Skip to main content

On the Security Enhancement of an Efficient and Secure Event Signature Protocol for P2P MMOGs

  • Conference paper
Computational Science and Its Applications – ICCSA 2010 (ICCSA 2010)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 6016))

Included in the following conference series:

Abstract

In 2008, Chan et al. presented an efficient and secure event signature (EASES) protocol for peer-to-peer massively multiplayer online games (P2P MMOGs). EASES could achieve non-repudiation, event commitment, save memory, bandwidth and reduce the complexity of the computations. However, we find that Chan et al. EASES protocol suffers from the passive attack and this attack will make a malicious attacker to impersonate any player to replay the event update messages for cheating. As a result, we introduce a simple countermeasure to prevent impersonate attack while the merits of the original EASES protocol are left unchanged.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Chan, M.-C., Hu, S.-Y., Jiang, J.-R.: An efficient and secure event signature (EASES) protocol for peer-to-peer massively multiplayer online games. Computer Networks 52(9), 1838–1845 (2008)

    Article  MATH  Google Scholar 

  2. Corman, A., Douglas, S., Schachte, P., Teague, V.: A seucre event agreement (SEA) protocol for peer-to-peer games. In: The First International Conference on Availability, Reliability and Security (2006)

    Google Scholar 

  3. Dickey, C., Zappala, D., Lo, V., Marr, J.: Low lattency and cheat-proof event ordering for peer-to-peer games. In: Proceedings of the ACM International Workshop on Network and Operating System Support for Digital Audio and Video, pp. 134–139 (2004)

    Google Scholar 

  4. Li, C.-T., Hwang, M.-S., Chu, Y.-P.: Further improvement on a novel privacy preserving authentication and access control scheme for pervasive computing environments. Computer Communications 31(18), 4255–4258 (2008)

    Article  Google Scholar 

  5. Li, C.-T., Hwang, M.-S., Chu, Y.-P.: A Secure and Efficient Communication Scheme with Authenticated Key Establishment and Privacy Preserving for Vehicular Ad Hoc Networks. Computer Communications 31(12), 2803–2814 (2008)

    Article  Google Scholar 

  6. Li, C.-T., Hwang, M.-S., Liu, C.-Y.: An Electronic Voting Protocol with Deniable Authentication for Mobile Ad Hoc Networks. Computer Communications 31(10), 2534–2540 (2008)

    Article  Google Scholar 

  7. Li, C.-T., Hwang, M.-S., Chu, Y.-P.: Improving the security of a secure anonymous routing protocol with authenticated key exchange for ad hoc networks. International Journal of Computer Systems Science and Engineering 23(3), 227–234 (2008)

    Google Scholar 

  8. Li, C.-T., Hwang, M.-S., Lai, Y.-C.: A Verifiable Electronic Voting Scheme Over the Internet. In: Proceedings of the 6th International Conference on Information Technology: New Generations, pp. 449–454 (2009)

    Google Scholar 

  9. Li, C.-T., Hwang, M.-S.: Improving the Security of Non-PKI Methods for Public Key Distribution. In: Proceedings of the 6th International Conference on Information Technology: New Generations, pp. 1695–1696 (2009)

    Google Scholar 

  10. Wei, C.-H., Chin, Y.-H., Li, C.-T.: A Secure Billing Protocol for Grid Computing. In: Proceedings of the 6th International Conference on Information Technology: New Generations, pp. 320–325 (2009)

    Google Scholar 

  11. Li, C.-T.: An Enhanced Remote User Authentication Scheme Providing Mutual Authentication and Key Agreement with Smart Cards. In: 5th International Conference on Information Assurance and Security, pp. 517–520 (2009)

    Google Scholar 

  12. Li, C.-T., Hwang, M.-S.: An Online Biometrics-based Secret Sharing Scheme for Multiparty Cryptosystem Using Smart Cards. International Journal of Innovative Computing, Information and Control (2009) (article in press)

    Google Scholar 

  13. Li, C.-T., Chu, Y.-P.: Cryptanalysis of threshold password authentication against guessing attacks in ad hoc networks. International Journal of Network Security 8(2), 166–168 (2009)

    Google Scholar 

  14. Li, C.-T.: An Efficient and Secure Communication Scheme for Trusted Computing Environments. Journal of Computers 20(3), 17–24 (2009)

    Google Scholar 

  15. Li, C.-T., Hwang, M.-S., Chu, Y.-P.: An Efficient Sensor-To-Sensor Authenticated Path-Key Establishment Scheme for Secure Communications in Wireless Sensor Networks. International Journal of Innovative Computing, Information and Control 5(8), 2107–2124 (2009)

    Google Scholar 

  16. Li, C.-T., Wei, C.-H., Chin, Y.-H.: A Secure Event Update Protocol for Peer-To-Peer Massively Multiplayer Online Games Against Masquerade Attacks. International Journal of Innovative Computing, Information and Control 5(12(A)), 4715–4723 (2009)

    Google Scholar 

  17. Li, C.-T., Lee, C.-C., Wang, L.-J.: A Two-Factor User Authentication Scheme Providing Mutual Authentication and Key Agreement over Insecure Channels. Journal of Information Assurance and Security 5(1), 201–208 (2010)

    Google Scholar 

  18. Li, C.-T., Wei, C.-H., Lee, C.-C., Chin, Y.-H., Wang, L.-J.: A Secure and Undeniable Billing Protocol among Charged Parties for Grid Computing Environments. International Journal of Innovative Computing, Information and Control (2010) (article in press)

    Google Scholar 

  19. Li, C.-T., Hwang, M.-S.: An Efficient Biometrics-based Remote User Authentication Scheme Using Smart Cards. Journal of Network and Computer Applications 33(1), 1–5 (2010)

    Article  MATH  Google Scholar 

  20. Li, C.-T., Hwang, M.-S.: A Batch Verifying and Detecting the Illegal Signatures. International Journal of Innovative Computing, Information and Control (2010) (article in press)

    Google Scholar 

  21. Hwang, M.-S., Tzeng, S.-F., Li, C.-T.: A New Nonrepudiable Threshold Proxy Signature Scheme with Valid Delegation Period. In: Gervasi, O., Gavrilova, M.L. (eds.) ICCSA 2007, Part III. LNCS, vol. 4707, pp. 273–284. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Li, CT., Lee, CC., Wang, LJ. (2010). On the Security Enhancement of an Efficient and Secure Event Signature Protocol for P2P MMOGs. In: Taniar, D., Gervasi, O., Murgante, B., Pardede, E., Apduhan, B.O. (eds) Computational Science and Its Applications – ICCSA 2010. ICCSA 2010. Lecture Notes in Computer Science, vol 6016. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-12156-2_45

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-12156-2_45

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-12155-5

  • Online ISBN: 978-3-642-12156-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics