Pub Date : 2022-07-01DOI: 10.1109/YEF-ECE55092.2022.9850114
João Madeira, João Guerreiro, R. Dinis
In the current technological era, 5G and 6G mobile networks are trusted to provide crucial services for our daily lives and society as a whole. Therefore, these technologies must be resilient to potential security breaches by malicious users. In fact, due to the nature of wireless communications, the signal transmitted between legitimate users can be listened to by any other non legitimate user, which can be exploited by a passive eavesdropping user to steal data. It is therefore desirable to employ transmission techniques that provide a Physical Layer security (PLS) to reduce the effectiveness of an eavesdropper attack.The effectiveness of the PLS techniques should be accessed in a practical communication scenario using real hardware. However, the development of a Application Specific Integrated Circuit (ASIC) transceiver can be significantly expensive. Alternatively, the algorithms can be implemented in a Software Defined Radio (SDR) platform, which allows for a cheaper and faster development of custom signal processing algorithms. In this work, we seek to answer the research question "Can a wireless system that utilizes channel information for PLS, be implemented efficiently in an SDR platform?", showing that such a system can be easily and efficiently implemented using modern SDR peripherals and the Gnuradio development framework. It is demonstrated that the proposed prototype achieves excellent levels of PLS, while maintaining a high data rate.
{"title":"A Software Defined Radio Implementation of Physical Layer Security Using MIMO-SVD","authors":"João Madeira, João Guerreiro, R. Dinis","doi":"10.1109/YEF-ECE55092.2022.9850114","DOIUrl":"https://doi.org/10.1109/YEF-ECE55092.2022.9850114","url":null,"abstract":"In the current technological era, 5G and 6G mobile networks are trusted to provide crucial services for our daily lives and society as a whole. Therefore, these technologies must be resilient to potential security breaches by malicious users. In fact, due to the nature of wireless communications, the signal transmitted between legitimate users can be listened to by any other non legitimate user, which can be exploited by a passive eavesdropping user to steal data. It is therefore desirable to employ transmission techniques that provide a Physical Layer security (PLS) to reduce the effectiveness of an eavesdropper attack.The effectiveness of the PLS techniques should be accessed in a practical communication scenario using real hardware. However, the development of a Application Specific Integrated Circuit (ASIC) transceiver can be significantly expensive. Alternatively, the algorithms can be implemented in a Software Defined Radio (SDR) platform, which allows for a cheaper and faster development of custom signal processing algorithms. In this work, we seek to answer the research question \"Can a wireless system that utilizes channel information for PLS, be implemented efficiently in an SDR platform?\", showing that such a system can be easily and efficiently implemented using modern SDR peripherals and the Gnuradio development framework. It is demonstrated that the proposed prototype achieves excellent levels of PLS, while maintaining a high data rate.","PeriodicalId":444021,"journal":{"name":"2022 International Young Engineers Forum (YEF-ECE)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125484140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-01DOI: 10.1109/YEF-ECE55092.2022.9849895
Pedro Alves, Majid Zamiri, L. Camarinha-Matos
In the last decades, technology has evolved exponentially and become a big part of our daily activities. The widespread use of the Internet coupled with the growth of social networks allowed a more intense search for knowledge sharing as well as the creation and maintenance of interpersonal relationships. As a result, several learning communities appeared and grew. Each community has its central topic, cooking being an example of these topics. The key idea is that some cooks from around the world might want to enhance their culinary knowledge and, to do so, they can join a related community. This paper introduces GloFood which is a community-oriented system supporting a collaborative learning community that tries to foster knowledge sharing and collaboration.
{"title":"GloFood: A Community-oriented System for Knowledge Sharing and Collaboration","authors":"Pedro Alves, Majid Zamiri, L. Camarinha-Matos","doi":"10.1109/YEF-ECE55092.2022.9849895","DOIUrl":"https://doi.org/10.1109/YEF-ECE55092.2022.9849895","url":null,"abstract":"In the last decades, technology has evolved exponentially and become a big part of our daily activities. The widespread use of the Internet coupled with the growth of social networks allowed a more intense search for knowledge sharing as well as the creation and maintenance of interpersonal relationships. As a result, several learning communities appeared and grew. Each community has its central topic, cooking being an example of these topics. The key idea is that some cooks from around the world might want to enhance their culinary knowledge and, to do so, they can join a related community. This paper introduces GloFood which is a community-oriented system supporting a collaborative learning community that tries to foster knowledge sharing and collaboration.","PeriodicalId":444021,"journal":{"name":"2022 International Young Engineers Forum (YEF-ECE)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133570082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-01DOI: 10.1109/YEF-ECE55092.2022.9850022
Rodrigo Calzada Haro, Felix Cuadrado Latasa, Javier Andión Jiménez
The analysis of social networks is a concern nowadays. The importance they acquired over the last few years forces one to analyze suspicious behaviors and how false information spreads. Nevertheless, there are many parameters to consider when analyzing these networks. When the content of the messages is taken into account, semantic analysis can be considered the most important element. However, the relationships established between users and their interactions can reveal the different tendencies of the social network. To analyze several aspects of the structure of the conversations, it is required to know how the cascades spread. This can be represented by the use of virality. This paper reveals a scalable algorithm that drastically reduces the complexity of the calculation of the virality evolution. With the use of graph properties, the algorithm is a key component, able to relate time and size, to characterize the shape of the conversations in social networks in a simple way.
{"title":"A scalable incremental algorithm for computing the evolution of structural virality in social networks","authors":"Rodrigo Calzada Haro, Felix Cuadrado Latasa, Javier Andión Jiménez","doi":"10.1109/YEF-ECE55092.2022.9850022","DOIUrl":"https://doi.org/10.1109/YEF-ECE55092.2022.9850022","url":null,"abstract":"The analysis of social networks is a concern nowadays. The importance they acquired over the last few years forces one to analyze suspicious behaviors and how false information spreads. Nevertheless, there are many parameters to consider when analyzing these networks. When the content of the messages is taken into account, semantic analysis can be considered the most important element. However, the relationships established between users and their interactions can reveal the different tendencies of the social network. To analyze several aspects of the structure of the conversations, it is required to know how the cascades spread. This can be represented by the use of virality. This paper reveals a scalable algorithm that drastically reduces the complexity of the calculation of the virality evolution. With the use of graph properties, the algorithm is a key component, able to relate time and size, to characterize the shape of the conversations in social networks in a simple way.","PeriodicalId":444021,"journal":{"name":"2022 International Young Engineers Forum (YEF-ECE)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127202821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}