Abstract
The development of complex applications that use the Peer-to-Peer computing model is restrained by security and trust management concerns, despite evident performance benefits. An example of such an application of P2P computing is P2P Massive Multi-user Online Games, where cheating by players is simple without centralized control or specialized trust management mechanisms. The article presents new techniques for trust enforcement that use cryptographic methods and are adapted to the dynamic membership and resources of P2P systems. The proposed approach to trust management differs significantly from previous work in the area that mainly used reputation. The paper describes a comprehensive trust management infrastructure fore P2P MMO games that enables to recognize and exclude cheating players while keeping the performance overhead as low as possible. While the architecture requires trusted centralized components (superpeers), their role in trust management is limited to a minimum and the performance gains of using the P2P computing model are preserved.
An erratum to this chapter can be found at http://dx.doi.org/10.1007/11914952_55.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Wierzbicki, A., Kucharski, T.: P2P Scrabble. Can P2P games commence? In: Fourth International IEEE Conference on Peer-to-Peer Computing, Zurich, August 2004, pp. 100–107 (2004)
Wierzbicki, A., Kucharski, T.: Fair and Scalable P2P Games of Turns. In: Eleventh International Conference on Parallel and Distributed Systems (ICPADS 2005), Fukuoka, Japan, pp. 250–256 (2005)
Knutsson, B., Lu, H., Xu, W., Hopkins, B.: Peer-to-Peer Support for Massively Multiplayer Games. In: IEEE INFOCOM 2004 (2004)
Baughman, N.E., Levine, B.: Cheat-proof playout for centralized and distributed online games. In: INFOCOM 2001, pp. 104–113 (2001)
Berglund, E.J., Cheriton, D.R.: Amaze: A multiplayer computer game. IEEE Software 2(1) (1985)
Butterfly.net, Inc., The butterfly grid: A distributed platform for online games (2003), www.butterfly.net/platform/
Sheldon, N., Girard, E., Borg, S., Claypool, M., Agu, E.: The effect of latency on user performance in Warcraft III. In: 2nd Workshop on Network and System Support for Games (NetGames 2003), pp. 3–14 (2003)
Menezes, J., van Oorschot, P.C., Vanstone, S.A.: Handbook of applied cryptography. CRC Press, Boca Raton (1996)
Lamport, L., Shostak, R., Pease, M.: Byzantine Generals Problem. ACM Trans. on Programming Laguages and Systems 4(3), 382–401 (1982)
Selberg, E.W.: How to Stop A Cheater: Secret Sharing with Dishonest Participation. Carnegie Mellon University (1993)
Tompa, M., Woll, H.: How to share a secret with cheaters, Research Report RC 11840, IBM Research Division (1986)
Wierzbicki, R.S., Świerczewski, D., Znojek, M.: Rhubarb: a Tool for Developing Scalable and Secure Peer-to-Peer Applications. In: Second IEEE Int. Conf. Peer-to-Peer Computing, P2P 2002 (2002)
Douceur, J.R.: The Sybil Attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, p. 251. Springer, Heidelberg (2002)
Burmester, M., Desmedt, Y.: Is hierarchical Public-Key Certification the next target for hackesr? ACM Communications 47(8) (August 2004)
Agrawal, D., et al.: An Integrated Solution for Secure Group Communication in Wide-Area Netwokrs. In: Proc. 6th IEEE Symposium on Comp. and Comm., pp. 22–28 (July 2001)
IETF, SPKI Working group, http://www.ietf.org
Zona Inc. Terazona: Zona application framework white paper (2002), www.zona.net/whitepaper/Zonawhitepaper.pdf
Yoshino, H., et al.: Byzantine Agreement Protocol Using Hierarchical Groups. In: Proc. International Conference on Parallel and Distributed Systems (2005)
Nguyen, H.N., Morino, H.: A Key Management Scheme for Mobile Ad Hoc Networks Based on Threshold Cryptography for Providing Fast Authentication and Low Signaling Load. In: Enokido, T., Yan, L., Xiao, B., Kim, D.Y., Dai, Y.-S., Yang, L.T. (eds.) EUC-WS 2005. LNCS, vol. 3823, pp. 905–915. Springer, Heidelberg (2005)
Mui, L.: Computational Models of Trust and Reputation: Agents, Evolutionary Games, and Social Networks, Ph.D. Dissertation, Massachusetts Institute of Technology (2003)
Aberer, K., Despotovic, Z.: Managing Trust in a Peer-To-Peer Information System. In: Proc. tenth int. conf. Information and knowledge management, pp. 310–317 (2001)
Yu, B., Singh, M.: An Evidential Model of Distributed Reputation Management. In: Proc. first int. joint conf. Autonomous agents and multiagent sys., part 1, pp. 294–301 (2002)
Gmytrasiewicz, P., Durfee, E.: Toward a theory of honesty and trust among communicating autonomous agents Group Decision and Negotiation 2, 237–258 (1993)
Iimura, T., Hazeyama, H., Kadobayashi, Y.: Zoned Federation of Game Servers: a Peer-to-peer Approach to Scalable Multi-player Online Games. In: Proc. ACM SIGCOMM (2004)
Chen, B., Maheswaran, M.: Zoned Federation of Game Servers: a Peer-to-peer Approach to Scalable Multi-player Online Games. In: Proc. ACM SIGCOMM (2004)
Zhao, W., Varandharajan, V., Mu, Y.: A Secure Mental Poker Protocol Over The Internet. In: Proc. Australasian Information Security Workshop (AISW 2003) (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Wierzbicki, A. (2006). Trust Enforcement in Peer-to-Peer Massive Multi-player Online Games. In: Meersman, R., Tari, Z. (eds) On the Move to Meaningful Internet Systems 2006: CoopIS, DOA, GADA, and ODBASE. OTM 2006. Lecture Notes in Computer Science, vol 4276. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11914952_7
Download citation
DOI: https://doi.org/10.1007/11914952_7
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-48274-1
Online ISBN: 978-3-540-48283-3
eBook Packages: Computer ScienceComputer Science (R0)