Support for resilient Peer-to-Peer gaming

In areas such as Massively-Multiplayer Online Games (MMOGs), the conventional centralized server model does not scale with the sheer number of simultaneous clients that need to be supported. P2P architectures are increasingly being considered as replacements for traditional client-server architectures in MMOGs. A distributed P2P architecture that uses ''Coordinator'' nodes for handling smaller groups of players has been shown to be especially effective in supporting MMOGs. However, the drawback of moving from centralized to distributed architectures is the loss of control, and more specifically the increase in the vulnerability of the system as a whole to compromises. There has been no prior work on handling the specific case when the Coordinator itself is compromised and cheats, a scenario akin to cheating conducted by the network. We address this problem by proposing an architecture that is resilient to Coordinator compromises and demonstrate the effectiveness of this architecture. We believe that this is an essential step towards enabling a widespread deployment of P2P-based MMOGs.

[1]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[2]  Michael K. Reiter,et al.  Crowds: anonymity for Web transactions , 1998, TSEC.

[3]  Brian Neil Levine,et al.  Supporting P2P gaming when players have heterogeneous resources , 2005, NOSSDAV '05.

[4]  Angelos D. Keromytis,et al.  SOS: secure overlay services , 2002, SIGCOMM '02.

[5]  Daniel Zappala,et al.  Low latency and cheat-proof event ordering for peer-to-peer games , 2004, NOSSDAV '04.

[6]  Brian Neil Levine,et al.  Responder anonymity and anonymous peer-to-peer file sharing , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.

[7]  David R. Karger,et al.  Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.

[8]  Paul Ferguson,et al.  Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing , 1998, RFC.

[9]  Li Xiao,et al.  Mutual anonymity protocols for hybrid peer-to-peer systems , 2003, 23rd International Conference on Distributed Computing Systems, 2003. Proceedings..

[10]  Yang Zongkai,et al.  A new fair micropayment system based on hash chain , 2004, IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004.

[11]  Brian Neil Levine,et al.  A protocol for anonymous communication over the Internet , 2000, CCS.

[12]  Stefan Saroiu,et al.  Measurement and Analysis of Spyware in a University Environment , 2004, NSDI.

[13]  Nick G. Duffield,et al.  Simple network performance tomography , 2003, IMC '03.

[14]  Angelos D. Keromytis,et al.  SOS: secure overlay services , 2002, SIGCOMM 2002.

[15]  Antony I. T. Rowstron,et al.  Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems , 2001, Middleware.

[16]  Ben Y. Zhao,et al.  Tapestry: a resilient global-scale overlay for service deployment , 2004, IEEE Journal on Selected Areas in Communications.

[17]  Brian Neil Levine,et al.  Cheat-proof playout for centralized and distributed online games , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).

[18]  Paul F. Syverson,et al.  Proxies for anonymous routing , 1996, Proceedings 12th Annual Computer Security Applications Conference.

[19]  Stefan Saroiu,et al.  Measurement and analysis of spywave in a university environment , 2004 .

[20]  Philip K. McKinley,et al.  On the cost-quality tradeoff in topology-aware overlay path probing , 2003, 11th IEEE International Conference on Network Protocols, 2003. Proceedings..

[21]  Mark Claypool,et al.  The effect of latency on user performance in Warcraft III , 2003, NetGames '03.

[22]  Honghui Lu,et al.  Peer-to-peer support for massively multiplayer games , 2004, IEEE INFOCOM 2004.

[23]  Helen J. Wang,et al.  An evaluation of scalable application-level multicast built using peer-to-peer overlays , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[24]  Insup Lee,et al.  Is runtime verification applicable to cheat detection? , 2004, NetGames '04.