Networking Aspects for the Security of Game Input

被引:0
|
作者
Bouras, Christos [1 ]
Poulopoulos, Vassilis [1 ]
Tsogkas, Vassilis [1 ]
机构
[1] Res Acad Comp Technol Inst, Panepistimioupoli Patras 26500, Rio, Greece
关键词
online gaming; remote command execution; input device capturing; asymmetric encryption; reverse channel;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Following the trends of our era, Games At Large IST Project introduces an innovative platform for running interactive, rich content multimedia applications over a Wireless Local Area Network. Games@Large project's vision is to provide a new system architecture for Interactive Multimedia which will enhance existing CE devices such as, Set Top Boxes (STB), Small Screen and other devices, which are lacking both the CPU power and the graphical performance to provide a rich user experience. This paper presents the input command transferring module that provides encryption capabilities for ensuring the security of the transmitted sensitive user data. In a nutshell, the client software when capturing input from a keyboard device encrypts the commands that are transmitted over a Wireless Local Area Network, using a public key encryption scheme and the server is responsible for decrypting and executing the commands to the corresponding game application.
引用
收藏
页码:1292 / 1296
页数:5
相关论文
共 50 条
  • [21] SECURITY MODELS FOR HETEROGENEOUS NETWORKING
    Mapp, Glenford
    Aiash, Mahdi
    Lasebae, Aboubaker
    Phan, Raphael
    SECRYPT 2010: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2010, : 318 - 321
  • [22] Security and privacy in business networking
    Wohlgemuth, Sven
    Sackmann, Stefan
    Sonehara, Noboru
    Tjoa, A. Min
    ELECTRONIC MARKETS, 2014, 24 (02) : 81 - 88
  • [23] Network Security and Networking Protocols
    Sharma, Arvind Kumar
    Lamba, Chattar Singh
    RECENT TRENDS IN NETWORKS AND COMMUNICATIONS, 2010, 90 : 90 - 97
  • [24] Role of Security in Social Networking
    Hiatt, David
    Choi, Young B.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2016, 7 (02) : 12 - 15
  • [25] Challenges for Cloud Networking Security
    Schoo, Peter
    Fusenig, Volker
    Souza, Victor
    Melo, Marcio
    Murray, Paul
    Debar, Herve
    Medhioub, Houssem
    Zeghlache, Djamal
    MOBILE NETWORKS AND MANAGEMENT, 2010, 68 : 298 - +
  • [26] SECURITY IN LOCAL AREA NETWORKING
    MILNE, I
    DATA PROCESSING, 1986, 28 (05): : 267 - 269
  • [27] Security and privacy in business networking
    Sven Wohlgemuth
    Stefan Sackmann
    Noboru Sonehara
    A Min Tjoa
    Electronic Markets, 2014, 24 : 81 - 88
  • [28] NETWORKING - A NEW WORD, A DIFFERENT GAME
    SCHMUCK, PA
    EDUCATIONAL LEADERSHIP, 1986, 43 (05) : 60 - 61
  • [29] Networking Aspects for Gaming Systems
    Bouras, Christos
    Poulopoulos, Vassilis
    Sengounis, Ioannis
    Tsogkas, Vassilis
    2008 3RD INTERNATIONAL CONFERENCE ON INTERNET AND WEB APPLICATIONS AND SERVICES (ICIW 2008), 2008, : 650 - 655
  • [30] A Comprehensive review of 'Internet of Healthcare Things': Networking aspects, technologies, services, applications, challenges, and security concerns
    Verma, Himanshu
    Chauhan, Naveen
    Awasthi, Lalit Kumar
    COMPUTER SCIENCE REVIEW, 2023, 50