Abstract
This paper is a study on the development of games in the IoT(Internet of Things) environment. For this purpose, this paper will first introduce the IoT technology and describe the ways for applying this technology into the game. Second, game planning factors for IoT environment such as graphics, sound, scenario, interface characters and items are described. Lastly, factors to consider when developing the secure games in the IoT environment are described. This paper can be beneficial to the developers who attempts to plan and implement the games in the IoT environment.
Similar content being viewed by others
References
Kim, D., Kim, S.: IOT technology and development direction. Inf. Commun. 28(9), 49–57 (2011)
Pyo, C., Kang, H.: IoT(M2M) technology trends and development prospects. Inf Commun, 1–10(2013)
Kim, H., Kim, D.: IoT technologies and security. J. Inf. Secur. 22(1), 7–13 (2012)
Jeong, Y.S., Lee, S.H.: u-Healthcare service authentication protocol based on RFID technology. J. Dig. Policy Manag. 11(2), 153–159 (2012)
Atzori, L., Iera, Ao, Morabito, G.: The Internet of things: a survey, computer networks. Comp. Netw. 54(15), 2787–2805 (2010)
Kim, H.: USN established industrial development strategy. Ministry of Knowledge Economy, (2011)
Kocca, IoT is going to open up a new world, CT issue analysis, Kocca, vol. 33, (2013)
Yoo, K.-S., Jaung, J.-B., Cho, O.-H., et al.: A study on the efficient planning element for game contents. J. KCGS, 18 (2008)
Lee, M.J., Kim, K.: A study on for the online gaming technology elements to be considered in the initial gane design. J. KCGS, 3(2) (2003)
Kim, H.J.: Analysis of planning component for successive game development based on on-line game. J. KCGS 7, (2009)
Lee, M.J.: A study on convergence development direction of gesture recognition game. J. Korea Converg. Soc. 5(4) (2014)
Mäyrä, F., Heljakka, K., Seisto, A.: Physical and Digital in Games and Play. ETC Press, Madison (2013)
Lee, M.J.: A study on IoT service for game development. J. Dig. Converg 13(2) (2015)
Vermesan, O.: Internet of things covering technologies for smart environment, ITU internet reports. Internet Things, (2005)
Choi, S.: Study on model fostering for cloud service brokerage. J. Comp. Virol. Hacking Tech. 11(3), 181–192 (2015)
Lee, A.: Authentication scheme for smart learning system in the cloud computing environment. J. Comp. Virol. Hacking Tech. 11(3), 149–155 (2015)
Hyeon, S., Park, H., Chan Bang, H., Kim, D.-H.: An indoor location tracking based on mobile RFID for smart exhibition service, short communication. J. Comp. Virol. Hacking Tech. 10(2), 89–96 (2014)
Broucek, V., Turner, P.: Technical, legal and ethical dilemmas: distinguishing risks arising from malware and cyber-attack tools, in the ‘cloud’–a forensic computing perspective. J. Comp. Virol. Hacking Tech. 9(1), 27–33 (2013)
Acknowledgments
This research is supported by 2015 Baekseok University Fund.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
MyounJae, L. Secure game development for IoT environment. J Comput Virol Hack Tech 12, 125–130 (2016). https://doi.org/10.1007/s11416-015-0255-x
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11416-015-0255-x