Networking Aspects for the Security of Game Input

被引:0
|
作者
Bouras, Christos [1 ]
Poulopoulos, Vassilis [1 ]
Tsogkas, Vassilis [1 ]
机构
[1] Res Acad Comp Technol Inst, Panepistimioupoli Patras 26500, Rio, Greece
关键词
online gaming; remote command execution; input device capturing; asymmetric encryption; reverse channel;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Following the trends of our era, Games At Large IST Project introduces an innovative platform for running interactive, rich content multimedia applications over a Wireless Local Area Network. Games@Large project's vision is to provide a new system architecture for Interactive Multimedia which will enhance existing CE devices such as, Set Top Boxes (STB), Small Screen and other devices, which are lacking both the CPU power and the graphical performance to provide a rich user experience. This paper presents the input command transferring module that provides encryption capabilities for ensuring the security of the transmitted sensitive user data. In a nutshell, the client software when capturing input from a keyboard device encrypts the commands that are transmitted over a Wireless Local Area Network, using a public key encryption scheme and the server is responsible for decrypting and executing the commands to the corresponding game application.
引用
收藏
页码:1292 / 1296
页数:5
相关论文
共 50 条
  • [11] Enhancing network security through integration of game theory in software-defined networking frameworkEnhancing network security through integration of game theory in software-defined networking...F. Razvan et al.
    Florea Razvan
    Craus Mitica
    International Journal of Information Security, 2025, 24 (3)
  • [12] Input output: Networking computers
    McCubbin, N
    PULP & PAPER-CANADA, 1996, 97 (01) : 84 - 84
  • [13] LEARN TO PLAY THE NETWORKING GAME
    FOXMAN, LD
    POLSKY, WL
    PERSONNEL JOURNAL, 1984, 63 (07) : 30 - 30
  • [14] Networking: a male dominated game
    Socratous, Maria
    GENDER IN MANAGEMENT, 2018, 33 (02): : 167 - 183
  • [15] Networking is huge in consulting game
    Gruhn, P
    INTECH, 2002, 49 (05) : 96 - 96
  • [16] STRATEGIC ASPECTS OF NETWORKING
    ASHFORD, JH
    ASLIB PROCEEDINGS, 1993, 45 (11-12): : 287 - 295
  • [17] Strategic aspects of networking
    Ashford, John H.
    Aslib Proceedings: New Information Perspectives, 1993, 45 (11-12): : 287 - 295
  • [18] The game security and security game: hacking, law and public policy
    McMullan, John L.
    Perrier, David C.
    CRIMINOLOGIE, 2006, 39 (01) : 83 - 106
  • [19] Security Issues in Social Networking
    Kumar, Damera Vijay
    Varma, P. S. S.
    Pabboju, Shyam Sunder
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2013, 13 (06): : 120 - 124
  • [20] SECURITY SERVICES FOR AIRBORNE NETWORKING
    Hill, Douglas W.
    Climek, David M.
    MILCOM 2009 - 2009 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-4, 2009, : 806 - 810