Cyber Security Protection for Online Gaming Applications

Cyber Security Protection for Online Gaming Applications

ISBN13: 9781522522553|ISBN10: 1522522557|EISBN13: 9781522522560
DOI: 10.4018/978-1-5225-2255-3.ch143
Cite Chapter Cite Chapter

MLA

Zhao, Wenbing. "Cyber Security Protection for Online Gaming Applications." Encyclopedia of Information Science and Technology, Fourth Edition, edited by Mehdi Khosrow-Pour, D.B.A., IGI Global, 2018, pp. 1647-1655. https://doi.org/10.4018/978-1-5225-2255-3.ch143

APA

Zhao, W. (2018). Cyber Security Protection for Online Gaming Applications. In M. Khosrow-Pour, D.B.A. (Ed.), Encyclopedia of Information Science and Technology, Fourth Edition (pp. 1647-1655). IGI Global. https://doi.org/10.4018/978-1-5225-2255-3.ch143

Chicago

Zhao, Wenbing. "Cyber Security Protection for Online Gaming Applications." In Encyclopedia of Information Science and Technology, Fourth Edition, edited by Mehdi Khosrow-Pour, D.B.A., 1647-1655. Hershey, PA: IGI Global, 2018. https://doi.org/10.4018/978-1-5225-2255-3.ch143

Export Reference

Mendeley
Favorite

Abstract

In this article, we point out the threats to online gaming applications and present two strategies that can be used to build secure and dependable online gaming applications. These strategies not only seek the solution for gathering entropy to seed the PRNG used in such applications, but also intend to eliminate malicious intrusions to protect the seed and to maintain replica consistency. By applying these techniques, the online gaming applications can ensure its service integrity (both the service providers and the innocent players are protected) and guarantee high availability despite the presence of Byzantine faults. Finally, we outline some open research issues in this field.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.