Trust Enforcement in Peer-to-Peer Massive Multi-player Online Games

  • Adam Wierzbicki
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4276)


The development of complex applications that use the Peer-to-Peer computing model is restrained by security and trust management concerns, despite evident performance benefits. An example of such an application of P2P computing is P2P Massive Multi-user Online Games, where cheating by players is simple without centralized control or specialized trust management mechanisms. The article presents new techniques for trust enforcement that use cryptographic methods and are adapted to the dynamic membership and resources of P2P systems. The proposed approach to trust management differs significantly from previous work in the area that mainly used reputation. The paper describes a comprehensive trust management infrastructure fore P2P MMO games that enables to recognize and exclude cheating players while keeping the performance overhead as low as possible. While the architecture requires trusted centralized components (superpeers), their role in trust management is limited to a minimum and the performance gains of using the P2P computing model are preserved.


Trust Management Reputation System Private State Sybil Attack Byzantine Agreement 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Wierzbicki, A., Kucharski, T.: P2P Scrabble. Can P2P games commence? In: Fourth International IEEE Conference on Peer-to-Peer Computing, Zurich, August 2004, pp. 100–107 (2004)Google Scholar
  2. 2.
    Wierzbicki, A., Kucharski, T.: Fair and Scalable P2P Games of Turns. In: Eleventh International Conference on Parallel and Distributed Systems (ICPADS 2005), Fukuoka, Japan, pp. 250–256 (2005)Google Scholar
  3. 3.
    Knutsson, B., Lu, H., Xu, W., Hopkins, B.: Peer-to-Peer Support for Massively Multiplayer Games. In: IEEE INFOCOM 2004 (2004)Google Scholar
  4. 4.
    Baughman, N.E., Levine, B.: Cheat-proof playout for centralized and distributed online games. In: INFOCOM 2001, pp. 104–113 (2001)Google Scholar
  5. 5.
    Berglund, E.J., Cheriton, D.R.: Amaze: A multiplayer computer game. IEEE Software 2(1) (1985)Google Scholar
  6. 6., Inc., The butterfly grid: A distributed platform for online games (2003),
  7. 7.
    Sheldon, N., Girard, E., Borg, S., Claypool, M., Agu, E.: The effect of latency on user performance in Warcraft III. In: 2nd Workshop on Network and System Support for Games (NetGames 2003), pp. 3–14 (2003)Google Scholar
  8. 8.
    Menezes, J., van Oorschot, P.C., Vanstone, S.A.: Handbook of applied cryptography. CRC Press, Boca Raton (1996)CrossRefGoogle Scholar
  9. 9.
    Lamport, L., Shostak, R., Pease, M.: Byzantine Generals Problem. ACM Trans. on Programming Laguages and Systems 4(3), 382–401 (1982)MATHCrossRefGoogle Scholar
  10. 10.
    Selberg, E.W.: How to Stop A Cheater: Secret Sharing with Dishonest Participation. Carnegie Mellon University (1993)Google Scholar
  11. 11.
    Tompa, M., Woll, H.: How to share a secret with cheaters, Research Report RC 11840, IBM Research Division (1986)Google Scholar
  12. 12.
    Wierzbicki, R.S., Świerczewski, D., Znojek, M.: Rhubarb: a Tool for Developing Scalable and Secure Peer-to-Peer Applications. In: Second IEEE Int. Conf. Peer-to-Peer Computing, P2P 2002 (2002)Google Scholar
  13. 13.
    Douceur, J.R.: The Sybil Attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, p. 251. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  14. 14.
    Burmester, M., Desmedt, Y.: Is hierarchical Public-Key Certification the next target for hackesr? ACM Communications 47(8) (August 2004)Google Scholar
  15. 15.
    Agrawal, D., et al.: An Integrated Solution for Secure Group Communication in Wide-Area Netwokrs. In: Proc. 6th IEEE Symposium on Comp. and Comm., pp. 22–28 (July 2001)Google Scholar
  16. 16.
    IETF, SPKI Working group,
  17. 17.
    Zona Inc. Terazona: Zona application framework white paper (2002),
  18. 18.
    Yoshino, H., et al.: Byzantine Agreement Protocol Using Hierarchical Groups. In: Proc. International Conference on Parallel and Distributed Systems (2005)Google Scholar
  19. 19.
    Nguyen, H.N., Morino, H.: A Key Management Scheme for Mobile Ad Hoc Networks Based on Threshold Cryptography for Providing Fast Authentication and Low Signaling Load. In: Enokido, T., Yan, L., Xiao, B., Kim, D.Y., Dai, Y.-S., Yang, L.T. (eds.) EUC-WS 2005. LNCS, vol. 3823, pp. 905–915. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  20. 20.
    Mui, L.: Computational Models of Trust and Reputation: Agents, Evolutionary Games, and Social Networks, Ph.D. Dissertation, Massachusetts Institute of Technology (2003)Google Scholar
  21. 21.
    Aberer, K., Despotovic, Z.: Managing Trust in a Peer-To-Peer Information System. In: Proc. tenth int. conf. Information and knowledge management, pp. 310–317 (2001)Google Scholar
  22. 22.
    Yu, B., Singh, M.: An Evidential Model of Distributed Reputation Management. In: Proc. first int. joint conf. Autonomous agents and multiagent sys., part 1, pp. 294–301 (2002)Google Scholar
  23. 23.
    Gmytrasiewicz, P., Durfee, E.: Toward a theory of honesty and trust among communicating autonomous agents Group Decision and Negotiation  2, 237–258 (1993)Google Scholar
  24. 24.
    Iimura, T., Hazeyama, H., Kadobayashi, Y.: Zoned Federation of Game Servers: a Peer-to-peer Approach to Scalable Multi-player Online Games. In: Proc. ACM SIGCOMM (2004)Google Scholar
  25. 25.
    Chen, B., Maheswaran, M.: Zoned Federation of Game Servers: a Peer-to-peer Approach to Scalable Multi-player Online Games. In: Proc. ACM SIGCOMM (2004)Google Scholar
  26. 26.
    Zhao, W., Varandharajan, V., Mu, Y.: A Secure Mental Poker Protocol Over The Internet. In: Proc. Australasian Information Security Workshop (AISW 2003) (2003)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Adam Wierzbicki
    • 1
  1. 1.Polish-Japanese Institute of Information TechnologyWarsawPoland

Personalised recommendations