Networking Aspects for the Security of Game Input

被引:0
|
作者
Bouras, Christos [1 ]
Poulopoulos, Vassilis [1 ]
Tsogkas, Vassilis [1 ]
机构
[1] Res Acad Comp Technol Inst, Panepistimioupoli Patras 26500, Rio, Greece
关键词
online gaming; remote command execution; input device capturing; asymmetric encryption; reverse channel;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Following the trends of our era, Games At Large IST Project introduces an innovative platform for running interactive, rich content multimedia applications over a Wireless Local Area Network. Games@Large project's vision is to provide a new system architecture for Interactive Multimedia which will enhance existing CE devices such as, Set Top Boxes (STB), Small Screen and other devices, which are lacking both the CPU power and the graphical performance to provide a rich user experience. This paper presents the input command transferring module that provides encryption capabilities for ensuring the security of the transmitted sensitive user data. In a nutshell, the client software when capturing input from a keyboard device encrypts the commands that are transmitted over a Wireless Local Area Network, using a public key encryption scheme and the server is responsible for decrypting and executing the commands to the corresponding game application.
引用
收藏
页码:1292 / 1296
页数:5
相关论文
共 50 条
  • [31] Survey on security aspects of distributed software-defined networking controllers in an enterprise SD-WLAN
    Neena Susan Shaji
    Raja Muthalagu
    Digital Communications and Networks, 2024, 10 (06) : 1716 - 1731
  • [32] Survey on security aspects of distributed software-defined networking controllers in an enterprise SD-WLAN
    Shaji, Neena Susan
    Muthalagu, Raja
    DIGITAL COMMUNICATIONS AND NETWORKS, 2024, 10 (06) : 1716 - 1731
  • [33] Raising the security game
    Barry, Dan-Joe
    CHEMISTRY & INDUSTRY, 2010, (23) : 24 - 26
  • [34] Security in enterprise networking: A quick tour
    Lin, P
    Lin, L
    IEEE COMMUNICATIONS MAGAZINE, 1996, 34 (01) : 56 - 61
  • [35] A Comprehensive Security Model for Networking Applications
    Chan-Tin, Eric
    Chen, Tingting
    Kak, Subhash
    2012 21ST INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN), 2012,
  • [36] Special section on Security and Social Networking
    Oenen, Melek
    Strufe, Thorsten
    COMPUTER COMMUNICATIONS, 2012, 35 (01) : 47 - 47
  • [37] Understanding the Security Implications of Kubernetes Networking
    Minna, Francesco
    Chandrasekaran, Balakrishnan
    Blaise, Agathe
    Rebecchi, Filippo
    Massacci, Fabio
    IEEE SECURITY & PRIVACY, 2021, 19 (05) : 46 - 56
  • [38] INFORMATION-CENTRIC NETWORKING SECURITY
    Fu, Xiaoming
    Kutscher, Dirk
    Misra, Satyajayant
    Li, Ruidong
    IEEE COMMUNICATIONS MAGAZINE, 2018, 56 (11) : 60 - 61
  • [39] Security architecture and mechanisms for global networking
    He, JS
    GLOBAL NETWORKING '97 - 21ST CENTURY COMMUNICATIONS NETWORKS, VOL 1: TECHNOLOGY; ECONOMICS, 1997, : 63 - 69
  • [40] Security aspects
    Breitung, W
    Starflinger, J
    BWK, 2003, 55 (10): : 18 - 19