A remote interactive non-repudiation multimedia-based m-learning system

One of the current challenges regarding distance learning systems, from a performance point of view, is the efficient and timely delivery of multimedia-enriched learning materials. Providing guaranteed Class of Service (CoS) and Quality of Service (QoS) are also challenging especially for remote sites and rural areas where Internet coverage tends to be limited. On a different note, another challenge is to track the audience accessing the learning materials and more importantly to monitor the true identity of the examination attendees. This paper aims to investigate both of these issues simultaneously, with an introduction of a non-repudiation system that provides a security mechanism, as well as maintaining certain QoS measures. This system not only authenticates the intended party, but also integrates a digital signature scheme accompanied with the transmitted multimedia-based information. The included digital signature prevents a later dispute from the involved parties that the communication ever took place or they ever took part in the communication. Therefore this paper introduces and discusses a multimedia-enriched interactive non-repudiation system involved in a mobile-based learning (m-learning) environment. The performance of this system is considered and discussed in terms of network-centric parameters, including end-to-end delays, overhead, and bandwidth, using Labview 8.5 mobile-transmitter and mobile-receiver testbeds.

[1]  Siwaruk Siwamogsatham,et al.  Encryption vs. performance of infrastructure IEEE 802.11 WLANs , 2008, 2008 Wireless Telecommunications Symposium.

[2]  Elmarie Kritzinger,et al.  E-learning: Incorporating Information Security Governance , 2006 .

[3]  Daniel Camps-Mur,et al.  AU-APSD: Adaptive IEEE 802.11e Unscheduled Automatic Power Save Delivery , 2006, 2006 IEEE International Conference on Communications.

[4]  A. Arjona,et al.  Unlicensed Mobile Access (UMA) Handover and Packet Data Performance Analysis , 2007, 2007 Second International Conference on Digital Telecommunications (ICDT'07).

[5]  Xingjun Zhang,et al.  A Hierarchical Unequal Packet Loss Protection Scheme for Robust H.264/AVC Transmission , 2009, 2009 6th IEEE Consumer Communications and Networking Conference.

[6]  Martin Ebner,et al.  Security Privacy Challenges in E-Learning 2.0 , 2008 .

[7]  Markus Rupp,et al.  Error Prediction Based Redundancy Control for Robust Transmission of Video Over Wireless Links , 2007, 2007 IEEE International Conference on Communications.

[8]  Gonzalo Camarillo,et al.  The Session Description Protocol (SDP) Label Attribute , 2006, RFC.

[9]  Jim Greer,et al.  Reputation Management in Privacy-Enhanced E-learning , 2006 .

[10]  Samir Tohmé,et al.  VPN Analysis and New Perspective for Securing Voice over VPN Networks , 2008, Fourth International Conference on Networking and Services (icns 2008).

[11]  Gonzalo Camarillo,et al.  The Session Description Protocol (SDP) Content Attribute , 2007, RFC.

[12]  Georg Carle,et al.  The networking perspective of security performance - A measurement study , 2006, MMB.

[13]  Jianming Yong Security modelling for e-Learning , 2007, 2007 First IEEE International Symposium on Information Technologies and Applications in Education.

[14]  Henning Schulzrinne,et al.  Grouping of Media Lines in the Session Description Protocol (SDP) , 2002, RFC.

[15]  Wanlei Zhou,et al.  Security in the online e-learning environment , 2005, Fifth IEEE International Conference on Advanced Learning Technologies (ICALT'05).

[16]  Ann Cavoukian,et al.  Biometric Encryption: A Positive-Sum Technology that Achieves Strong Authentication, Security AND Privacy , 2007 .

[17]  Gonzalo Camarillo,et al.  Session Description Protocol (SDP) Format for Binary Floor Control Protocol (BFCP) Streams , 2006, RFC.

[18]  Joe McGeehan,et al.  The performance and efficiency of envelope elimination and restoration transmitters for future multiple-input multiple-output wireless local area networks , 2008, IET Commun..

[19]  Jan Werding,et al.  Analysis of Cost Structure and Business Model options for Wireless Access Provisioning using Femtocell solutions , 2008 .

[20]  Yacine Challal,et al.  Layered Multicast Data Origin Authentication and Non-repudiation over Lossy Networks , 2006, 11th IEEE Symposium on Computers and Communications (ISCC'06).

[21]  G. L. Garcia,et al.  IPSec performance analysis for large-scale Radio Access Networks , 2008 .

[22]  E. K. Park,et al.  Analysis of a non-repudiation authentication protocol for personal communication systems , 1998, Proceedings 7th International Conference on Computer Communications and Networks (Cat. No.98EX226).

[23]  Jun Zhao,et al.  Power efficiency in IEEE 802.11a WLAN with cross-layer adaptation , 2003, IEEE International Conference on Communications, 2003. ICC '03..

[24]  Iain E. G. Richardson,et al.  Video Coding Standards: JPEG and MPEG , 2002 .

[25]  Jörg Ott,et al.  The Binary Floor Control Protocol (BFCP) , 2021, RFC.

[26]  Maria Nickolova,et al.  THREAT MODEL FOR USER SECURITY IN E-LEARNING SYSTEMS , 2007 .

[27]  Daniel Camps-Mur,et al.  SU-APSD: Static IEEE 802.11e Unscheduled Automatic Power Save Delivery , 2006 .

[28]  Jianping Pan,et al.  Securing BGP through Keychain-based Signatures , 2007, 2007 Fifteenth IEEE International Workshop on Quality of Service.

[29]  Ki-Woong Park,et al.  pKASSO: Towards Seamless Authentication Providing Non-Repudiation on Resource-Constrained Devices , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).

[30]  Sanjit K. Mitra,et al.  Object-level bit allocation and scalable rate control for MPEG-4 video coding , 2001, Proceedings of Workshop and Exhibition on MPEG-4 (Cat. No.01EX511).