Nothing Special   »   [go: up one dir, main page]

Skip to main content

Trust Enforcement in Peer-to-Peer Massive Multi-player Online Games

  • Conference paper
On the Move to Meaningful Internet Systems 2006: CoopIS, DOA, GADA, and ODBASE (OTM 2006)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 4276))

Abstract

The development of complex applications that use the Peer-to-Peer computing model is restrained by security and trust management concerns, despite evident performance benefits. An example of such an application of P2P computing is P2P Massive Multi-user Online Games, where cheating by players is simple without centralized control or specialized trust management mechanisms. The article presents new techniques for trust enforcement that use cryptographic methods and are adapted to the dynamic membership and resources of P2P systems. The proposed approach to trust management differs significantly from previous work in the area that mainly used reputation. The paper describes a comprehensive trust management infrastructure fore P2P MMO games that enables to recognize and exclude cheating players while keeping the performance overhead as low as possible. While the architecture requires trusted centralized components (superpeers), their role in trust management is limited to a minimum and the performance gains of using the P2P computing model are preserved.

An erratum to this chapter can be found at http://dx.doi.org/10.1007/11914952_55.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Wierzbicki, A., Kucharski, T.: P2P Scrabble. Can P2P games commence? In: Fourth International IEEE Conference on Peer-to-Peer Computing, Zurich, August 2004, pp. 100–107 (2004)

    Google Scholar 

  2. Wierzbicki, A., Kucharski, T.: Fair and Scalable P2P Games of Turns. In: Eleventh International Conference on Parallel and Distributed Systems (ICPADS 2005), Fukuoka, Japan, pp. 250–256 (2005)

    Google Scholar 

  3. Knutsson, B., Lu, H., Xu, W., Hopkins, B.: Peer-to-Peer Support for Massively Multiplayer Games. In: IEEE INFOCOM 2004 (2004)

    Google Scholar 

  4. Baughman, N.E., Levine, B.: Cheat-proof playout for centralized and distributed online games. In: INFOCOM 2001, pp. 104–113 (2001)

    Google Scholar 

  5. Berglund, E.J., Cheriton, D.R.: Amaze: A multiplayer computer game. IEEE Software 2(1) (1985)

    Google Scholar 

  6. Butterfly.net, Inc., The butterfly grid: A distributed platform for online games (2003), www.butterfly.net/platform/

  7. Sheldon, N., Girard, E., Borg, S., Claypool, M., Agu, E.: The effect of latency on user performance in Warcraft III. In: 2nd Workshop on Network and System Support for Games (NetGames 2003), pp. 3–14 (2003)

    Google Scholar 

  8. Menezes, J., van Oorschot, P.C., Vanstone, S.A.: Handbook of applied cryptography. CRC Press, Boca Raton (1996)

    Book  Google Scholar 

  9. Lamport, L., Shostak, R., Pease, M.: Byzantine Generals Problem. ACM Trans. on Programming Laguages and Systems 4(3), 382–401 (1982)

    Article  MATH  Google Scholar 

  10. Selberg, E.W.: How to Stop A Cheater: Secret Sharing with Dishonest Participation. Carnegie Mellon University (1993)

    Google Scholar 

  11. Tompa, M., Woll, H.: How to share a secret with cheaters, Research Report RC 11840, IBM Research Division (1986)

    Google Scholar 

  12. Wierzbicki, R.S., Świerczewski, D., Znojek, M.: Rhubarb: a Tool for Developing Scalable and Secure Peer-to-Peer Applications. In: Second IEEE Int. Conf. Peer-to-Peer Computing, P2P 2002 (2002)

    Google Scholar 

  13. Douceur, J.R.: The Sybil Attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, p. 251. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  14. Burmester, M., Desmedt, Y.: Is hierarchical Public-Key Certification the next target for hackesr? ACM Communications 47(8) (August 2004)

    Google Scholar 

  15. Agrawal, D., et al.: An Integrated Solution for Secure Group Communication in Wide-Area Netwokrs. In: Proc. 6th IEEE Symposium on Comp. and Comm., pp. 22–28 (July 2001)

    Google Scholar 

  16. IETF, SPKI Working group, http://www.ietf.org

  17. Zona Inc. Terazona: Zona application framework white paper (2002), www.zona.net/whitepaper/Zonawhitepaper.pdf

  18. Yoshino, H., et al.: Byzantine Agreement Protocol Using Hierarchical Groups. In: Proc. International Conference on Parallel and Distributed Systems (2005)

    Google Scholar 

  19. Nguyen, H.N., Morino, H.: A Key Management Scheme for Mobile Ad Hoc Networks Based on Threshold Cryptography for Providing Fast Authentication and Low Signaling Load. In: Enokido, T., Yan, L., Xiao, B., Kim, D.Y., Dai, Y.-S., Yang, L.T. (eds.) EUC-WS 2005. LNCS, vol. 3823, pp. 905–915. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  20. Mui, L.: Computational Models of Trust and Reputation: Agents, Evolutionary Games, and Social Networks, Ph.D. Dissertation, Massachusetts Institute of Technology (2003)

    Google Scholar 

  21. Aberer, K., Despotovic, Z.: Managing Trust in a Peer-To-Peer Information System. In: Proc. tenth int. conf. Information and knowledge management, pp. 310–317 (2001)

    Google Scholar 

  22. Yu, B., Singh, M.: An Evidential Model of Distributed Reputation Management. In: Proc. first int. joint conf. Autonomous agents and multiagent sys., part 1, pp. 294–301 (2002)

    Google Scholar 

  23. Gmytrasiewicz, P., Durfee, E.: Toward a theory of honesty and trust among communicating autonomous agents Group Decision and Negotiation  2, 237–258 (1993)

    Google Scholar 

  24. Iimura, T., Hazeyama, H., Kadobayashi, Y.: Zoned Federation of Game Servers: a Peer-to-peer Approach to Scalable Multi-player Online Games. In: Proc. ACM SIGCOMM (2004)

    Google Scholar 

  25. Chen, B., Maheswaran, M.: Zoned Federation of Game Servers: a Peer-to-peer Approach to Scalable Multi-player Online Games. In: Proc. ACM SIGCOMM (2004)

    Google Scholar 

  26. Zhao, W., Varandharajan, V., Mu, Y.: A Secure Mental Poker Protocol Over The Internet. In: Proc. Australasian Information Security Workshop (AISW 2003) (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wierzbicki, A. (2006). Trust Enforcement in Peer-to-Peer Massive Multi-player Online Games. In: Meersman, R., Tari, Z. (eds) On the Move to Meaningful Internet Systems 2006: CoopIS, DOA, GADA, and ODBASE. OTM 2006. Lecture Notes in Computer Science, vol 4276. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11914952_7

Download citation

  • DOI: https://doi.org/10.1007/11914952_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-48274-1

  • Online ISBN: 978-3-540-48283-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics