Articles | Open Access | DOI: https://doi.org/10.37547/tajet/Volume07Issue04-22

Information Security Challenges in Mobile Gaming Applications

Maksim Zakopailov , CEO at uniQore LLC Orlando, FL, USA

Abstract

This article addresses the issues related to ensuring information security in mobile gaming applications. The rapid growth of this sector is accompanied by a surge in cyber threats, primarily targeting user data compromise, scenario manipulation, and unauthorized access to application functionality. The technical complexity of such systems—particularly those interacting with cloud and edge computing infrastructures—has given rise to a range of new vulnerabilities that fall outside the scope of traditional security measures. The aim of this study is to identify and systematize the problem areas in securing mobile games, particularly at the intersection of network architecture, user behavior, and cryptographic solutions. A review of the academic literature reveals a disconnect: while individual aspects such as authentication and encryption are explored in depth, architectural and behavioral risks are often treated superficially. This work categorizes the key threats and emphasizes how poor coordination between application design, technical implementation, and user practices creates a vulnerable environment—especially in the context of widespread use of third-party SDKs and monetization systems. The article presents indicative performance estimates for encryption and authentication mechanisms to provide an initial assessment of their applicability. The author’s contribution lies in integrating interdisciplinary approaches to analyzing the security of mobile gaming solutions and highlighting areas that remain underexplored in the current literature. The material will be of interest to cybersecurity specialists, developers, digital communication researchers, and interface designers.

Keywords

authentication, gamification, information security, mobile gaming applications, network threats, encryption

References

Agrawal A. A survey on analyzing encrypted network traffic of mobile devices / A. Agrawal, A. Bhatia, A. Bahuguna, K. Tiwari, K. Haribabu, D. Vishwakarma, R. Kaushik // International Journal of Information Security. – 2022. – Vol. 21. – No. 4. – Pp. 873-915.

Bae J. A recommending system for mobile games using the dynamic nonparametric model / J. Bae, J. Park, J. Choi, Soh S. Bum // Journal of Business Research. – 2023. – Vol. 167.

Bank D. Problematic monetization in mobile games in the context of the human right to economic self-determination / D. Bank // Computers in Human Behavior. – 2023. – Vol. 149.

Hoang T.M. An integrated two-factor authentication scheme for smart communications and control systems / T.M. Hoang, V.H. Bui, N.H. Nguyen // Mendel. – 2023. – Vol. 29. – No. 2. – Pp. 181-190.

Kerner S.M. 35 cybersecurity statistics to lose sleep over in 2025 / S.M. Kerner // URL: https://www.techtarget.com/whatis/34-Cybersecurity-Statistics-to-Lose-Sleep-Over-in-2020 (date of request: 04/14/2025).

Luo H. Resource orchestration at the edge: intelligent management of MMWAVE ran and gaming application QOE enhancement / H. Luo, H.Yu.Wei // IEEE Transactions on Network and Service Management. – 2023. – Vol. 20. – No. 1. – Pp. 385-399.

Mulyawan I. Mobile games adoption: an extension of technology acceptance model and theory of reasoned action / I. Mulyawan, W. Rafdinal // IOP Conference Series: Materials Science and Engineering. – 2021. – Vol. 1098. – No. 3.

Rasool G. Design patterns for mobile games based on structural similarity / G. Rasool, Ya. Hussain, T. Umer, Ja. Rasheed, S.F. Yeo, F. Sahin // Applied Sciences (Switzerland). – 2023. – Vol. 13. – No. 2. – P. 1198.

Usman A.G. Review on user authentication on mobile devices / A.G. Usman, A.M.A. Noor // Journal of Advanced Research in Applied Sciences and Engineering Technology. – 2024. – Vol. 46. – No. 2. – Pp. 26-36.

Wang C. User authentication on mobile devices: approaches, threats and trends / C. Wang, Y. Chen, J. Liu, Y. Wang, H. Liu // Computer Networks. – 2020. – Vol. 170. – Pp. 107-118.

Article Statistics

Copyright License

Download Citations

How to Cite

Maksim Zakopailov. (2025). Information Security Challenges in Mobile Gaming Applications. The American Journal of Engineering and Technology, 7(04), 166–172. https://doi.org/10.37547/tajet/Volume07Issue04-22