Cyber Security Protection for Online Gaming Applications
2018 ◽
pp. 1647-1655
Keyword(s):
In this article, we point out the threats to online gaming applications and present two strategies that can be used to build secure and dependable online gaming applications. These strategies not only seek the solution for gathering entropy to seed the PRNG used in such applications, but also intend to eliminate malicious intrusions to protect the seed and to maintain replica consistency. By applying these techniques, the online gaming applications can ensure its service integrity (both the service providers and the innocent players are protected) and guarantee high availability despite the presence of Byzantine faults. Finally, we outline some open research issues in this field.
Keyword(s):
2017 ◽
Vol 19
(3)
◽
pp. 1457-1477
◽
2014 ◽
Vol 15
(9)
◽
pp. 776-793
◽
Keyword(s):
2018 ◽
Vol 10
(11)
◽
pp. 4377-4405
Keyword(s):
2017 ◽
Vol 6
◽
pp. 1-10
◽