Secure Covert Channels in Multiplayer Games

被引:0
|
作者
Diehl, Malte [1 ]
机构
[1] Carl von Ossietzky Univ Oldenburg, Dept Comp Sci, D-26111 Oldenburg, Germany
关键词
Steganography; game theory; information theory; information hiding; security;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Steganography is the art of hidden communication. In recent years, some publications presented approaches to transmit hidden information for different purposes via covert channels provided by games. These approaches used rather ad-hoc techniques to reach their objectives without establishing notions of steganographic security in their domain and applying them to review their solution. Therefore, this paper both theoretically and practically tackles the question how to implement secure steganography for games. First, we recall the necessary game-theoretic basics from which we derive a notion of steganographic security for game-based methods that depends on strategy imitation. This is followed by a general information-theoretic analysis of games to calculate the total amount of information that is sent during a game and the share that can be used securely for game-theoretic steganography. Second, based on our game-theoretic framework, we present a secure steganographic system for a simplified version of poker that serves as a proof of concept. Its features are evaluated and compared to the theoretical results. Despite its security, the system can replace over 50% of the cover data with steganographic information. Further advantages of our method are that no large cover messages are needed and that it can be used for steganographic streaming.
引用
收藏
页码:117 / 122
页数:6
相关论文
共 50 条
  • [31] NETWORKS AND THEIR TRAFFIC IN MULTIPLAYER GAMES
    Melo Lopez, Cristian Andres
    Salcedo Parra, Octavio Jose
    Gallego Torres, Andres
    REVISTA CIENTIFICA, 2016, 1 (24):
  • [32] Fundamental Limits of Quantum-Secure Covert Communication over Bosonic Channels
    Bullock, Michael S.
    Gagatsos, Christos N.
    Guha, Saikat
    Bash, Boulat A.
    2019 57TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON), 2019, : 56 - 63
  • [33] Fundamental Limits of Quantum-Secure Covert Communication Over Bosonic Channels
    Bullock, Michael S.
    Gagatsos, Christos N.
    Guha, Saikat
    Bash, Boulat A.
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2020, 38 (03) : 471 - 482
  • [34] Secure Signaling Games For Gaussian Multiple Access Wiretap Channels
    Ge, Hao
    Xu, Ruijie
    Berry, Randall A.
    2015 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2015, : 111 - 115
  • [35] An efficient and secure event signature (EASES) protocol for peer-to-peer massively multiplayer online games
    Chan, Mo-Che
    Hu, Shun-Yun
    Jiang, Jehn-Ruey
    COMPUTER NETWORKS, 2008, 52 (09) : 1838 - 1845
  • [36] An efficient and secure event signature (EASES) protocol for peer-to-peer massively multiplayer online games
    Chan, Mo-Che
    Hu, Shun-Yun
    Jiang, Jehn-Ruey
    NETWORKING 2007: AD HOC AND SENSOR NETWORKS, WIRELESS NETWORKS, NEXT GENERATION INTERNET, PROCEEDINGS, 2007, 4479 : 1037 - +
  • [37] Cryptanalysis of an efficient and secure event signature protocol for peer-to-peer massively multiplayer online games
    Wei, C. H.
    Chin, Y. H.
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2009, 3 (03): : 1 - 7
  • [38] Game Time Modeling and Analyzing Time in Multiplayer and Massively Multiplayer Games
    Tychsen, Anders
    Hitchens, Michael
    GAMES AND CULTURE, 2009, 4 (02) : 170 - 201
  • [39] Introspection Dynamics in Asymmetric Multiplayer Games
    Couto, Marta C.
    Pal, Saptarshi
    DYNAMIC GAMES AND APPLICATIONS, 2023, 13 (4) : 1256 - 1285
  • [40] Toxicity Detection in Multiplayer Online Games
    Martens, Marcus
    Shen, Siqi
    Iosup, Alexandru
    Kuipers, Fernando
    2015 INTERNATIONAL WORKSHOP ON NETWORK AND SYSTEMS SUPPORT FOR GAMES (NETGAMES), 2015,