Abstract
Synchronization protocols based on “dead-reckoning” are vulnerable to a popular type of cheat called speed-hack. A speed-hack helps a cheater to gain unfair advantages by essentially speeding up the actions of the avatar controlled by the cheater, so that the cheater can move, explore and gather items faster than honest players. This paper presents a novel version of a dead-reckoning protocol that is invulnerable to speed-hacks. Existing games based on dead-reckoning can easily be modified to use this hack-proof dead-reckoning protocol and how the protocol works on both client-server architecture and peer-to-peer (P2P) architecture will be demonstrated in this paper.
Similar content being viewed by others
References
Banavar H, Aggarwal S, Khandelwal A (2004) Accuracy in dead-reckoning based distributed multi-player games. In: Proceedings of NetGames 2004, Portland, August 2004, pp 161–165
Baughman NE, Levine BN (2001) Cheat-proof playout for centralized and distributed online games. In: Proceedings of IEEE INFOCOM. IEEE, Piscataway, pp 104–113
Counter Hack (2007) Types of Hacks. http://wiki.counter-hack.net/CategoryGeneralInfo
DeLap M et al (2004) Is runtime verification applicable to cheat detection. In: Proceedings of NetGames 2004, Portland, August 2004, pp 134–138
Diot C, Gautier L (1999) A distributed architecture for multiplayer interactive applications on the internet. In: IEEE Networks magazine, Jul–Aug 1999
Diot C, Gautier L, Kurose J (1999) End-to-end transmission control mechanisms for multiparty interactive applications on the internet. In: Proceedings of IEEE INFOCOM, IEEE, Piscataway
Even Balance (2007) Official PunkBuster website. http://www.evenbalance.com
Feng WC, Feng WC, Chang F, Walpole J (2005) A traffic characterization of popular online games. IEEE/ACM Trans Netw 13(3):488–500
Gautier L, Diot C (1998) Design and evaluation of mimaze, a multiplayer game on the Internet. In: Proceedings of IEEE Multimedia (ICMCS’98). IEEE, Piscataway
Jamin S, Cronin E, Filstrup B (2003) Cheat-proofing dead reckoned multiplayer games (extended abstract). In: Proc. of 2nd international conference on application and development of computer games, Hong Kong, 6–7 January 2003
Lee FW, Li L, Lau R (2006) A trajectory-preserving synchronization method for collaborative visualization. IEEE Trans Vis Comput Graph 12:989–996 (special issue on IEEE Visualization’06)
Lenker S, Lee H, Kozlowski E, Jamin S (2002) Synchronization and cheat-proofing protocol for real-time multiplayer games. In: International Worshop on Entertainment Computing, Makuhari, May 2002
Lo V, GauthierDickey C, Zappala D, Marr J (2004) Low latency and cheatproof event ordering for peer-to-peer games. In: ACM NOSSDAV’04, Kinsale, June 2004
Mills DL (1992) Network time protocol (version 3) specification, implmentation and analysis. In: RFC-1305, March 1992
MPC Forums (2007) Multi-Player Cheats. http://www.mpcforum.com
Pantel L, Wolf L (2002) On the impact of delay on real-time multiplayer games. In: ACM NOSSDAV’02, Miami Beach, May 2002
Schachte P, Corman AB, Douglas S, Teague V (2006) A secure event agreement (sea) protocol for peer-to-peer games. In: Proceedings of ARES’06, Vienna, 20–22 April 2006, pp 34–41
Simpson ZB (2008) A stream based time synchronization technique for networked computer games. http://www.mine-control.com/zack/timesync/timesync.html
Soh S, Webb S, Lau W (2007) Racs: a referee anti-cheat scheme for p2p gaming. In: Proceedings of NOSSDAV’07, Urbana-Champaign, 4–5 June 2007, pp 34–42
The Z Project (2007) Official HLGuard website. http://www.thezproject.org
Wikipedia (2007) Category: Anti-cheat software. http://en.wikipedia.org/wiki/Category:Anti-cheat_software
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Fung, Y.S., Lui, J.C.S. Hack-proof synchronization protocol for multi-player online games. Multimed Tools Appl 41, 305–331 (2009). https://doi.org/10.1007/s11042-008-0230-3
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-008-0230-3