Games based on active NFC objects: Model and security requirements

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Cheating in video games is a critical financial matter for game developers. With games now integrating physical objects through NFC, new cheating techniques have emerged, including characteristic boosting of the objects, duplication of objects and introduction of new unauthorized objects. In this paper, we address this problem for games based on active NFC objects. Having active objects in a game allows for new possibilities of interaction yet to be seen, including offline interactions between objects outside of the game. We identify four top security requirements for these games to remain resistant to cheating activities. This analysis is original as it introduces a new model with active NFC objects. Our system is composed of a server, a device (computer, console or smartphone) equipped with an NFC reader, and NFC objects. We perform a risk analysis to identify the weak points of this base system. We list several realistic attacks exploiting the system's weaknesses. Finally, to address them, we design four cost effective security requirements.

Original languageEnglish
Title of host publication2015 International Workshop on Network and Systems Support for Games, NetGames 2015
PublisherIEEE Computer Society
ISBN (Electronic)9781509000685
DOIs
Publication statusPublished - 13 Jan 2016
Externally publishedYes
EventInternational Workshop on Network and Systems Support for Games, NetGames 2015 - Zagreb, Croatia
Duration: 3 Dec 20154 Dec 2015

Publication series

NameAnnual Workshop on Network and Systems Support for Games
Volume2016-January
ISSN (Print)2156-8138
ISSN (Electronic)2156-8146

Conference

ConferenceInternational Workshop on Network and Systems Support for Games, NetGames 2015
Country/TerritoryCroatia
CityZagreb
Period3/12/154/12/15

Fingerprint

Dive into the research topics of 'Games based on active NFC objects: Model and security requirements'. Together they form a unique fingerprint.

Cite this