The Metaverse is the digitization of the real world, supported by big data, AI, 5G, cloud computing, blockchain, encryption algorithm, perception technology, digital twin, virtual engine and other technologies that interact with human behaviour and thoughts in avatars through digital identity. Cracking the trust problem brought by the avatar depends on the privacy security and authentication technology for individuals using digital identities to enter the Metaverse. To accomplish personal domination of the avatar, metaverse users need privacy data feeding and emotion projection. They must be equipped with proprietary algorithms to process and analyze the complex data generated in adaptive interactions, which challenges the privacy security of user data in the Metaverse. Distinguishing the significance of different identifiers in personal identity generation while imposing different behavioural regulatory requirements on data processing levels may better balance the relationship between personal privacy security and digital identity protection and data utilization in the Metaverse. In response to digital identity issues, there is an objective need to establish a unified digital identity authentication system to gain the general trust of society. Further, the remedies for a right to personality can be applied to the scenario of unlawful infringement of digital identity and privacy security.
{"title":"Digital Identity, Privacy Security and their Legal Safeguards in the Metaverse","authors":"Wenxiang Zhang, Hong Wu","doi":"10.1051/sands/2023011","DOIUrl":"https://doi.org/10.1051/sands/2023011","url":null,"abstract":"The Metaverse is the digitization of the real world, supported by big data, AI, 5G, cloud computing, blockchain, encryption algorithm, perception technology, digital twin, virtual engine and other technologies that interact with human behaviour and thoughts in avatars through digital identity. Cracking the trust problem brought by the avatar depends on the privacy security and authentication technology for individuals using digital identities to enter the Metaverse. To accomplish personal domination of the avatar, metaverse users need privacy data feeding and emotion projection. They must be equipped with proprietary algorithms to process and analyze the complex data generated in adaptive interactions, which challenges the privacy security of user data in the Metaverse. Distinguishing the significance of different identifiers in personal identity generation while imposing different behavioural regulatory requirements on data processing levels may better balance the relationship between personal privacy security and digital identity protection and data utilization in the Metaverse. In response to digital identity issues, there is an objective need to establish a unified digital identity authentication system to gain the general trust of society. Further, the remedies for a right to personality can be applied to the scenario of unlawful infringement of digital identity and privacy security.","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"159 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74301775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This work take a comprehensive look at the security issues that may be faced in an emerging field, "Metaverse". Starting from the physical construction basis of “Metaverse”, I firstly give a general introduction to the possible security issues faced by “Metaverse” in the areas of hardware, software, system, platform, etc., then discuss the specific security issues in terms of endogenous and technical support, and finally conclude from the perspectives of technology, regulation and discourse.
{"title":"The Security Challenges of The \"Metaverse\"","authors":"Shiya Liu","doi":"10.1051/sands/2023010","DOIUrl":"https://doi.org/10.1051/sands/2023010","url":null,"abstract":"This work take a comprehensive look at the security issues that may be faced in an emerging field, \"Metaverse\". Starting from the physical construction basis of “Metaverse”, I firstly give a general introduction to the possible security issues faced by “Metaverse” in the areas of hardware, software, system, platform, etc., then discuss the specific security issues in terms of endogenous and technical support, and finally conclude from the perspectives of technology, regulation and discourse.\u0000","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"53 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76283008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Since last year, the Metaverse concept has incredibly become a hot topic from both industrial and societal perspectives pushed by various parties and factors. Meanwhile, the phenomenal growth of information technologies such as Web3.0, DAO, StarLink, AIGC, etc. has also attracted great attention from both industry and academia. Although worth exploring, they are somewhat exacerbated by the hype of speculative capital. If we break free from the switching hot topics and calm our mind down, we will find a problem that China often lacks its own discourse system in spite of its arrival as a major tech power. We tend to “follow the crowd”. As a latecomer in information technology, the key to harnessing China’s “latecomer’s advantage” lies in getting rid of “path dependence” which is all about establishing an independent knowledge system and discourse system as well as setting up a “Chinese school” in the information field.
{"title":"Constructing China’s Independent Knowledge System in the Digital Era","authors":"Hong Zou","doi":"10.1051/sands/2023008","DOIUrl":"https://doi.org/10.1051/sands/2023008","url":null,"abstract":"Since last year, the Metaverse concept has incredibly become a hot topic from both industrial and societal perspectives pushed by various parties and factors. Meanwhile, the phenomenal growth of information technologies such as Web3.0, DAO, StarLink, AIGC, etc. has also attracted great attention from both industry and academia. Although worth exploring, they are somewhat exacerbated by the hype of speculative capital. If we break free from the switching hot topics and calm our mind down, we will find a problem that China often lacks its own discourse system in spite of its arrival as a major tech power. We tend to “follow the crowd”. As a latecomer in information technology, the key to harnessing China’s “latecomer’s advantage” lies in getting rid of “path dependence” which is all about establishing an independent knowledge system and discourse system as well as setting up a “Chinese school” in the information field.","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"58 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73659378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The development of Internet has further expanded people's social scope. Digital identity has been widely used. In social networks, the use of anonumity or pseudonym heightens the charm of the network. Nevertherless, when online payments, online transactions and online assets began to enter the Internet, the negative impact of virtualization ahas gradually emerged. As an individual's maker in Metaverse, digital identity may become a key factor to balance the association between anonymity and pseudonym. To sort out the current situation and possibility of the use of digital identity, this paper takes the appliction of digital identity in metaverse, and uses the "Enterprise IA" miniature model of Morey et al. . We analyzed the focus of the current debate on digital identity, hoping to reflect on the new problems on the basis of exploring the application rules of digital identity. The article belived that the nature of the metaverse is the digitalization of the physical word. Futhermore, the fundamental issue of digital identity is still the issue of power ownership. With the help of blockchain, privacy filter and other technologies, we can not only change the governance logic and methods, but also balance the correlation between private rights and public interests. We can explore new governance approaches to deal with the growing identity trust crisis, individual competition for identity authorization rights, and privacy problems in Metaverse.
{"title":"A review of the application of digital identity in the metaverse","authors":"Siwen Wang, Wei Wang","doi":"10.1051/sands/2023009","DOIUrl":"https://doi.org/10.1051/sands/2023009","url":null,"abstract":"The development of Internet has further expanded people's social scope. Digital identity has been widely used. In social networks, the use of anonumity or pseudonym heightens the charm of the network. Nevertherless, when online payments, online transactions and online assets began to enter the Internet, the negative impact of virtualization ahas gradually emerged. As an individual's maker in Metaverse, digital identity may become a key factor to balance the association between anonymity and pseudonym. To sort out the current situation and possibility of the use of digital identity, this paper takes the appliction of digital identity in metaverse, and uses the \"Enterprise IA\" miniature model of Morey et al. . We analyzed the focus of the current debate on digital identity, hoping to reflect on the new problems on the basis of exploring the application rules of digital identity. The article belived that the nature of the metaverse is the digitalization of the physical word. Futhermore, the fundamental issue of digital identity is still the issue of power ownership. With the help of blockchain, privacy filter and other technologies, we can not only change the governance logic and methods, but also balance the correlation between private rights and public interests. We can explore new governance approaches to deal with the growing identity trust crisis, individual competition for identity authorization rights, and privacy problems in Metaverse.","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"25 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86864510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Recent advances in deep learning have led to disruptive breakthroughs in artificial intelligence (AI), fueling the jump in ChatGPT-like Large Language Models (LLMs). As with any emerging technology, it is a two-sided coin, bringing not only vast social impacts but also significant security concerns, especially in the socio-cognitive domain. Against this background, this work starts with an inherent mechanism analysis of cognitive domain games, from which it proceeds to explore the security concerns facing the cognitive domain as well as to analyze the formation mechanisms of a cognitive immune system. Finally, inspired by the behavioral mimicry in biology, this work will elaborate on new approaches to cognitive security from three aspects: Mimicry Computing, Mimicry Defense and Mimicry Intelligence.
{"title":"On Challenges of AI to Cognitive Security and Safety","authors":"Ruiyang Huang, Xiaoqing Zheng, Yuting Shang, Xiangyang Xue","doi":"10.1051/sands/2023012","DOIUrl":"https://doi.org/10.1051/sands/2023012","url":null,"abstract":"Recent advances in deep learning have led to disruptive breakthroughs in artificial intelligence (AI), fueling the jump in ChatGPT-like Large Language Models (LLMs). As with any emerging technology, it is a two-sided coin, bringing not only vast social impacts but also significant security concerns, especially in the socio-cognitive domain. Against this background, this work starts with an inherent mechanism analysis of cognitive domain games, from which it proceeds to explore the security concerns facing the cognitive domain as well as to analyze the formation mechanisms of a cognitive immune system. Finally, inspired by the behavioral mimicry in biology, this work will elaborate on new approaches to cognitive security from three aspects: Mimicry Computing, Mimicry Defense and Mimicry Intelligence.","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"9 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85866469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Non fungible token (NFT) emerges with the marvelous explosion of the Metaverse. NFT digital products are profoundly impacting the existing copyright system, which needs to be amended and responded in time. There is a possibility that it would completely change the distribution pattern of rights and interests in the field of copyright law. Currently, the legal nature of the casting and trading of NFT digital products still remains controversial. The liability of NFT digital product creators as well as service platforms is required to be further identified accordingly. this article starts with the analysis of the right attributes of NFT digital products based on intellectual property law. Subsequently, the related legal issues and countermeasures are discussed, including the exhaustion of the right-holders, the duty of care of the platform, and the assumption of tort liability arising from the transaction. It is suggested that the NFT digital products should be treated with considerable caution and the legal system of NFT digital products should be constructed in the near future.
{"title":"Copyright Protection on NFT Digital Works in the Metaverse","authors":"Yupeng Dong, Chunhui Wang","doi":"10.1051/sands/2023013","DOIUrl":"https://doi.org/10.1051/sands/2023013","url":null,"abstract":"Non fungible token (NFT) emerges with the marvelous explosion of the Metaverse. NFT digital products are profoundly impacting the existing copyright system, which needs to be amended and responded in time. There is a possibility that it would completely change the distribution pattern of rights and interests in the field of copyright law. Currently, the legal nature of the casting and trading of NFT digital products still remains controversial. The liability of NFT digital product creators as well as service platforms is required to be further identified accordingly. this article starts with the analysis of the right attributes of NFT digital products based on intellectual property law. Subsequently, the related legal issues and countermeasures are discussed, including the exhaustion of the right-holders, the duty of care of the platform, and the assumption of tort liability arising from the transaction. It is suggested that the NFT digital products should be treated with considerable caution and the legal system of NFT digital products should be constructed in the near future.","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"66 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86106003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Metaverse is a significant field that is currently receiving considerable attention from both industry and academia. The transformation of the metaverse from science fiction to reality is actively promoted by technology, industry, and capital. However, metaverse development is still in its early stages. The system architecture and theoretical technology of the metaverse are not yet mature. This paper provides a comprehensive analysis of the metaverse and summarizes its holographic, omnipotent, multidimensional, and multifaceted characteristics. Development of the metaverse is founded on the pertinent infrastructure. We elaborate on the primary components of the metaverse infrastructure and summarize the security risks inherent in the metaverse infrastructure in a systematic manner. On this basis, we propose to utilize the system security technology concept as a guide to build a metaverse security protection system from various perspectives at each level of computing,cloud, network, digital assets, and terminals in order to construct a secure foundation for addressing the metaverse security risks and challenges.
{"title":"Towards building a firm metaverse security base","authors":"Anmin Li, Xiaohui Yao, Haiying Gu, Yungeng Zhang, Yuan Chang","doi":"10.1051/sands/2023005","DOIUrl":"https://doi.org/10.1051/sands/2023005","url":null,"abstract":"Metaverse is a significant field that is currently receiving considerable attention from both industry and academia. The transformation of the metaverse from science fiction to reality is actively promoted by technology, industry, and capital. However, metaverse development is still in its early stages. The system architecture and theoretical technology of the metaverse are not yet mature. This paper provides a comprehensive analysis of the metaverse and summarizes its holographic, omnipotent, multidimensional, and multifaceted characteristics. Development of the metaverse is founded on the pertinent infrastructure.\u0000We elaborate on the primary components of the metaverse infrastructure and summarize the security risks inherent in the metaverse infrastructure in a systematic manner. On this basis, we propose to utilize the system security technology concept as a guide to build a metaverse security protection system from various perspectives at each level of computing,cloud, network, digital assets, and terminals in order to construct a secure foundation for addressing the metaverse security risks and challenges.","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"27 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72568932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we propose a conjecture that endogenous security without any prior knowledge is similar to perfect secrecy without any prior knowledge. To prove the conjecture, we first establish a cryptography model of instinct function security to transform the security problem in the network domain into an encryption problem in the cryptographic domain. Then, we inherit and apply the established ideas and means of Perfect Secrecy, and propose the concept, definition and corollaries of the perfect instinct function security (PIFS) corresponding to Perfect Secrecy. Furthermore, we take the DHR system as a concrete implementation of PIFS and propose the DHR Perfect Security Theorem corresponding to Shannon’s Perfect Secrecy Theorem. Finally, we prove that the DHR satisfying the “One-Time Reconstruction” constraint is the sufficient and necessary condition to achieve perfect security. This means that the existence of PIFS is also proven. The analysis shows that any reconfigurable system can be encrypted by its construct and that the PIFS converts the one-way transparent superiority of the attacker into a double-blind problem for both the attacker and the defender, which leads to that the attacker is impossible to obtain useful construction information from the attacks and unable to find a better way than blind trial-and-error or brute-force attacks. Since the attackers are required to have the new powerful ability to crack the structure cryptogram, the threshold of cyber security is raised to at least the same level as cryptogram deciphering, thereafter the ubiquitous cyber threats are destined to be significantly reduced.
{"title":"From Perfect Secrecy to Perfect Safety & Security: Cryptography-Based Analysis of Endogenous Security","authors":"Liang Jin, Xiaoyan Hu, Jiangxing Wu","doi":"10.1051/sands/2023004","DOIUrl":"https://doi.org/10.1051/sands/2023004","url":null,"abstract":"In this paper, we propose a conjecture that endogenous security without any prior knowledge is similar to perfect secrecy without any prior knowledge. To prove the conjecture, we first establish a cryptography model of instinct function security to transform the security problem in the network domain into an encryption problem in the cryptographic domain. Then, we inherit and apply the established ideas and means of Perfect Secrecy, and propose the concept, definition and corollaries of the perfect instinct function security (PIFS) corresponding to Perfect Secrecy. Furthermore, we take the DHR system as a concrete implementation of PIFS and propose the DHR Perfect Security Theorem corresponding to Shannon’s Perfect Secrecy Theorem. Finally, we prove that the DHR satisfying the “One-Time Reconstruction” constraint is the sufficient and necessary condition to achieve perfect security. This means that the existence of PIFS is also proven. The analysis shows that any reconfigurable system can be encrypted by its construct and that the PIFS converts the one-way transparent superiority of the attacker into a double-blind problem for both the attacker and the defender, which leads to that the attacker is impossible to obtain useful construction information from the attacks and unable to find a better way than blind trial-and-error or brute-force attacks. Since the attackers are required to have the new powerful ability to crack the structure cryptogram, the threshold of cyber security is raised to at least the same level as cryptogram deciphering, thereafter the ubiquitous cyber threats are destined to be significantly reduced.","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"5 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84855480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The existing theory and techniques of wireless communication anti-jamming have reached their performance limit recently. With this focus, by leveraging the inherent characteristics of wireless communication and referring to the principle of cyberspace endogenous security, this paper investigates the core issues of endogenous security in the electromagnetic space, namely, endogenous anti-jamming (EAJ), which can defend against the unknown electromagnetic attacks effectively. Specifically, the subspace method is first adopted to establish the unified framework for the conventional spread-spectrum, intelligent, and endogenous anti-jamming, in which both the intrinsic development law of each technique and the internal logic between them are revealed. Then, the fundamental concept, key techniques, and development suggestions of wireless communication "N+1 dimensionality" endogenous anti-jamming are proposed to seek a disruptive breakthrough.
{"title":"Wireless Communications \"N + 1 dimensionality\" Endogenous Anti-Jamming: Theory and Techniques","authors":"Yonggang Zhu, F. Yao, Yifu Sun, Wenlong Guo","doi":"10.1051/sands/2023003","DOIUrl":"https://doi.org/10.1051/sands/2023003","url":null,"abstract":"The existing theory and techniques of wireless communication anti-jamming have reached their performance limit recently. With this focus, by leveraging the inherent characteristics of wireless communication and referring to the principle of cyberspace endogenous security, this paper investigates the core issues of endogenous security in the electromagnetic space, namely, endogenous anti-jamming (EAJ), which can defend against the unknown electromagnetic attacks effectively. Specifically, the subspace method is first adopted to establish the unified framework for the conventional spread-spectrum, intelligent, and endogenous anti-jamming, in which both the intrinsic development law of each technique and the internal logic between them are revealed. Then, the fundamental concept, key techniques, and development suggestions of wireless communication \"N+1 dimensionality\" endogenous anti-jamming are proposed to seek a disruptive breakthrough.","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"4007 3 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86696685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the metaverse being the development direction of the next generation Internet, the popularity of intelligent devices and the maturity of various emerging technologies, more and more intelligent devices try to connect to the Internet, which poses a major threat to the management and security protection of network equipment. At present, the mainstream method of network equipment identification in the metaverse is to obtain the network traffic data generated in the process of device communication, extract the device features through analysis and processing, and identify the device based on a variety of learning algorithms. Such methods often require manual participation, and it is difficult to capture the small differences between similar devices, leading to identification errors. Therefore, we propose a deep learning device recognition method based on spatial attention mechanism. Firstly, we extract the required feature fields from the acquired network traffic data. Then, Then, we normalize the data and convert it into grayscale images. After that, we add spatial attention mechanism to CNN and MLP respectively to increase the difference between similar network devices and further improve the recognition accuracy. Finally, we identify device based on the deep learning model. A large number of experiments were carried out on 31 types of network devices such as web cameras, wireless routers and smartwatches. The results show that the accuracy of the proposed recognition method based on spatial attention mechanism is increased by 0.8% and 2.0%, respectively, compared with the recognition method based only on deep learning model under the CNN and MLP models. The method proposed in this paper is significantly superior to the existing method of device type recognition based only on deep learning model.
{"title":"An accurate identification method for network devices based on spatial attention mechanism","authors":"Xiuting Wang, Ruixiang Li, Shaoyong Du, X. Luo","doi":"10.1051/sands/2023002","DOIUrl":"https://doi.org/10.1051/sands/2023002","url":null,"abstract":"With the metaverse being the development direction of the next generation Internet, the popularity of intelligent devices and the maturity of various emerging technologies, more and more intelligent devices try to connect to the Internet, which poses a major threat to the management and security protection of network equipment. At present, the mainstream method of network equipment identification in the metaverse is to obtain the network traffic data generated in the process of device communication, extract the device features through analysis and processing, and identify the device based on a variety of learning algorithms. Such methods often require manual participation, and it is difficult to capture the small differences between similar devices, leading to identification errors. Therefore, we propose a deep learning device recognition method based on spatial attention mechanism. Firstly, we extract the required feature fields from the acquired network traffic data. Then, Then, we normalize the data and convert it into grayscale images. After that, we add spatial attention mechanism to CNN and MLP respectively to increase the difference between similar network devices and further improve the recognition accuracy. Finally, we identify device based on the deep learning model. A large number of experiments were carried out on 31 types of network devices such as web cameras, wireless routers and smartwatches. The results show that the accuracy of the proposed recognition method based on spatial attention mechanism is increased by 0.8% and 2.0%, respectively, compared with the recognition method based only on deep learning model under the CNN and MLP models. The method proposed in this paper is significantly superior to the existing method of device type recognition based only on deep learning model.","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"11 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86237774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}