Introduction
The word Metaverse was coined in the science-fiction novel Snow Crash [1] to describe a virtual reality society in which people utilize digital avatars to symbolize themselves and experience the world. In recent years, Metaverse has received attention from academia and industries as a novel Internet application due to the advancement of Augmented Reality (AR), Virtual Reality (VR), Artificial Intelligence (AI), and Blockchain. Specifically, extending reality (AR/VR) and AI technologies can provide users with immersive experiences and facilitate continuous data synchronization from the physical domain to the virtual domain, which is supported by data perceived by edge devices and services driven in Metaverse. Blockchain can help the physical and virtual domains to share information and construct economic systems in a decentralized manner. Thus, the Metaverse can be viewed as the integration of multiple technologies supported by massive data interactions between the physical and virtual domains.
One of the significant advantages of Metaverse is that people can conduct experiments in the virtual world that cannot be conducted in the real world. Because the virtual world can be created based on real-world data, e.g., images, sensing data, and text, the experimental result in Metaverse can be used to guide the real world. One example is the virtual transportation networks [2], i.e., virtual environments in which users can safely train automatic driving algorithms and test vehicles. To build such virtual environments, virtual service providers (VSPs) can leverage network edge devices to capture images from the real world and then render the virtual objects. However, this process entails three challenges as follows:
How to use the data collected from the real world, e.g., images, to achieve fast virtual world building?
How to improve the efficiency of data transmission to facilitate interactions of the physical and virtual domains?
How to ensure the security of the data received by VSP to ensure that the virtual world can be accurately synchronized with the real world?
Since virtual transportation networks require extensive interactions between the physical domain and Metaverse, edge devices can be utilized to capture images of geographical landmarks. However, converting these captured images into a consistent style for the virtual world is complicated. In several virtual service designs, VSPs need to hire digital painters to pre-process images [3], which is time-consuming and costly. The boom in AI has brought alternative solutions. AI-generated content (AIGC) technology [4] allows VSP to process quickly images collected from the real world using well-trained AI models (For D1). However, the collected data could still burden the network. For example, the authors in [5] state that a pair of sensing devices can generate 3.072 megabytes of data per second, which challenges conventional communication systems. Fortunately, semantic communication [6] is introduced to filter out irrelevant information from edge devices to reduce information redundancy of VSPs by extracting semantic data from raw data and expressing desired meanings (For D2). With the help of semantic communications, massive amounts of data can be circulated in the virtual transportation networks to empower Metaverse services. The integration of blockchain and semantic communication can enable more efficient and secure exchange of semantic information among unknown Metaverse participants in a decentralized manner. Semantic communication allows participants to exchange and process extracted semantic information to reduce communication overheads and storage spaces required for large amounts of data, while blockchain can construct trust among anonymous participants and share semantic information to prevent semantic information manipulations and false modifications from attackers or third parties.
However, the integration of semantic communication and blockchain is challenged by higher requirements of data security. Efficient semantic data sharing is achieved between unknown VSPs and edge devices deployed in untrusted environments via blockchain, before being uploaded to blockchain, while the extracted semantic data can be tampered to almost the same descriptors (semantic similarities) but different desired meanings. The attacker (edge device) can modify the pixels of a sunflower to make it similar to the extracted semantic data (snowy mountain) in terms of semantic similarities but visually dissimilar [7]. Then semantic data recorded on blockchain is useless, which affects the output of the AIGC models and is difficult for VSPs to detect the difference between the adversarial and authentic semantic data. Moreover, it is hard to detect and prevent semantic data mutations for virtual transportation networks in Metaverse. Since VSPs and edge devices are distributed, it is difficult to record, trace, and verify data transformations. To solve the aforementioned problems, the blockchain and Zero-Knowledge Proof techniques can be used (For D3). Thus, we present a blockchain-aided semantic communication framework with AIGC services to achieve virtual transportation networks in Metaverse. Here, blockchain-aided semantic communication can facilitate data circulation and economic activities between VSPs and edge devices in a decentralized manner [8]. Targeted semantic attacks [7] are utilized to generate adversarial semantic data to improve their semantic similarities almost up to that of the extracted semantic data by training various loss functions. Zero-Knowledge Proof (ZKP) [9] is integrated into the proposed framework to process semantic data and securely guarantee correct transformations. The contributions of this paper are summarized as follows:
We propose a blockchain-aided semantic communication framework for AIGC in virtual transportation networks that ensures the authenticity of semantic data transmitted from edge devices to VSPs to facilitate interactions of the physical and virtual domains.
We illustrate how a training-based targeted semantic attack scheme generates adversarial semantic data (images) without revealing the authentic semantic data. The attack semantic data has almost the same semantic similarities as the authentic ones but is visually dissimilar to them.
We, for the first time, design a blockchain and zero-knowledge proof-based semantic defense scheme to assure the authentication of semantic data. The scheme can utilize zero-knowledge proof to record the transformations of semantic data, and use blockchain to track and verify semantic data mutations.
The rest of this article is described as follows. Section II reviews previous works on secure semantic communication. Section III demonstrates a blockchain-aided semantic communication framework for AIGC in Metaverse. Section IV illustrates a training-based targeted semantic attack scheme. Section V designs a blockchain and zero-knowledge proof-based semantic defense scheme. The proposed mechanisms are evaluated in Section VI. Section VII concludes the paper and elaborates the future work.
RELATED WORK
In this paper, we consider the integration of blockchain-aided semantic communications for Metaverse, which involves multiple emerging technologies. Therefore, we divide the related work into three parts: Blockchain-aided Semantic Communications, Semantic Attacks, and Semantic Defenses.
A. Blockchain-Aided Semantic Communications
Semantic communication [6] can lighten virtual transportation network burdens by transmitting relevant semantic data to VSPs after processing original data by AI technologies in edge devices. Z. Weng et al. [10] utilized deep learning (DL) to identify the essential speech information with higher weights for semantic communication in dynamic channel conditions. To enable edge devices to perform DL-based semantic communication tasks, H. Xie et al. [11] proposed a lite-distributed semantic communication framework for edge devices to transmit low-complexity texts by optimizing training processes.
Although semantic communication can help Metaverse reduce information redundancy, it can not handle the challenge that how to construct trust among unknown edge devices and VSPs to facilitate data sharing and economic activities. Blockchain [12] is a peer-to-peer network that can construct decentralized ledgers for participants to share data. The integration of blockchain and AI-based semantic communication can empower Metaverse ecosystems to carry out rich activities between the physical and virtual domains [13]. Y. Lin et al. [8] proposed a unified blockchain-semantic framework to enable Web 3.0 services to implement on-chain and off-chain interactions. A proof of semantic mechanism is proposed to verify semantic data before adding it to blockchain. However, they do not mention the performance indicators of semantic data. Y. Lin et al. [14] proposed a blockchain-based semantic exchange framework that can mint Non-Fungible Tokens (NFT) for semantic data, utilize the game theory to facilitate exchange, and introduce ZKP to enable privacy-preserving. However, they do not consider semantic attacks that may reduce exchange efficiency.
B. Semantic Attacks and Defenses
The introduction of semantic communication brings about security issues for Metaverse. However, current research on the security of semantic communication is still in its infancy. Q. Hu et al. [15] analyzed semantic noise that causes semantic data to express misleading meanings. To reduce the effects caused by semantic noise, they added weight perturbation to adversarial training processes, suppressed noise-related and task-unrelated features, and designed semantic similarity-based loss functions to reduce transmitting overheads. X. Luo et al. [16] focused on privacy leakages when sharing background knowledge. They introduced symmetric encryption to adversarial training processes to encrypt and decrypt semantic data to ensure confidentiality. H. Du et al. [7] focused on the semantic Internet-of Things (SIoT) and proposed new performance indicators for SIoT to quantify security issues, including semantic secrecy outage probability and detection failure probability. They focused on image transmission-oriented semantic communication and divided semantic attacks into targeted and untargeted semantic attacks. The targeted attack can generate adversarial semantic data (images) that can be recovered to a given target requested by receivers. The adversarial semantic data has almost the same descriptors (semantic similarities), but is visually dissimilar [17]. The untargeted semantic attack can generate adversarial semantic data that minimizes semantic similarities. They do not pursue to be recovered to any target by receivers.
In this paper, we study the targeted semantic attacks and introduce ZKP to differ in semantic similarities between the adversarial and target images to protect semantic data. ZKP has been widely used in blockchain to enable privacy-preserving and authenticity. R. Song et al. [9] utilized NFT and ZKP to construct a traceable data exchange scheme in blockchain, which can protect data privacy and exchange fairness. Z. Wang et al. [18] designed a ZKP-based off-chain data feed scheme to take in off-chain sensitive data to execute the business logic of smart contract-based applications. H. Galal et al. [19] leveraged ZKP and smart contracts to hide details of NFTs and swap NFTs in a fair manner. Y. Fang et al. [20] utilized ZKP to verify the authenticity of model prediction processes without leasing private parameters of deep learning models. However, the above methods do not consider how to use ZKP to prevent targeted semantic attacks to detect adversarial semantic data.
C. Artificial Intelligence Generated Content
AIGC refers to the use of AI algorithms, natural language processing (NLP), and computer version (CV) methods to produce a variety of media forms, including text, images, and audio. In terms of text content generation, an epoch-making AIGC application is the ChatGPT, a conversational language model developed by OpenAI [21]. ChatGPT is a type of the Generative Pre-trained Transformer (GPT) model that is trained on a huge amount of conversational data. ChatGPT is able to generate text that sounds as if it were written by a human. This makes it helpful for a variety of purposes, including chatbots, virtual assistants, and language translation. For image generation, diffusion model [22], a new class of state-of-the-art generative models, have demonstrated exceptional performance in Image Generation tasks and have surpassed the performance of generative adversarial networks (GANs) [23] in numerous tasks. Stable Diffusion, an AIGC model that is released by Stability AI, is an open-source text-to-image generator that creates amazing artwork in a matter of seconds. It operates with unprecedented speed and quality on consumer-grade GPUs. Furthermore, AIGC techniques continue to advance in the field of audio generation. The authors in [24] propose a deep learning-based method that employs contrastive representation learning and clustering to automatically derive thematic information from music pieces in the training data. The simulation results show that the proposed model is capable of generating polyphonic pop piano music with repetition and plausible variations.
One of the primary benefits of AIGC is that it can be produced at a number and speed that would be difficult for human beings to do alone. It also permits a great degree of consistency and precision. Therefore, the development of AIGC technologies can provide a strong boost to the evolution of the Internet. Notably, despite the potential benefits, there are also some worries about the ramifications of AIGC, including the possibility for prejudice, the semantic errors in the generated content, and the blurring of the boundary between human- and machine-generated content. Therefore, it is significant to ensure the correctness of the AIGC, avoiding attacks from malicious parties that causes resource waste to affect the quality of AIGC services.
Blockchain-Aided Semantic Communication Framework for AIGC in Metaverse
The implementation of virtual transportation networks requires the following main steps: 1) Semantic extraction and transmission for data interactions between physical and virtual domains, 2) Semantic transformation and verification, and 3) AIGC for Metaverse, as shown in Fig. 1.
A. Semantic Extraction and Transmission
Pedestrians are in danger when auto-driving models in vehicles are not trained well enough, which motivates the development of virtual transportation networks in the Metaverse. Therefore, it is necessary to digitize physical domains using data produced in the real world to simulate environments for training vehicles and drivers. VSPs can take pictures using edge devices like smartphones, cameras, and sensors in physical domains to obtain information about the weather, traffic, and geographical landmarks that can be used to train and test the detection systems of vehicles in virtual domains. Virtual domain output can be fed back into physical domains to configure vehicles for better and safer performance. Based on the simulated environment, inexperienced drivers and vehicles can practice their reactions under unfamiliar weather or traffic conditions in Metaverse in a safe way. Therefore, VSPs need to frequently interact with edge devices supported by a tremendous amount of data to construct virtual transportation networks in Metaverse to provide services, which challenges the transmission capabilities of edge devices and VSPs.
Unfortunately, conventional communication systems cannot afford such frequent interactions between the physical and virtual domains, which will cause virtual transportation networks in Metaverse to lack enough data to simulate virtual environments. Semantic communication, a completely new paradigm that extracts semantic meaning from raw data for transmission, can be utilized to resolve this challenge. Instead of transmitting original data, edge devices can extract the semantic data and transmit to VSPs. The VSPs can then use the received semantic data to generate simulation environments for drivers and autonomous vehicle training on the virtual road. For instance, edge devices, e.g., smartphones, positioned at various locations along the same road may gather photographs of traffic conditions from their perspective. To reduce information redundancy, they can utilize semantic segmentation modules to crop key components of images as semantic data [2]. Then edge devices only transmit semantic data to VSPs to report traffic conditions on roads.
However, since VSPs have to collect semantic data from multiple edge devices to train virtual transportation networks in different situations, malicious edge devices could falsify semantic data (images) and corrupt the training process, which is dangerous for pedestrians and drivers. In this paper, we study the targeted semantic attack [7], [17] in that the adversarial and authentic semantic data have almost the same semantic similarities but are totally irrelevant. The semantic similarities are calculated with the help of high-dimensional descriptors extracted by a convolutional neural network (CNN). However, malicious edge devices could train a corresponding neural network to modify some pixels in attack images to achieve similar descriptors as the authentic images to corrupt the construction of virtual transportation networks. The training-based targeted semantic attack scheme is illustrated in Section IV.
B. AIGC in Metaverse
After receiving semantic data (images) from edge devices deployed in different locations, VSPs can perceive conditions or views of landmarks, and render images by AIGC services in Metaverse. For example, semantic data of landmarks from different perspectives can be utilized by VSPs to render 3D scenes to provide users with seamless experiences. VSPs can also utilize views of landmarks to generate artworks or avatars in Metaverse. Therefore, AIGC services play an important role in virtual transportation networks to facilitate the use of data resources and the applications of Metaverse. Besides, semantic data is important for subsequent AIGC services since its quality may affect the content generated by AIGC.
However, since semantic data circulated in the Metaverse may be corrupted by the aforementioned targeted semantic attacks produced by malicious edge devices, the AIGC services may do useless work and provide users with hateful content. For example, VSPs want to collect images of famous landmarks (i.e., Eiffel Tower) while malicious edge devices may extract unrelated images of flowers to corrupt the subsequent AIGC services that renders 3D scenes with different perspectives of the landmark. VSPs also want to perceive images of landmarks to generate artworks or avatars while attackers transmit irrelative semantic data of animals to obstacle AIGC services. Since the adversarial semantic data (images) modified by attackers have almost the same semantic similarities, it is difficult and time-consuming for VSPs to verify the authenticity of images. Therefore, it is necessary to design a mechanism to ensure the security of data transmission to protect the security of AIGC services.
C. Semantic Transformation and Verification
Malicious semantic data can affect the security of virtual transportation services in Metaverse. Modifying pixels in unrelated semantic data increases the semantic similarity score, causing the VSPs to use the wrong semantic data as input to AIGC and corrupt the virtual environment. Inspired by [17], image transformations can be performed to distinguish semantic similarities between the adversarial and authentic images. However, malicious edge devices can continue adjusting pixels in irrelative images to make them similar to transformed semantic data. Moreover, it is impossible for edge devices to transform semantic data unlimited times. A possible and practical solution is to record and verify transformations performed on semantic data.
Therefore, we propose a blockchain and zero-knowledge proof-based semantic defense scheme in Section V. The logic of transformations is recorded on the circuit produced by the zero-knowledge algorithm. Edge devices utilize extracted semantic data as inputs to generate proof of transformations and output transformed semantic data. They send the proof and semantic data to VSPs for verification. Since VSPs and edge devices are distributed in unknown Metaverse environments represented by avatars, the blockchain should be used to record and verify transformations to prevent data mutations.
TRAINING-BASED TARGETED SEMANTIC ATTACK SCHEME
Although the blockchain-aided semantic communication framework for AIGC in Metaverse can reduce information redundancy and establish decentralized trust between unknown edge devices and VSPs, malicious edge devices may conduct training-based targeted semantic attacks to corrupt semantic data (images) circulated in the Metaverse services. The targeted semantic attacks refer to transmitting adversarial semantic data with almost the same semantic descriptors but visually dissimilar to the authentic one [7], which is difficult for VSPs to utilize semantic similarities (inner product of descriptors among images) evaluation to distinguish them. In this section, we illustrate the workflow of the training-based targeted semantic attack targeted semantic attacks [7], [17].
Descriptor Extraction: Since extracted semantic data (images) is difficult to evaluate, edge devices can utilize a CNN to map images to high dimensional descriptors. Then VSPs can use the descriptors to distinguish semantic similarities of images. The process of descriptor extraction is illustrated as follows.
Let us denote three types of semantic data produced by malicious edge devices, including the adversarial semantic data
The input image
Loss Function: Considering the goal of malicious edge devices is to make
\begin{equation*}
L_{\text{ts}}(\mathbf {x}_{c},\mathbf {x}_{t}; \mathbf {x})=l_{\text{ts}}(\mathbf {x},\mathbf {x}_{t}) + \lambda \Vert \mathbf {x} - \mathbf {x}_{c} \Vert ^{2}, \tag{1}
\end{equation*}
Performance Loss: Let us assume that malicious edge devices can access to the network structure of the descriptor extraction [17] since it is necessary for edge devices to know the evaluation standard of VSPs. Considering different scenarios where targeted semantic attacks generate, referring to [17], we introduce the three empirical forms of the performance loss as follows.
Global Descriptor Loss is suitable that malicious edge devices even know all parameters of the network of the descriptor extraction. Thus, the performance loss function
\begin{equation*}
l_{\text{global}}(\mathbf {x},\mathbf {x}_{t}) = 1 - \mathbf {h}^{\top }_{\mathbf {x}} \mathbf {h}_{\mathbf {x}_{t}}. \tag{2}
\end{equation*}
Activation Tensor Loss is adapted to the scenario where the outputs of the network of the descriptor extraction are the same for
\begin{equation*}
l_{\text{tensor}}(\mathbf {x},\mathbf {x}_{t}) = \frac{\Vert \mathbf {g}_{\mathbf {x}} - \mathbf {g}_{\mathbf {x}_{t}} \Vert ^{2}}{w \cdot h \cdot d}. \tag{3}
\end{equation*}
Activation Histogram Loss is utilized to preserve first-order statistics of activations
\begin{equation*}
l_{\text{hist}}(\mathbf {x},\mathbf {x}_{t}) = \frac{1}{d} \sum _{i=1}^{d} \Vert u(\mathbf {g_{x}},\mathbf {b})_{i} - u(\mathbf {g_{x_{t}}},\mathbf {b})_{i} \Vert, \tag{4}
\end{equation*}
Optimization: Our goal is to find the optimal loss function that minimizes the semantic similarities of
\begin{equation*}
\theta _{t+1} = \theta _{t} - \eta \frac{\rho _{t}}{\sqrt{\upsilon _{t} + \epsilon }}, \tag{5}
\end{equation*}
\begin{equation*}
\mathbf {x}_{a} = \mathop {\arg \min }_{\mathbf {x}} L_{\text{ts}}(\mathbf {x}_{c},\mathbf {x}_{t}; \mathbf {x}), \tag{6}
\end{equation*}
Blockchain and Zero-Knowledge Proof-Based Semantic Defense Scheme
Since the adversarial semantic data generated by malicious edge devices has almost the same descriptors (semantic similarity) but different desired meanings from the authentic ones produced by honest edge devices, inspired by [7], [17], we utilize blockchain and zero-knowledge proof-based semantic defense scheme to help VSPs to identify attack images transmitted in the Metaverse. Instead of submitting extracted semantic data directly, edge devices should transform or process semantic data by the bilinear interpolation algorithm [25], and utilize Zero-Knowledge Proof to record and verify transformations. The details of the proposed scheme are elaborated as follows, as shown in Fig. 3.
Transformation: The transformation of semantic data is a training-free defense method that uses visual invariance to distinguish adversarial and authentic semantic extraction. The reason is that attackers adjust some pixels to make descriptors of adversarial images similar to the authentic ones [7]. As a result, we attempt to increase visual invariance by blurring extracted images using the spatial transformation of the bilinear interpolation algorithm.
Let us assume that
\begin{equation*}
f(x,y_{1}) \approx \frac{x_{2}-x}{x_{2}-x_{1}}f(x_{1},y_{1})+\frac{x-x_{1}}{x_{2}-x_{1}}f(x_{2},y_{1}) \tag{7}
\end{equation*}
\begin{equation*}
f(x,y_{2}) \approx \frac{x_{2}-x}{x_{2}-x_{1}}f(x_{1},y_{2})+\frac{x-x_{1}}{x_{2}-x_{1}}f(x_{2},y_{2}). \tag{8}
\end{equation*}
\begin{align*}
f(x,y) & \approx \frac{y_{2}-y}{y_{2}-y_{1}}f(x,y_{1})+\frac{y-y_{1}}{y_{2}-y_{1}}f(x,y_{2}) \\
& \approx \frac{(x_{2}-x)(y_{2}-y)}{(x_{2}-x_{1})(y_{2}-y_{1})}f(x_{1},y_{1})\\
& \quad+\frac{(x-x_{1})(y_{2}-y)}{(x_{2}-x_{1})(y_{2}-y_{1}))}f(x_{2},y_{1})\\
&\quad +\frac{(x_{2}-x)(y-y_{1})}{(x_{2}-x_{1})(y_{2}-y_{1})}f(x_{1},y_{2})\\
& \quad+\frac{(x-x_{1})(y-y_{1})}{(x_{2}-x_{1})(y_{2}-y_{1})}f(x_{2},y_{2}). \tag{9}
\end{align*}
Although edge devices can perform transformations to obtain the blurred semantic data that can distinguish from the adversarial one, it is difficult for VSPs to verify whether the blurred semantic data is derived from authentic transformations. Malicious edge devices may modify some pixels to make descriptors of their semantic data close to that of honest edge devices after transformations. Therefore, to assure the authenticity of the blur transformation for semantic data, we utilize ZKP to record transformations and blockchain to verify them. The proposed mechanism is a tuple of 3 polynomial-time schemes after extracting a circuit mapping the transformation, including Key Generation, Proof, and Verification, which works as follows:
Extraction: The mechanism initiates the logic in a computation circuit
\begin{equation*}
\mathsf {Extract}(f) \rightarrow (\mathsf {s},\mathsf {w}). \tag{10}
\end{equation*}
Key Generation: Edge devices take a security parameter
\begin{equation*}
\mathsf {KeyGen}(1^{\lambda },\mathsf {C}) \xrightarrow {\mathsf {C}} \mathsf {crs(ek,vk)}. \tag{11}
\end{equation*}
Proof: Edge devices take the evaluation key
\begin{equation*}
\mathsf {Prove}(\mathsf {crs.ek,s,w}) \xrightarrow {\mathsf {C}} \pi. \tag{12}
\end{equation*}
Verification: VSPs utilize smart contracts deployed on blockchain to verify the authenticity of transformations and implement the business logic of blockchain-aided semantic communication for AIGC in Metaverse. Since the verification process is implemented in the blockchain, edge devices and VSPs can query verification results to construct trust in a decentralized manner. The verification key
\begin{equation*}
\mathsf {Verify}(\mathsf {crs.vk,s},\pi) \rightarrow \lbrace 0,1\rbrace. \tag{13}
\end{equation*}
The semantic defense scheme should satisfy the following properties including completeness, soundness, and zero-knowledge [9], [18], [19], [20].
Completeness means that an honest edge device with a valid witness
\begin{equation*}
\Pr \left[ \begin{array}{c}\mathsf {KeyGen}(1^{\lambda },\mathsf {C}) \rightarrow \mathsf {crs(ek,vk)} \\
\mathsf {Prove}(\mathsf {crs.ek,s,w}) \rightarrow \pi \\
\mathsf {Verify}(\mathsf {crs.vk,s},\pi) = 1 \end{array} \right] = 1. \tag{14}
\end{equation*}
Soundness denotes that malicious edge devices cannot provide VSPs with authentic transformed semantic data, which means that edge devices can provide valid witnesses if they can produce valid proofs. If
\begin{equation*}
\Pr \left[ \begin{array}{c}\mathsf {KeyGen}(1^{\lambda },\mathsf {C}) \rightarrow \mathsf {crs(ek,vk)} \\
\mathcal {A}(\mathsf {crs.ek,s}) \rightarrow \pi ^* \\
\mathsf {Ext(crs.ek,s,\pi ^*)} \rightarrow \mathsf {w} \\
\mathsf {Verify}(\mathsf {crs.vk,s},\pi ^*) = 1 \end{array} \right] \leq \mathsf {negl}(\lambda). \tag{15}
\end{equation*}
Malicious edge devices
Zero-knowledge represents that VSPs can only verify the authenticity of transformed semantic data while they cannot obtain the original semantic data unless edge devices send it to them. Let us assume that there are probabilistic polynomial time simulators
\begin{equation*}
|\Pr (\mathsf {real}) - \Pr (\mathsf {sim})| \leq \mathsf {negl}(\lambda), \tag{16}
\end{equation*}
\begin{equation*}
\Pr (\mathsf {real}) = \Pr \left[ \begin{array}{c}\mathsf {KeyGen}(1^{\lambda },\mathsf {C}) \rightarrow \mathsf {crs} \\
\mathcal {A}_{1}(f) \rightarrow (\mathsf {s,w}) \\
\mathsf {Prove(crs,s,w)} \rightarrow \pi \\
\mathcal {A}_{2}(\mathsf {crs,s,w,\pi }) = 1 \end{array} \right] \tag{17}
\end{equation*}
\begin{equation*}
\Pr (\mathsf {sim}) = \Pr \left[ \begin{array}{c}\mathsf {S_{1}}(1^{\lambda },\mathsf {C}) \rightarrow \mathsf {crs} \\
\mathcal {A}_{1}(f) \rightarrow (\mathsf {s,w}) \\
\mathsf {S_{2}(crs,s)} \rightarrow \pi \\
\mathcal {A}_{2}(\mathsf {crs,s,w,\pi }) = 1 \end{array} \right]. \tag{18}
\end{equation*}
VSPs who know public statements mapping with semantic data can hardly learn any knowledge about semantic data before and after transformation. According to (16), VSPs cannot know anything about semantic data other than what can be inferred from transformation.
EXPERIMENTAL EVALUATIONS
We simulate the proposed mechanism on Ubuntu 20.04LTS, Intel Xeon, 8 core, 64 G memory, and 25000 Mb/s with 2 Tesla V100, Go 1.19.4, Node v14.17.0, PyTorch 1.12.1, Torchvision 0.13.1, and CUDA 10.2. We perform experiments on a standard image benchmark, Revisited Paris [27], to measure the attack and defense performance among edge devices and VSPs. We exploit pre-trained networks on ImageNet [28] and AlexNet [29] to execute the attacks and defenses with 100 iterations. Unless otherwise mentioned, we use these parameters referring to [17]. The learning rate
A. Performance of Semantic Attack Scheme
Fig. 4 is the performance loss of the proposed semantic attack scheme with different loss functions [Global, Hist, Tensor] corresponding to the global descriptor, activation tensor, and activation histogram as the number of iterations increases. Tensor converges much slower than Global and Hist, which requires more iterations to reach its plateau.
Fig. 5 is the semantic similarity attack performance between the adversarial semantic data and the authentic or the carrier one with three loss functions [Global, Hist, Tensor]. As shown in Fig. 5(a) and Fig. 5(b), Global and Hist converge around the 40th iteration which is much faster than Tensor. The semantic similarity performance of attacks is consistent with Fig. 4 which shows the same trend in three loss functions.
B. Performance of Blockchain and ZKP-Based Semantic Defense Scheme
Fig. 6 is the semantic similarity comparison between attack and defense schemes by displaying example images, which utilizes blockchain and zero-knowledge proof to prevent malicious images. Fig. 7 is the semantic similarity (descriptors) defense performance between the adversarial semantic data and the authentic one or the carrier one with three loss functions [Global, Hist, Tensor]. Compared with Fig. 5, the adversarial image (semantic data) can differ in semantic similarities when applying the proposed blockchain and zero-knowledge proof-based semantic defense scheme. Since the extracted semantic data is required to execute the defense scheme and the execution can be assured by blockchain and zero-knowledge proof, the images can differ in descriptors. As shown in Fig. 5(a) and Fig. 7(a), the semantic similarity can reduce by up to 35% between the adversarial and the authentic images. Fig. 5(b) and Fig. 7(b) show that the semantic similarity can decrease 10% between the adversarial and the carrier images.
Fig. 8(a) is the blockchain consensus overhead without malicious nodes for [Attack, Authentic, Defense] types of semantic data (image) with [275 KB,467 KB,10 KB] data sizes when the number of blockchain nodes is [5,50,5] by utilizing the PBFT consensus algorithm [30]. As shown in Fig. 8(a), the proposed scheme can reduce the time consumed in blockchain to improve consensus efficiency due to the attack and defense schemes cropping authentic semantic data while differing in semantic similarities according to Fig. 7. Fig. 8(b) is the ZKP computation overhead for [GenWitness, GenProof, VerifyProof] operations with [10 KB,100 KB,1MB] data sizes. We can see from Fig. 8(b) that the ZKP computation overhead depends on the GenProof operation, while the sizes of semantic data affect little on the proposed scheme. Besides, the computation overhead for verifying proofs is less than for generating proofs, which can be written into smart contracts [9], [18], [19]. Fig. 8(c) is the blockchain consensus overhead of sharing semantic defense images with [10%, 20%, 30%] malicious nodes as the number of blockchain nodes increases from 10 to 50. We simulate the malicious nodes via sleep functions to defer nodes triggering the consensus process. As we can observe that the adoption of blockchain can prevent malicious nodes from damaging information sharing in this framework.
CONCLUSION AND FUTURE WORK
In this paper, we first integrated blockchain-aided semantic communication into Metaverse to support AIGC services in virtual transportation networks. We also presented a training-based targeted semantic attack scheme to illustrate potential attacks by generating adversarial semantic data with the same descriptors but different desired meanings. To prevent the above attack, we designed a blockchain and zero-knowledge proof-based semantic defense scheme that records transformations of semantic data and verifies mutations in a decentralized manner. Simulation results show that the proposed mechanism can differ in the descriptors between the adversarial semantic data and the authentic one. The defense scheme can identify malicious edge devices falsifying semantic data to corrupt AIGC services in virtual transportation networks.
Although the proposed integration of blockchain and semantic communication framework can prevent semantic attacks from data mutations, there are also potential drawbacks to consider since blockchain could be overhead-intense. One of the main concerns is that blockchain can be resource-intensive and may require significant computational power and storage capacity, which can lead to increased costs and slower transaction processing times. Efficient blockchain structures and consensus algorithms are good solutions to improve the performance of blockchain. Besides, the on-chain and off-chain collaboration mechanism can be also utilized to reduce on-chain overhead to improve blockchain efficiency.
In future research work, we will study how to mitigate malicious edge devices and facilitate resource allocation with economic incentive mechanisms in the proposed framework.