Abstract
In 2008, Chan et al. presented an efficient and secure event signature (EASES) protocol for peer-to-peer massively multiplayer online games (P2P MMOGs). EASES could achieve non-repudiation, event commitment, save memory, bandwidth and reduce the complexity of the computations. However, we find that Chan et al. EASES protocol suffers from the passive attack and this attack will make a malicious attacker to impersonate any player to replay the event update messages for cheating. As a result, we introduce a simple countermeasure to prevent impersonate attack while the merits of the original EASES protocol are left unchanged.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Chan, M.-C., Hu, S.-Y., Jiang, J.-R.: An efficient and secure event signature (EASES) protocol for peer-to-peer massively multiplayer online games. Computer Networks 52(9), 1838–1845 (2008)
Corman, A., Douglas, S., Schachte, P., Teague, V.: A seucre event agreement (SEA) protocol for peer-to-peer games. In: The First International Conference on Availability, Reliability and Security (2006)
Dickey, C., Zappala, D., Lo, V., Marr, J.: Low lattency and cheat-proof event ordering for peer-to-peer games. In: Proceedings of the ACM International Workshop on Network and Operating System Support for Digital Audio and Video, pp. 134–139 (2004)
Li, C.-T., Hwang, M.-S., Chu, Y.-P.: Further improvement on a novel privacy preserving authentication and access control scheme for pervasive computing environments. Computer Communications 31(18), 4255–4258 (2008)
Li, C.-T., Hwang, M.-S., Chu, Y.-P.: A Secure and Efficient Communication Scheme with Authenticated Key Establishment and Privacy Preserving for Vehicular Ad Hoc Networks. Computer Communications 31(12), 2803–2814 (2008)
Li, C.-T., Hwang, M.-S., Liu, C.-Y.: An Electronic Voting Protocol with Deniable Authentication for Mobile Ad Hoc Networks. Computer Communications 31(10), 2534–2540 (2008)
Li, C.-T., Hwang, M.-S., Chu, Y.-P.: Improving the security of a secure anonymous routing protocol with authenticated key exchange for ad hoc networks. International Journal of Computer Systems Science and Engineering 23(3), 227–234 (2008)
Li, C.-T., Hwang, M.-S., Lai, Y.-C.: A Verifiable Electronic Voting Scheme Over the Internet. In: Proceedings of the 6th International Conference on Information Technology: New Generations, pp. 449–454 (2009)
Li, C.-T., Hwang, M.-S.: Improving the Security of Non-PKI Methods for Public Key Distribution. In: Proceedings of the 6th International Conference on Information Technology: New Generations, pp. 1695–1696 (2009)
Wei, C.-H., Chin, Y.-H., Li, C.-T.: A Secure Billing Protocol for Grid Computing. In: Proceedings of the 6th International Conference on Information Technology: New Generations, pp. 320–325 (2009)
Li, C.-T.: An Enhanced Remote User Authentication Scheme Providing Mutual Authentication and Key Agreement with Smart Cards. In: 5th International Conference on Information Assurance and Security, pp. 517–520 (2009)
Li, C.-T., Hwang, M.-S.: An Online Biometrics-based Secret Sharing Scheme for Multiparty Cryptosystem Using Smart Cards. International Journal of Innovative Computing, Information and Control (2009) (article in press)
Li, C.-T., Chu, Y.-P.: Cryptanalysis of threshold password authentication against guessing attacks in ad hoc networks. International Journal of Network Security 8(2), 166–168 (2009)
Li, C.-T.: An Efficient and Secure Communication Scheme for Trusted Computing Environments. Journal of Computers 20(3), 17–24 (2009)
Li, C.-T., Hwang, M.-S., Chu, Y.-P.: An Efficient Sensor-To-Sensor Authenticated Path-Key Establishment Scheme for Secure Communications in Wireless Sensor Networks. International Journal of Innovative Computing, Information and Control 5(8), 2107–2124 (2009)
Li, C.-T., Wei, C.-H., Chin, Y.-H.: A Secure Event Update Protocol for Peer-To-Peer Massively Multiplayer Online Games Against Masquerade Attacks. International Journal of Innovative Computing, Information and Control 5(12(A)), 4715–4723 (2009)
Li, C.-T., Lee, C.-C., Wang, L.-J.: A Two-Factor User Authentication Scheme Providing Mutual Authentication and Key Agreement over Insecure Channels. Journal of Information Assurance and Security 5(1), 201–208 (2010)
Li, C.-T., Wei, C.-H., Lee, C.-C., Chin, Y.-H., Wang, L.-J.: A Secure and Undeniable Billing Protocol among Charged Parties for Grid Computing Environments. International Journal of Innovative Computing, Information and Control (2010) (article in press)
Li, C.-T., Hwang, M.-S.: An Efficient Biometrics-based Remote User Authentication Scheme Using Smart Cards. Journal of Network and Computer Applications 33(1), 1–5 (2010)
Li, C.-T., Hwang, M.-S.: A Batch Verifying and Detecting the Illegal Signatures. International Journal of Innovative Computing, Information and Control (2010) (article in press)
Hwang, M.-S., Tzeng, S.-F., Li, C.-T.: A New Nonrepudiable Threshold Proxy Signature Scheme with Valid Delegation Period. In: Gervasi, O., Gavrilova, M.L. (eds.) ICCSA 2007, Part III. LNCS, vol. 4707, pp. 273–284. Springer, Heidelberg (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Li, CT., Lee, CC., Wang, LJ. (2010). On the Security Enhancement of an Efficient and Secure Event Signature Protocol for P2P MMOGs. In: Taniar, D., Gervasi, O., Murgante, B., Pardede, E., Apduhan, B.O. (eds) Computational Science and Its Applications – ICCSA 2010. ICCSA 2010. Lecture Notes in Computer Science, vol 6016. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-12156-2_45
Download citation
DOI: https://doi.org/10.1007/978-3-642-12156-2_45
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-12155-5
Online ISBN: 978-3-642-12156-2
eBook Packages: Computer ScienceComputer Science (R0)