Skip to main content

A Security-Focused Architecture for Gameplay Telemetry in Serious Games

  • Conference paper
  • First Online:
Games and Learning Alliance (GALA 2023)

Abstract

Serious games are a promising approach for diagnostic and therapeutic as well as educational purposes. Capturing player performance and behavior along with details of gameplay directly from the game is a valuable data source for evaluating serious games and for their iterative refinement. In many serious games, the collected data can however be especially sensitive for privacy, as it may imply learning or health state progression, and thus should be strongly protected. In this paper, we specify goals for a security-enhanced game telemetry system, model a security architecture based on them, and present the design of such a system, which we implemented for evaluation of health games in our research group. The presented system is designed to be applicable for various types of serious games. It employs end-to-end encryption, signatures, and data separation to improve protection of collected data without the addition of usability burdens on players from these security measures.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Barker, E., Chen, L., Roginsky, A., Vassilev, A., Davis, R.: Recommendation for pair-wise key-establishment schemes using discrete logarithm cryptography. Technical report, SP 800–56A, NIST (2018). https://doi.org/10.6028/nist.sp.800-56ar3

  2. Dworkin, M.J.: Recommendation for block cipher modes of operation: the CCM mode for authentication and confidentiality. Technical report, SP 800–38C, NIST (2007). https://doi.org/10.6028/nist.sp.800-38c

  3. Freire, M., Serrano-Laguna, Á., Iglesias, B.M., Martínez-Ortiz, I., Moreno-Ger, P., Fernández-Manjón, B.: Game learning analytics: learning analytics for serious games. In: Spector, M.J., Lockee, B.B., Childress, M.D. (eds.) Learning, Design, and Technology, pp. 1–29. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-17727-4_21-1

    Chapter  Google Scholar 

  4. Hansen, T., Eastlake, 3rd, D.E.: US Secure Hash Algorithms (SHA and SHA-based HMAC and HKDF). RFC 6234 (2011). https://doi.org/10.17487/RFC6234

  5. Heimo, O.I., et al.: Ethical gathering of exercise metrics from elderly: case jumppatikku. In: Kreps, D., Fletcher, G., Griffiths, M. (eds.) HCC 2016. IAICT, vol. 474, pp. 14–24. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-44805-3_2

    Chapter  Google Scholar 

  6. ISO/IEC JTC 1/SC 27: Information technology - Security techniques - Encryption algorithms - Part 2: Asymmetric ciphers. Standard ISO/IEC 18033–2:2006, ISO, Geneva, CH (2006)

    Google Scholar 

  7. ITU-T: Information technology - Open Systems Interconnection - The Directory: Public-key and attribute certificate frameworks. Standard ITU-T X.509 (10/2019) / ISO/IEC 9594–8, ITU (2019). https://handle.itu.int/11.1002/1000/14033

  8. Koblitz, N.: Elliptic curve cryptosystems. Math. Comput. 48(177), 203–209 (1987). https://doi.org/10.1090/s0025-5718-1987-0866109-5

    Article  MathSciNet  MATH  Google Scholar 

  9. Moriarty, K., Kaliski, B., Jonsson, J., Rusch, A.: PKCS #1: RSA Cryptography Specifications Version 2.2. RFC 8017 (2016). https://doi.org/10.17487/RFC8017

  10. NIST: Advanced Encryption Standard (AES). Standard FIPS 197, NIST (2023). https://doi.org/10.6028/NIST.FIPS.197-upd1

  11. Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978). https://doi.org/10.1145/359340.359342

    Article  MathSciNet  MATH  Google Scholar 

Download references

Acknowledgements

Our research project Senior Health Games is partially funded by the Carl Zeiss Foundation (CZS Transfer program).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Stefan Bodenschatz .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Bodenschatz, S., Mentler, T., Rezk-Salama, C. (2024). A Security-Focused Architecture for Gameplay Telemetry in Serious Games. In: Dondio, P., et al. Games and Learning Alliance. GALA 2023. Lecture Notes in Computer Science, vol 14475. Springer, Cham. https://doi.org/10.1007/978-3-031-49065-1_41

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-49065-1_41

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-49064-4

  • Online ISBN: 978-3-031-49065-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics