Security, Privacy and Safety Risk Assessment for Virtual Reality Learning Environment Applications

by   Aniket Gulhane, et al.

Social Virtual Reality based Learning Environments (VRLEs) such as vSocial render instructional content in a three-dimensional immersive computer experience for training youth with learning impediments. There are limited prior works that explored attack vulnerability in VR technology, and hence there is a need for systematic frameworks to quantify risks corresponding to security, privacy, and safety (SPS) threats. The SPS threats can adversely impact the educational user experience and hinder delivery of VRLE content. In this paper, we propose a novel risk assessment framework that utilizes attack trees to calculate a risk score for varied VRLE threats with rate and duration of threats as inputs. We compare the impact of a well-constructed attack tree with an adhoc attack tree to study the trade-offs between overheads in managing attack trees, and the cost of risk mitigation when vulnerabilities are identified. We use a vSocial VRLE testbed in a case study to showcase the effectiveness of our framework and demonstrate how a suitable attack tree formalism can result in a more safer, privacy-preserving and secure VRLE system.


page 1

page 4

page 5

page 7

page 8


Attack Trees for Security and Privacy in Social Virtual Reality Learning Environments

Social Virtual Reality Learning Environment (VRLE) is a novel edge compu...

SoK: A Framework for Unifying At-Risk User Research

At-risk users are people who experience elevated digital security, priva...

Rule-based Adaptations to Control Cybersickness in Social Virtual Reality Learning Environments

Social virtual reality learning environments (VRLEs) provide immersive e...

Risk Assessment Graphs: Utilizing Attack Graphs for Risk Assessment

Risk assessment plays a crucial role in ensuring the security and resili...

SoK: Data Privacy in Virtual Reality

The adoption of virtual reality (VR) technologies has rapidly gained mom...

PSP Framework: A novel risk assessment method in compliance with ISO/SAE-21434

As more cars connect to the internet and other devices, the automotive m...

Identifying and Modeling Security Threats for IoMT Edge Network using Markov Chain and Common Vulnerability Scoring System (CVSS)

In this work, we defined an attack vector for networks utilizing the Int...

Please sign up or login with your details

Forgot password? Click here to reset