Cookies Policy
The website need some cookies and similar means to function. If you permit us, we will use those means to collect data on your visits for aggregated statistics to improve our service. Find out More
Accept Reject
  • Menu
Publications

Publications by CRACS

2011

Wireless Secrecy Regions With Friendly Jamming

Authors
Vilela, JP; Bloch, M; Barros, J; McLaughlin, SW;

Publication
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY

Abstract
Inspired by recent results on information-theoretic security, we consider the transmission of confidential messages over wireless networks, in which the legitimate communication partners are aided by friendly jammers. We characterize the security level of a confined region in a quasi-static fading environment by computing the probability of secrecy outage in connection with two new measures of physical-layer security: the jamming coverage and the jamming efficiency. Our analysis for various jamming strategies based on different levels of channel state information provides insight into the design of optimal jamming configurations and shows that a single jammer is not sufficient to maximize both figures of merit simultaneously. Moreover, a single jammer requires full channel state information to provide security gains in the vicinity of the legitimate receiver.

2011

Jammer selection policies for secure wireless networks

Authors
Vilela, JP; Pinto, PC; Barros, J;

Publication
IEEE International Conference on Communications

Abstract
We consider a wireless network scenario in which the communicating nodes are assisted by a number of jammers. The goal of the jammers is to obstruct potential eavesdroppers while restricting the harmful interference experienced by the legitimate receiver. Based on a stochastic network model, we are able to show that packet collisions caused by jamming nodes can be used effectively to increase the level of secrecy. Various jammer selection policies are investigated depending on the position of source, destination and jamming nodes. Our results shed some light on the trade-off between secure throughput and energy efficiency. © 2011 IEEE.

2010

Secure multicast in IPTV services

Authors
Pinto, A; Ricardo, M;

Publication
COMPUTER NETWORKS

Abstract
Technological evolution is leading telecommunications to all-IP networks where multiple services are transported as IP packets. Among these are the group communications services with confidentiality requirements. Secure IP multicast may be used to secure the broadcast of video channels. However, in scenarios such as cable TV where the concept of video channel and bundle are present, groups are very large, and users switch very rapidly between channels (zapping), a sort of problems still need to be addressed. The solution proposed in this paper addresses these problems. For that purpose, a centralized form of secure group communications is proposed also used to transmit, not data, but group cryptographic material. Threes types of cryptographic keys are used. End systems use this material to decrypt the data sent by the content providers.

2010

An integrated system for submission, assessment, feedback and publication of online digital portfolios

Authors
Figueira, A; Felix, C; Ferreira, C;

Publication
Proceedings of the 8th IASTED International Conference on Web-Based Education, WBE 2010

Abstract
Digital portfolios have recently assumed an increasing importance in e-learning. In this article we report an integrated system that can be used to publish online projects undertaken by students during their courses. The system was then integrated with the Moodle learning management system featuring the possibility to create, evaluate, publish and maintain digital portfolios assigned and corrected by the institution faculty. This integrated process ensures a high quality level of the projects registered. The system uses information imported from Moodle's database to fill in its own database for users, courses and propagates the existing session between the two systems. It also maintains the projects in specific development phases, thus, allowing asynchronous editing, assessing or commenting on projects by different students or teachers. The creation of a new project is boosted by the use of a set of pre-defined templates which in turn give a standard layout and design quality to the final view of the project.

2010

Web-Based Intelligent Tutoring Systems Using the SCORM 2004 Specification - A Conceptual Framework for Implementing SCORM Compliant Intelligent Web-Based Learning Environments

Authors
Santos, G; Figueira, A;

Publication
ICALT 2010, 10th IEEE International Conference on Advanced Learning Technologies, Sousse, Tunesia, 5-7 July 2010

Abstract
This paper describes a conceptual framework for implementing Intelligent Tutoring Systems using SCORM 2004. The main objective is to discuss how the SCORM 2004 sequencing and navigation specification can allow the development of Intelligent Web-Based Learning Environments using the sequencing and navigation tracking data, and rule set. Our main argument is that SCORM 2004 sequencing and navigation specification can be used to implement the two main functionalities of an ITS, (1) the inner loop and (2) the outer loop. © 2010 IEEE.

2010

Reusable and Inter-Operable Web-Based Intelligent Tutoring Systems Using SCORM 2004

Authors
Santos, G; Figueira, A;

Publication
PROCEEDINGS OF THE 9TH EUROPEAN CONFERENCE ON E-LEARNING, VOL 1

Abstract
For several years Intelligent Tutoring Systems (ITSs) have been developed and shown to lead to impressive improvement in student learning in a range of domains. Some of the most important limitations of ITSs are that their development is very time consuming, and they cannot be reused or imported to different platforms. The main benefits of the Sharable Content Object Reference Model (SCORM) are interoperability and reusability. Based on the SCORM Sequencing and Navigation (SN) specification we have developed an approach for implementing Web-Based SCORM compliant ITSs that are therefore reusable and interoperable. The main objective of this paper is to describe our approach and explain how to implement SCORM compliant ITSs using as an example, a prototype that we built.

  • 157
  • 207