Skip to main content
Erschienen in: Journal of Computer Virology and Hacking Techniques 3/2016

01.08.2016 | Short Contribution

Secure game development for IoT environment

verfasst von: Lee MyounJae

Erschienen in: Journal of Computer Virology and Hacking Techniques | Ausgabe 3/2016

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This paper is a study on the development of games in the IoT(Internet of Things) environment. For this purpose, this paper will first introduce the IoT technology and describe the ways for applying this technology into the game. Second, game planning factors for IoT environment such as graphics, sound, scenario, interface characters and items are described. Lastly, factors to consider when developing the secure games in the IoT environment are described. This paper can be beneficial to the developers who attempts to plan and implement the games in the IoT environment.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Kim, D., Kim, S.: IOT technology and development direction. Inf. Commun. 28(9), 49–57 (2011) Kim, D., Kim, S.: IOT technology and development direction. Inf. Commun. 28(9), 49–57 (2011)
2.
Zurück zum Zitat Pyo, C., Kang, H.: IoT(M2M) technology trends and development prospects. Inf Commun, 1–10(2013) Pyo, C., Kang, H.: IoT(M2M) technology trends and development prospects. Inf Commun, 1–10(2013)
3.
Zurück zum Zitat Kim, H., Kim, D.: IoT technologies and security. J. Inf. Secur. 22(1), 7–13 (2012) Kim, H., Kim, D.: IoT technologies and security. J. Inf. Secur. 22(1), 7–13 (2012)
4.
Zurück zum Zitat Jeong, Y.S., Lee, S.H.: u-Healthcare service authentication protocol based on RFID technology. J. Dig. Policy Manag. 11(2), 153–159 (2012)MathSciNet Jeong, Y.S., Lee, S.H.: u-Healthcare service authentication protocol based on RFID technology. J. Dig. Policy Manag. 11(2), 153–159 (2012)MathSciNet
5.
Zurück zum Zitat Atzori, L., Iera, Ao, Morabito, G.: The Internet of things: a survey, computer networks. Comp. Netw. 54(15), 2787–2805 (2010)CrossRefMATH Atzori, L., Iera, Ao, Morabito, G.: The Internet of things: a survey, computer networks. Comp. Netw. 54(15), 2787–2805 (2010)CrossRefMATH
6.
Zurück zum Zitat Kim, H.: USN established industrial development strategy. Ministry of Knowledge Economy, (2011) Kim, H.: USN established industrial development strategy. Ministry of Knowledge Economy, (2011)
7.
Zurück zum Zitat Kocca, IoT is going to open up a new world, CT issue analysis, Kocca, vol. 33, (2013) Kocca, IoT is going to open up a new world, CT issue analysis, Kocca, vol. 33, (2013)
8.
Zurück zum Zitat Yoo, K.-S., Jaung, J.-B., Cho, O.-H., et al.: A study on the efficient planning element for game contents. J. KCGS, 18 (2008) Yoo, K.-S., Jaung, J.-B., Cho, O.-H., et al.: A study on the efficient planning element for game contents. J. KCGS, 18 (2008)
9.
Zurück zum Zitat Lee, M.J., Kim, K.: A study on for the online gaming technology elements to be considered in the initial gane design. J. KCGS, 3(2) (2003) Lee, M.J., Kim, K.: A study on for the online gaming technology elements to be considered in the initial gane design. J. KCGS, 3(2) (2003)
10.
Zurück zum Zitat Kim, H.J.: Analysis of planning component for successive game development based on on-line game. J. KCGS 7, (2009) Kim, H.J.: Analysis of planning component for successive game development based on on-line game. J. KCGS 7, (2009)
11.
Zurück zum Zitat Lee, M.J.: A study on convergence development direction of gesture recognition game. J. Korea Converg. Soc. 5(4) (2014) Lee, M.J.: A study on convergence development direction of gesture recognition game. J. Korea Converg. Soc. 5(4) (2014)
12.
Zurück zum Zitat Mäyrä, F., Heljakka, K., Seisto, A.: Physical and Digital in Games and Play. ETC Press, Madison (2013) Mäyrä, F., Heljakka, K., Seisto, A.: Physical and Digital in Games and Play. ETC Press, Madison (2013)
13.
Zurück zum Zitat Lee, M.J.: A study on IoT service for game development. J. Dig. Converg 13(2) (2015) Lee, M.J.: A study on IoT service for game development. J. Dig. Converg 13(2) (2015)
14.
Zurück zum Zitat Vermesan, O.: Internet of things covering technologies for smart environment, ITU internet reports. Internet Things, (2005) Vermesan, O.: Internet of things covering technologies for smart environment, ITU internet reports. Internet Things, (2005)
15.
Zurück zum Zitat Choi, S.: Study on model fostering for cloud service brokerage. J. Comp. Virol. Hacking Tech. 11(3), 181–192 (2015)CrossRef Choi, S.: Study on model fostering for cloud service brokerage. J. Comp. Virol. Hacking Tech. 11(3), 181–192 (2015)CrossRef
16.
Zurück zum Zitat Lee, A.: Authentication scheme for smart learning system in the cloud computing environment. J. Comp. Virol. Hacking Tech. 11(3), 149–155 (2015)CrossRef Lee, A.: Authentication scheme for smart learning system in the cloud computing environment. J. Comp. Virol. Hacking Tech. 11(3), 149–155 (2015)CrossRef
17.
Zurück zum Zitat Hyeon, S., Park, H., Chan Bang, H., Kim, D.-H.: An indoor location tracking based on mobile RFID for smart exhibition service, short communication. J. Comp. Virol. Hacking Tech. 10(2), 89–96 (2014)CrossRef Hyeon, S., Park, H., Chan Bang, H., Kim, D.-H.: An indoor location tracking based on mobile RFID for smart exhibition service, short communication. J. Comp. Virol. Hacking Tech. 10(2), 89–96 (2014)CrossRef
18.
Zurück zum Zitat Broucek, V., Turner, P.: Technical, legal and ethical dilemmas: distinguishing risks arising from malware and cyber-attack tools, in the ‘cloud’–a forensic computing perspective. J. Comp. Virol. Hacking Tech. 9(1), 27–33 (2013)CrossRef Broucek, V., Turner, P.: Technical, legal and ethical dilemmas: distinguishing risks arising from malware and cyber-attack tools, in the ‘cloud’–a forensic computing perspective. J. Comp. Virol. Hacking Tech. 9(1), 27–33 (2013)CrossRef
Metadaten
Titel
Secure game development for IoT environment
verfasst von
Lee MyounJae
Publikationsdatum
01.08.2016
Verlag
Springer Paris
Erschienen in
Journal of Computer Virology and Hacking Techniques / Ausgabe 3/2016
Elektronische ISSN: 2263-8733
DOI
https://doi.org/10.1007/s11416-015-0255-x

Weitere Artikel der Ausgabe 3/2016

Journal of Computer Virology and Hacking Techniques 3/2016 Zur Ausgabe