Information Security Challenges in Mobile Gaming Applications
Maksim Zakopailov , CEO at uniQore LLC Orlando, FL, USAAbstract
This article addresses the issues related to ensuring information security in mobile gaming applications. The rapid growth of this sector is accompanied by a surge in cyber threats, primarily targeting user data compromise, scenario manipulation, and unauthorized access to application functionality. The technical complexity of such systems—particularly those interacting with cloud and edge computing infrastructures—has given rise to a range of new vulnerabilities that fall outside the scope of traditional security measures. The aim of this study is to identify and systematize the problem areas in securing mobile games, particularly at the intersection of network architecture, user behavior, and cryptographic solutions. A review of the academic literature reveals a disconnect: while individual aspects such as authentication and encryption are explored in depth, architectural and behavioral risks are often treated superficially. This work categorizes the key threats and emphasizes how poor coordination between application design, technical implementation, and user practices creates a vulnerable environment—especially in the context of widespread use of third-party SDKs and monetization systems. The article presents indicative performance estimates for encryption and authentication mechanisms to provide an initial assessment of their applicability. The author’s contribution lies in integrating interdisciplinary approaches to analyzing the security of mobile gaming solutions and highlighting areas that remain underexplored in the current literature. The material will be of interest to cybersecurity specialists, developers, digital communication researchers, and interface designers.
Keywords
authentication, gamification, information security, mobile gaming applications, network threats, encryption
References
Agrawal A. A survey on analyzing encrypted network traffic of mobile devices / A. Agrawal, A. Bhatia, A. Bahuguna, K. Tiwari, K. Haribabu, D. Vishwakarma, R. Kaushik // International Journal of Information Security. – 2022. – Vol. 21. – No. 4. – Pp. 873-915.
Bae J. A recommending system for mobile games using the dynamic nonparametric model / J. Bae, J. Park, J. Choi, Soh S. Bum // Journal of Business Research. – 2023. – Vol. 167.
Bank D. Problematic monetization in mobile games in the context of the human right to economic self-determination / D. Bank // Computers in Human Behavior. – 2023. – Vol. 149.
Hoang T.M. An integrated two-factor authentication scheme for smart communications and control systems / T.M. Hoang, V.H. Bui, N.H. Nguyen // Mendel. – 2023. – Vol. 29. – No. 2. – Pp. 181-190.
Kerner S.M. 35 cybersecurity statistics to lose sleep over in 2025 / S.M. Kerner // URL: https://www.techtarget.com/whatis/34-Cybersecurity-Statistics-to-Lose-Sleep-Over-in-2020 (date of request: 04/14/2025).
Luo H. Resource orchestration at the edge: intelligent management of MMWAVE ran and gaming application QOE enhancement / H. Luo, H.Yu.Wei // IEEE Transactions on Network and Service Management. – 2023. – Vol. 20. – No. 1. – Pp. 385-399.
Mulyawan I. Mobile games adoption: an extension of technology acceptance model and theory of reasoned action / I. Mulyawan, W. Rafdinal // IOP Conference Series: Materials Science and Engineering. – 2021. – Vol. 1098. – No. 3.
Rasool G. Design patterns for mobile games based on structural similarity / G. Rasool, Ya. Hussain, T. Umer, Ja. Rasheed, S.F. Yeo, F. Sahin // Applied Sciences (Switzerland). – 2023. – Vol. 13. – No. 2. – P. 1198.
Usman A.G. Review on user authentication on mobile devices / A.G. Usman, A.M.A. Noor // Journal of Advanced Research in Applied Sciences and Engineering Technology. – 2024. – Vol. 46. – No. 2. – Pp. 26-36.
Wang C. User authentication on mobile devices: approaches, threats and trends / C. Wang, Y. Chen, J. Liu, Y. Wang, H. Liu // Computer Networks. – 2020. – Vol. 170. – Pp. 107-118.
Article Statistics
Copyright License
Copyright (c) 2025 Maksim Zakopailov

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors retain the copyright of their manuscripts, and all Open Access articles are disseminated under the terms of the Creative Commons Attribution License 4.0 (CC-BY), which licenses unrestricted use, distribution, and reproduction in any medium, provided that the original work is appropriately cited. The use of general descriptive names, trade names, trademarks, and so forth in this publication, even if not specifically identified, does not imply that these names are not protected by the relevant laws and regulations.