Open Access iconOpen Access

ARTICLE

Unleashing the Potential of Metaverse in Social IoV: An Authentication Protocol Based on Blockchain

Tsu-Yang Wu1,2,3, Haozhi Wu3, Maoxin Tang1,2, Saru Kumari4, Chien-Ming Chen1,2,*

1 School of Artificial Intelligence, Nanjing University of Information Science & Technology, Nanjing, 210044, China
2 Jiangsu Provincial Key Laboratory of Culture and Tourism for Research on the Application Technology of Metaverse Cultural Tourism Scenarios (Nanjing University of Information Science and Technology), Nanjing, 210044, China
3 College of Computer Science and Engineering, Shandong University of Science and Technology, Qingdao, 266590, China
4 Department of Mathematics, Chaudhary Charan Singh University, Meerut, 250004, India

* Corresponding Author: Chien-Ming Chen. Email: email

Computers, Materials & Continua 2025, 84(2), 3175-3192. https://doi.org/10.32604/cmc.2025.065717

Abstract

As a model for the next generation of the Internet, the metaverse—a fully immersive, hyper-temporal virtual shared space—is transitioning from imagination to reality. At present, the metaverse has been widely applied in a variety of fields, including education, social entertainment, Internet of vehicles (IoV), healthcare, and virtual tours. In IoVs, researchers primarily focus on using the metaverse to improve the traffic safety of vehicles, while paying limited attention to passengers’ social needs. At the same time, Social Internet of Vehicles (SIoV) introduces the concept of social networks in IoV to provide better resources and services for users. However, the problem of single interaction between SIoV and users has become increasingly prominent. In this paper, we first introduce a SIoV environment combined with the metaverse. In this environment, we adopt blockchain as the platform of the metaverse to provide a decentralized environment. Concerning passengers’ social data may contain sensitive/private information, we then design an authentication and key agreement protocol called MSIoV-AKA to protect the communications. Through formal security verifications in the real-or-random (ROR) model and using the AVISPA (Automated Validation of Internet Security Protocols and Applications) tool, we firmly verify the security of the protocol. Finally, detailed comparisons are made between our protocol and robust protocols/schemes in terms of computational cost and communication cost. In addition, we implement the MSIoV-AKA protocol in the Ethereum test network and Hyperledger Sawtooth to show the practicality.

Keywords

Authentication; key agreement; SIoV; metaverse; blockchain

Cite This Article

APA Style
Wu, T., Wu, H., Tang, M., Kumari, S., Chen, C. (2025). Unleashing the Potential of Metaverse in Social IoV: An Authentication Protocol Based on Blockchain. Computers, Materials & Continua, 84(2), 3175–3192. https://doi.org/10.32604/cmc.2025.065717
Vancouver Style
Wu T, Wu H, Tang M, Kumari S, Chen C. Unleashing the Potential of Metaverse in Social IoV: An Authentication Protocol Based on Blockchain. Comput Mater Contin. 2025;84(2):3175–3192. https://doi.org/10.32604/cmc.2025.065717
IEEE Style
T. Wu, H. Wu, M. Tang, S. Kumari, and C. Chen, “Unleashing the Potential of Metaverse in Social IoV: An Authentication Protocol Based on Blockchain,” Comput. Mater. Contin., vol. 84, no. 2, pp. 3175–3192, 2025. https://doi.org/10.32604/cmc.2025.065717



cc Copyright © 2025 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 300

    View

  • 102

    Download

  • 0

    Like

Share Link