Cyber Security Protection for Online Gaming Applications

Cyber Security Protection for Online Gaming Applications

ISBN13: 9781522574927|ISBN10: 1522574921|EISBN13: 9781522574934
DOI: 10.4018/978-1-5225-7492-7.ch005
Cite Chapter Cite Chapter

MLA

Zhao, Wenbing. "Cyber Security Protection for Online Gaming Applications." Advanced Methodologies and Technologies in System Security, Information Privacy, and Forensics, edited by Mehdi Khosrow-Pour, D.B.A., IGI Global, 2019, pp. 48-58. https://doi.org/10.4018/978-1-5225-7492-7.ch005

APA

Zhao, W. (2019). Cyber Security Protection for Online Gaming Applications. In M. Khosrow-Pour, D.B.A. (Ed.), Advanced Methodologies and Technologies in System Security, Information Privacy, and Forensics (pp. 48-58). IGI Global. https://doi.org/10.4018/978-1-5225-7492-7.ch005

Chicago

Zhao, Wenbing. "Cyber Security Protection for Online Gaming Applications." In Advanced Methodologies and Technologies in System Security, Information Privacy, and Forensics, edited by Mehdi Khosrow-Pour, D.B.A., 48-58. Hershey, PA: IGI Global, 2019. https://doi.org/10.4018/978-1-5225-7492-7.ch005

Export Reference

Mendeley
Favorite

Abstract

In this chapter, the authors point out the threats to online gaming applications and present two strategies that can be used to build secure and dependable online gaming applications. These strategies not only seek the solution for gathering entropy to seed the PRNG used in such applications but also intend to eliminate malicious intrusions to protect the seed and to maintain replica consistency. By applying these techniques, the online gaming applications can ensure service integrity (both the service providers and the innocent players are protected) and guarantee high availability despite the presence of Byzantine faults. Finally, the authors outline some open research issues in this field.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.