Skip to main content
Log in

Secure game development for IoT environment

  • Short Contribution
  • Published:
Journal of Computer Virology and Hacking Techniques Aims and scope Submit manuscript

Abstract

This paper is a study on the development of games in the IoT(Internet of Things) environment. For this purpose, this paper will first introduce the IoT technology and describe the ways for applying this technology into the game. Second, game planning factors for IoT environment such as graphics, sound, scenario, interface characters and items are described. Lastly, factors to consider when developing the secure games in the IoT environment are described. This paper can be beneficial to the developers who attempts to plan and implement the games in the IoT environment.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Kim, D., Kim, S.: IOT technology and development direction. Inf. Commun. 28(9), 49–57 (2011)

    Google Scholar 

  2. Pyo, C., Kang, H.: IoT(M2M) technology trends and development prospects. Inf Commun, 1–10(2013)

  3. Kim, H., Kim, D.: IoT technologies and security. J. Inf. Secur. 22(1), 7–13 (2012)

    Google Scholar 

  4. Jeong, Y.S., Lee, S.H.: u-Healthcare service authentication protocol based on RFID technology. J. Dig. Policy Manag. 11(2), 153–159 (2012)

    MathSciNet  Google Scholar 

  5. Atzori, L., Iera, Ao, Morabito, G.: The Internet of things: a survey, computer networks. Comp. Netw. 54(15), 2787–2805 (2010)

    Article  MATH  Google Scholar 

  6. Kim, H.: USN established industrial development strategy. Ministry of Knowledge Economy, (2011)

  7. Kocca, IoT is going to open up a new world, CT issue analysis, Kocca, vol. 33, (2013)

  8. Yoo, K.-S., Jaung, J.-B., Cho, O.-H., et al.: A study on the efficient planning element for game contents. J. KCGS, 18 (2008)

  9. Lee, M.J., Kim, K.: A study on for the online gaming technology elements to be considered in the initial gane design. J. KCGS, 3(2) (2003)

  10. Kim, H.J.: Analysis of planning component for successive game development based on on-line game. J. KCGS 7, (2009)

  11. Lee, M.J.: A study on convergence development direction of gesture recognition game. J. Korea Converg. Soc. 5(4) (2014)

  12. Mäyrä, F., Heljakka, K., Seisto, A.: Physical and Digital in Games and Play. ETC Press, Madison (2013)

    Google Scholar 

  13. Lee, M.J.: A study on IoT service for game development. J. Dig. Converg 13(2) (2015)

  14. Vermesan, O.: Internet of things covering technologies for smart environment, ITU internet reports. Internet Things, (2005)

  15. Choi, S.: Study on model fostering for cloud service brokerage. J. Comp. Virol. Hacking Tech. 11(3), 181–192 (2015)

    Article  Google Scholar 

  16. Lee, A.: Authentication scheme for smart learning system in the cloud computing environment. J. Comp. Virol. Hacking Tech. 11(3), 149–155 (2015)

    Article  Google Scholar 

  17. Hyeon, S., Park, H., Chan Bang, H., Kim, D.-H.: An indoor location tracking based on mobile RFID for smart exhibition service, short communication. J. Comp. Virol. Hacking Tech. 10(2), 89–96 (2014)

    Article  Google Scholar 

  18. Broucek, V., Turner, P.: Technical, legal and ethical dilemmas: distinguishing risks arising from malware and cyber-attack tools, in the ‘cloud’–a forensic computing perspective. J. Comp. Virol. Hacking Tech. 9(1), 27–33 (2013)

    Article  Google Scholar 

Download references

Acknowledgments

This research is supported by 2015 Baekseok University Fund.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lee MyounJae.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

MyounJae, L. Secure game development for IoT environment. J Comput Virol Hack Tech 12, 125–130 (2016). https://doi.org/10.1007/s11416-015-0255-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11416-015-0255-x

Keywords

Navigation