{"id":"https://openalex.org/W4415821109","doi":"https://doi.org/10.1109/tnse.2025.3628214","title":"Metaverse Hierarchical T/Key-Based Lightweight Authentication Protocol","display_name":"Metaverse Hierarchical T/Key-Based Lightweight Authentication Protocol","publication_year":2025,"publication_date":"2025-11-03","ids":{"openalex":"https://openalex.org/W4415821109","doi":"https://doi.org/10.1109/tnse.2025.3628214"},"language":null,"primary_location":{"id":"doi:10.1109/tnse.2025.3628214","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnse.2025.3628214","pdf_url":null,"source":{"id":"https://openalex.org/S2484352698","display_name":"IEEE Transactions on Network Science and Engineering","issn_l":"2327-4697","issn":["2327-4697","2334-329X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network Science and Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5053669410","display_name":"Mouna Nakkar","orcid":"https://orcid.org/0000-0002-0010-7313"},"institutions":[{"id":"https://openalex.org/I60158472","display_name":"Concordia University","ror":"https://ror.org/0420zvk78","country_code":"CA","type":"education","lineage":["https://openalex.org/I60158472"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Mouna Nakkar","raw_affiliation_strings":["Concordia Institute for Information Systems Engineering, Montreal, QC, Canada","Concordia Institute for Information Systems Engineering (CIISE), Montreal, QC, Canada"],"affiliations":[{"raw_affiliation_string":"Concordia Institute for Information Systems Engineering, Montreal, QC, Canada","institution_ids":["https://openalex.org/I60158472"]},{"raw_affiliation_string":"Concordia Institute for Information Systems Engineering (CIISE), Montreal, QC, Canada","institution_ids":["https://openalex.org/I60158472"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028375372","display_name":"Mohamed Seifelnasr","orcid":"https://orcid.org/0000-0002-2563-1891"},"institutions":[{"id":"https://openalex.org/I84058292","display_name":"Helwan University","ror":"https://ror.org/00h55v928","country_code":"EG","type":"education","lineage":["https://openalex.org/I84058292"]}],"countries":["EG"],"is_corresponding":false,"raw_author_name":"Mohamed Seifelnasr","raw_affiliation_strings":["Department of Computer Engineering, Helwan University, Cairo, Egypt"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Helwan University, Cairo, Egypt","institution_ids":["https://openalex.org/I84058292"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003235353","display_name":"Riham AlTawy","orcid":"https://orcid.org/0000-0002-4734-3700"},"institutions":[{"id":"https://openalex.org/I212119943","display_name":"University of Victoria","ror":"https://ror.org/04s5mat29","country_code":"CA","type":"education","lineage":["https://openalex.org/I212119943"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Riham AlTawy","raw_affiliation_strings":["University of Victoria, Victoria, BC, Canada"],"affiliations":[{"raw_affiliation_string":"University of Victoria, Victoria, BC, Canada","institution_ids":["https://openalex.org/I212119943"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5085765243","display_name":"Amr Youssef","orcid":"https://orcid.org/0000-0002-4284-8646"},"institutions":[{"id":"https://openalex.org/I60158472","display_name":"Concordia University","ror":"https://ror.org/0420zvk78","country_code":"CA","type":"education","lineage":["https://openalex.org/I60158472"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Amr Youssef","raw_affiliation_strings":["Concordia Institute for Information Systems Engineering, Montreal, QC, Canada","Concordia Institute for Information Systems Engineering (CIISE), Montreal, QC, Canada"],"affiliations":[{"raw_affiliation_string":"Concordia Institute for Information Systems Engineering, Montreal, QC, Canada","institution_ids":["https://openalex.org/I60158472"]},{"raw_affiliation_string":"Concordia Institute for Information Systems Engineering (CIISE), Montreal, QC, Canada","institution_ids":["https://openalex.org/I60158472"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5053669410"],"corresponding_institution_ids":["https://openalex.org/I60158472"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.36785988,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"13","issue":null,"first_page":"3193","last_page":"3208"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.8639000058174133,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.8639000058174133,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.05389999970793724,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.012000000104308128,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.6920999884605408},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.5853000283241272},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5497000217437744},{"id":"https://openalex.org/keywords/otway\u2013rees-protocol","display_name":"Otway\u2013Rees protocol","score":0.5429999828338623},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.5321000218391418},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.527899980545044},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.5174000263214111},{"id":"https://openalex.org/keywords/universal-composability","display_name":"Universal composability","score":0.46320000290870667},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.4309000074863434}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8191999793052673},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.6920999884605408},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.5853000283241272},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5515000224113464},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5497000217437744},{"id":"https://openalex.org/C35788789","wikidata":"https://www.wikidata.org/wiki/Q1320237","display_name":"Otway\u2013Rees protocol","level":5,"score":0.5429999828338623},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.5321000218391418},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.527899980545044},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.5174000263214111},{"id":"https://openalex.org/C165751822","wikidata":"https://www.wikidata.org/wiki/Q7894118","display_name":"Universal composability","level":4,"score":0.46320000290870667},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4578999876976013},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.4309000074863434},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4018000066280365},{"id":"https://openalex.org/C124086997","wikidata":"https://www.wikidata.org/wiki/Q4053131","display_name":"Wide Mouth Frog protocol","level":5,"score":0.39910000562667847},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.38119998574256897},{"id":"https://openalex.org/C131672422","wikidata":"https://www.wikidata.org/wiki/Q852594","display_name":"Provable security","level":3,"score":0.3772999942302704},{"id":"https://openalex.org/C53332860","wikidata":"https://www.wikidata.org/wiki/Q2632041","display_name":"Metaverse","level":3,"score":0.35569998621940613},{"id":"https://openalex.org/C2781221063","wikidata":"https://www.wikidata.org/wiki/Q6944186","display_name":"Mutual authentication","level":3,"score":0.3546000123023987},{"id":"https://openalex.org/C169796023","wikidata":"https://www.wikidata.org/wiki/Q3708936","display_name":"Direct Anonymous Attestation","level":3,"score":0.35359999537467957},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.34940001368522644},{"id":"https://openalex.org/C163339463","wikidata":"https://www.wikidata.org/wiki/Q484598","display_name":"CAPTCHA","level":2,"score":0.32170000672340393},{"id":"https://openalex.org/C207828512","wikidata":"https://www.wikidata.org/wiki/Q1060131","display_name":"Challenge-Handshake Authentication Protocol","level":4,"score":0.3212999999523163},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.3075999915599823},{"id":"https://openalex.org/C2776831232","wikidata":"https://www.wikidata.org/wiki/Q966812","display_name":"Trusted Computing","level":2,"score":0.29120001196861267},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.2702000141143799},{"id":"https://openalex.org/C76885553","wikidata":"https://www.wikidata.org/wiki/Q957589","display_name":"Tunneling protocol","level":4,"score":0.26170000433921814},{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.25450000166893005},{"id":"https://openalex.org/C20636137","wikidata":"https://www.wikidata.org/wiki/Q11163","display_name":"User Datagram Protocol","level":4,"score":0.25380000472068787},{"id":"https://openalex.org/C133112747","wikidata":"https://www.wikidata.org/wiki/Q7251931","display_name":"Protocol analysis","level":2,"score":0.25200000405311584}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tnse.2025.3628214","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnse.2025.3628214","pdf_url":null,"source":{"id":"https://openalex.org/S2484352698","display_name":"IEEE Transactions on Network Science and Engineering","issn_l":"2327-4697","issn":["2327-4697","2334-329X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network Science and Engineering","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320334593","display_name":"Natural Sciences and Engineering Research Council of Canada","ror":"https://ror.org/01h531d29"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":56,"referenced_works":["https://openalex.org/W1499934958","https://openalex.org/W1607519173","https://openalex.org/W2013613544","https://openalex.org/W2052267638","https://openalex.org/W2080317287","https://openalex.org/W2088097115","https://openalex.org/W2102922499","https://openalex.org/W2113446256","https://openalex.org/W2132303913","https://openalex.org/W2146652056","https://openalex.org/W2153281696","https://openalex.org/W2171294352","https://openalex.org/W2175661655","https://openalex.org/W2293895957","https://openalex.org/W2460674452","https://openalex.org/W2570008916","https://openalex.org/W2752178278","https://openalex.org/W2911540878","https://openalex.org/W2920323654","https://openalex.org/W3012345776","https://openalex.org/W3034976616","https://openalex.org/W3161415750","https://openalex.org/W3177048600","https://openalex.org/W3202149324","https://openalex.org/W3208834529","https://openalex.org/W4221160161","https://openalex.org/W4285818425","https://openalex.org/W4288784348","https://openalex.org/W4292826080","https://openalex.org/W4293168393","https://openalex.org/W4294643390","https://openalex.org/W4294811380","https://openalex.org/W4294891500","https://openalex.org/W4295788720","https://openalex.org/W4313888856","https://openalex.org/W4320525735","https://openalex.org/W4377235537","https://openalex.org/W4381786410","https://openalex.org/W4381946597","https://openalex.org/W4385324014","https://openalex.org/W4387026832","https://openalex.org/W4387132220","https://openalex.org/W4387412863","https://openalex.org/W4387412921","https://openalex.org/W4387870906","https://openalex.org/W4392449621","https://openalex.org/W4394712652","https://openalex.org/W4395027451","https://openalex.org/W4396214741","https://openalex.org/W4399407550","https://openalex.org/W4399939041","https://openalex.org/W4399939628","https://openalex.org/W4401692201","https://openalex.org/W4403826759","https://openalex.org/W4404112583","https://openalex.org/W4407691625"],"related_works":[],"abstract_inverted_index":{"Tremendous":[0],"attention":[1],"has":[2],"been":[3],"paid":[4],"by":[5,47],"researchers":[6],"and":[7,12,44,84,105,116,150,191],"developers":[8],"in":[9],"both":[10],"industry":[11],"academia":[13],"to":[14,81],"the":[15,20,26,38,51,55,93,119,139,151,155,158,162,186,189],"newly":[16],"emerging":[17],"network":[18],"paradigm,":[19],"Metaverse.":[21],"It":[22],"is":[23,123,130,164],"regarded":[24],"as":[25],"next":[27],"generation":[28],"of":[29,54,65,99,142,161],"fully":[30],"immersive":[31],"hyper-spatiotemporal":[32],"virtual":[33,39],"reality":[34],"Internet.":[35],"Users":[36],"traverse":[37],"world":[40],"through":[41,145],"head-mounted":[42],"devices":[43],"are":[45,102],"represented":[46],"avatars.":[48,67,120],"However,":[49],"with":[50,86,194],"rapid":[52],"adoption":[53],"metaverse,":[56],"many":[57],"security":[58,140],"concerns":[59],"have":[60],"emerged,":[61],"particularly":[62],"after":[63],"reports":[64],"misbehaving":[66,91,100],"In":[68],"this":[69],"paper,":[70],"we":[71,184],"propose":[72],"a":[73,126,131,169],"secure":[74],"mutual":[75],"authentication":[76],"protocol":[77,94,112,122,144,190,205],"that":[78,203],"allows":[79,95],"avatars":[80,101],"securely":[82],"authenticate":[83],"communicate":[85],"each":[87],"other.":[88],"To":[89],"mitigate":[90],"incidents,":[92],"traceability;":[96],"hence,":[97],"users":[98],"recognized,":[103],"reported,":[104],"held":[106],"accountable":[107],"for":[108,118,188],"their":[109],"actions.":[110],"The":[111,121],"also":[113],"provides":[114],"unlinkability":[115],"anonymity":[117],"based":[124],"on":[125],"hierarchical":[127],"T/key,":[128],"which":[129],"time-based":[132],"one-time":[133],"password":[134],"system.":[135],"We":[136],"formally":[137],"prove":[138],"properties":[141],"our":[143,204],"theoretical":[146],"analysis,":[147],"BAN":[148],"logic,":[149],"AVISPA":[152],"tool.":[153],"On":[154],"other":[156,195,207],"hand,":[157],"computational":[159],"complexity":[160],"verifier":[163],"one":[165],"hash":[166],"operation.":[167],"Using":[168],"Raspberry":[170],"Pi":[171],"4":[172],"Model":[173],"B/8":[174],"G/Broadcom-BCM2711,":[175],"Quad-core,":[176],"Cortex-A72-1.5":[177],"GHz":[178],"(ARM":[179],"v8)":[180],"64-bit":[181],"SoC":[182],"processor,":[183],"computed":[185],"runtime":[187],"compared":[192],"it":[193],"recently":[196,208],"proposed":[197,209],"protocols.":[198],"Our":[199],"comparative":[200],"evaluation":[201],"shows":[202],"outperforms":[206],"schemes.":[210]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-11-03T00:00:00"}
