electron, 2012, 21(2): 209
|
[59] |
Verma M. Modeling identity management system based on blockchain technology. Int J Res Rev 2021, 2(4): 450
|
[60] |
Ning H S, Zhen Z, Shi F F, et al. A survey of identity modeling and identity addressing in Internet of Things. IEEE Internet Things J, 2020, 7(6): 4697 doi: 10.1109/JIOT.2020.2971773
|
[61] |
Bouras M A, Lu Q H, Dhelim S, et al. A lightweight blockchain-based IoT identity management approach. Future Internet, 2021, 13(2): 24 doi: 10.3390/fi13020024
|
[62] |
葉曉貞, 寧煥生, 夏博明, 等, 廣義網絡空間研究綜述. 計算機科學與應用, 2020, 10(5): 893
Ye X Z, Ning H S, Xia B M, et al. A review of generalized cyberspace. Comput Sci Appl, 2020, 10(5): 893
|
[63] |
Merwe D. The Metaverse as Virtual Heterotopia // 3rd World Conference on Research in Social Sciences. Vienna, 2021
|
[64] |
Zhai S P, Yang Y Y, Li J, et al. Research on the application of cryptography on the blockchain. J Phys:Conf Ser, 2019, 1168: 032077 doi: 10.1088/1742-6596/1168/3/032077
|
[65] |
朱巖, 王巧石, 秦博涵, 等. 區塊鏈技術及其研究進展. 工程科學學報, 2019, 41(11):1361
Zhu Y, Wang Q S, Qin B H, et al. Survey of blockchain technology and its advances. Chin J Eng, 2019, 41(11): 1361
|
[66] |
Iq. 元宇宙概念龍頭幣[J/OL]. 幣圈子(2021-11-03) [2021-12-28]. http://www.elecfans.com/d/1726181.html
Iq. The metaverse concept leading coin [J/OL]. Coin Circle (2021-11-03) [2021-12-28]. http://www.elecfans.com/d/1726181.html
|
[67] |
Jentzsch C. Decentralized Autonomous Organization to Automate Governance [EB/OL]. 2016. https://lawofthelevel.lexblogplatformthree.com/wp-content/uploads/sites/187/2017/07/WhitePaper-1.pdf
|
[68] |
一文了解去中心化交易所發展歷史[J/OL]. UUPool雙優礦池(2021-04-20) [2021-12-28].https://baijiahao.baidu.com/s?id=1697546275667027545&wfr=spider&for=pc
Learn about the development history of decentralized exchange [J/OL]. Uupool Double Excellent Ore Pool (2021-04-20) [2021-12-28].https://baijiahao.baidu.com/s?id=1697546275667027545&wfr=spider&for=pc
|
[69] |
喬雙全. 基于區塊鏈的去中心化數據安全共享平臺[學位論文]. 天津: 天津理工大學, 2020
Qiao S Q. Decentralized Secure Data Sharing Platform Based on Blockchain [Dissertation]. Tianjin: Tianjin University of Technology, 2020
|
[70] |
符純浩. 基于分布式賬本的去中心化存儲系統框[學位論文]. 成都: 電子科技大學, 2020
Fu C H. The Frame of Decentralized Storage System Based on Distributed Ledger [Dissertation]. Chengdu: University of Electronic Science and Technology, 2020
|
[71] |
Zhang X, Yao L, Wang X Z, et al. A survey on deep learning based brain computer interface: Recent advances and new frontiers[J/OL]. arXiv preprint (2021-10-12) [2022-01-15]. https://arxiv.org/abs/1905.04149
|
[72] |
孫瀚, 張雄, 張玉, 等. 基于腦電信號的腦機接口技術. 安徽科技, 2015(4):54 doi: 10.3969/j.issn.1007-7855.2015.04.027
Sun H, Zhang X, Zhang Y, et al. Brain-computer interface technology based on EEG signals. Anhui Sci Technol, 2015(4): 54 doi: 10.3969/j.issn.1007-7855.2015.04.027
|
[73] |
Abiri R, Borhani S, Sellers E W, et al. A comprehensive review of EEG-based brain-computer interface paradigms. J Neural Eng, 2019, 16(1): 011001 doi: 10.1088/1741-2552/aaf12e
|
[74] |
Fahimi F, Dosen S, Ang K K, et al. Generative adversarial networks-based data augmentation for brain-computer interface. IEEE Trans Neural Netw Learn Syst, 2020, 32(9): 4039
|
[75] |
Aggarwal S, Chugh N. Signal processing techniques for motor imagery brain computer interface: A review. Array, 2019, 1-2: 100003 doi: 10.1016/j.array.2019.100003
|
[76] |
Ning H S, Wang H, Lin Y J, et al. A survey on metaverse: The state-of-the-art, technologies, applications, and challenges[J/OL]. arXiv preprint (2021-11-18) [2022-01-15].https://arxiv.org/abs/2111.09673
|
[77] |
Zhang Z M, Ning H S, Shi F F, et al. Artificial intelligence in cyber security: Research advances, challenges, and opportunities. Artif Intell Rev, 2022, 55(2): 1029 doi: 10.1007/s10462-021-09976-0
|
[78] |
Falchuk B, Loeb S, Neff R. The social metaverse: Battle for privacy. IEEE Technol Soc Mag, 2018, 37(2): 52 doi: 10.1109/MTS.2018.2826060
|
[79] |
Jeon H, Youn H, Ko S, et al. Blockchain and AI meet in the metaverse // Fernández-Caramés T M, Fraga-Lamas P, Eds, Advances in the Convergence of Blockchain and Artificial Intelligence. London: IntechOpen, 2021
|
[80] |
張智敏, 石飛飛, 萬月亮, 等. 人工智能在軍事對抗中的應用進展. 工程科學學報, 2020, 42(9):1106
Zhang Z M, Shi F F, Wan Y L, et al. Application progress of artificial intelligence in military confrontation. Chin J Eng, 2020, 42(9): 1106
|