A System Architecture to Detect and Block Unwanted Wireless Signals in a Classroom (Short Paper)

Authors Daniel Barros , Paulo Barros , Emanuel Lomba , Vítor Ferreira , Pedro Pinto



PDF
Thumbnail PDF

File

OASIcs.ICPEC.2021.12.pdf
  • Filesize: 1.25 MB
  • 7 pages

Document Identifiers

Author Details

Daniel Barros
  • Instituto Politécnico de Viana do Castelo, Portugal
Paulo Barros
  • Instituto Politécnico de Viana do Castelo, Portugal
Emanuel Lomba
  • Instituto Politécnico de Viana do Castelo, Portugal
Vítor Ferreira
  • Instituto Politécnico de Viana do Castelo, Portugal
Pedro Pinto
  • Instituto Politécnico de Viana do Castelo, Portugal
  • ISMAI and INESC TEC, Porto

Cite AsGet BibTex

Daniel Barros, Paulo Barros, Emanuel Lomba, Vítor Ferreira, and Pedro Pinto. A System Architecture to Detect and Block Unwanted Wireless Signals in a Classroom (Short Paper). In Second International Computer Programming Education Conference (ICPEC 2021). Open Access Series in Informatics (OASIcs), Volume 91, pp. 12:1-12:7, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2021)
https://doi.org/10.4230/OASIcs.ICPEC.2021.12

Abstract

The actual learning process in a school, college or university should take full advantage of the digital transformation. Computers, mobile phones, tablets or other electronic devices can be used in learning environments to improve learning experience and students performance. However, in a university campus, there are some activities where the use of connected devices, might be discouraged or even forbidden. Students should be discouraged to use their own devices in classes where they may become alienated or when their devices may cause any disturbance. Ultimately, their own devices should be forbidden in activities such as closed-book exams. This paper proposes a system architecture to detect or block unwanted wireless signals by students' mobile phones in a classroom. This architecture focuses on specific wireless signals from Wi-Fi and Bluetooth interfaces, and it is based on Software-Defined Radio (SDR) modules and a set of antennas with two configuration modes: detection mode and blocking mode. When in the detection mode, the architecture processes signals from the antennas, detects if there is any signal from Wi-Fi or Bluetooth interfaces and infers a position of the unwanted mobile device. In the blocking mode, the architecture generates noise in the same frequency range of Wi-Fi or Bluetooth interfaces, blocking any possible connection. The proposed architecture is designed to be used by professors to detect or block unwanted wireless signals from student devices when supervising closed-book exams, during specific periods of time.

Subject Classification

ACM Subject Classification
  • Computer systems organization → Architectures
Keywords
  • campus
  • classroom
  • closed-book exam
  • fraud
  • wireless
  • detection
  • blocking
  • Software-Defined Radio

Metrics

  • Access Statistics
  • Total Accesses (updated on a weekly basis)
    0
    PDF Downloads

References

  1. Eric M. Anderman and Tamera B. Murdock. Psychology of Academic Cheating. Elsevier Inc., 2007. URL: https://doi.org/10.1016/B978-0-12-372541-7.X5000-1.
  2. Emrah Bayraktaroglu, Christopher King, Xin Liu, Guevara Noubir, Rajmohan Rajaraman, and Bishal Thapa. Performance of IEEE 802.11 under jamming. Mobile Networks and Applications, 18(5):678-696, October 2013. URL: https://doi.org/10.1007/s11036-011-0340-4.
  3. Sebastian Bräuer, Anatolij Zubow, Sven Zehl, Mehran Roshandel, and Soroush Mashhadi-Sohi. On practical selective jamming of Bluetooth Low Energy advertising. In 2016 IEEE Conference on Standards for Communications and Networking, CSCN 2016. Institute of Electrical and Electronics Engineers Inc., December 2016. URL: https://doi.org/10.1109/CSCN.2016.7785169.
  4. Andrew Daniel Buschbom and Andrew Daniel Buschbom. Restricting wireless network access within the classroom. Iowa State University Capstones Theses And Dissertations, 1(1):1-47, January 2007. URL: https://doi.org/10.31274/rtd-180813-16155.
  5. Paulo Costa, Ricardo Montenegro, Teresa Pereira, and Pedro Pinto. The Security Challenges Emerging from the Technological Developments. Mobile Networks and Applications, 24(6):2032-2037, 2019. URL: https://doi.org/10.1007/s11036-018-01208-0.
  6. Renata Adams Fernandes, Deisi Cristina Gollo Marques Vidor, and Alcyr Alves de Oliveira. The effect of noise on attention and performance in reading and writing tasks. In CoDAS, volume 31-4. SciELO Brasil, 2019. Google Scholar
  7. António Castro Fonseca. Desonestidade nos trabalhos escolares: Dados de um estudo português. Revista Portuguesa de Pedagogia, 43(2):107-124, July 2009. URL: https://doi.org/10.14195/1647-8614_43-2_7.
  8. IEEE802. IEEE 802.11, The Working Group Setting the Standards for Wireless LANs, 2015. URL: https://www.ieee802.org/11/.
  9. Zhang Jie, Wu Gang, and Yan Xiaowei. Comparative Analysis of Sweeping Frequency Jamming and Non-sweeping Frequency Jamming in Partial-band Jamming Based on Projectile-carried Communication Jamming. In International Conference on Communication Technology Proceedings, ICCT, volume 2020-Octob, pages 379-383. Institute of Electrical and Electronics Engineers Inc., October 2020. URL: https://doi.org/10.1109/ICCT50939.2020.9295755.
  10. Genevieve Marie Johnson. Student alienation, academic achievement, and webct use. Journal of Educational Technology & Society, 8(2):179-189, 2005. Google Scholar
  11. Rolf Loeber, Jeffrey D. Burke, and Dustin A. Pardini. Development and etiology of disruptive and delinquent behavior, April 2009. URL: https://doi.org/10.1146/annurev.clinpsy.032408.153631.
  12. S. O'Dea. Smartphone users 2020 | Statista, 2020. URL: https://www.statista.com/statistics/330695/number-of-smartphone-users-worldwide/.
  13. L. Oliveira, D. Schneider, J. De Souza, and W. Shen. Mobile device detection through wifi probe request analysis. IEEE Access, 7:98579-98588, 2019. URL: https://doi.org/10.1109/ACCESS.2019.2925406.
  14. Brian A. Primack, Ariel Shensa, Jaime E. Sidani, Erin O. Whaite, Liu yi Lin, Daniel Rosen, Jason B. Colditz, Ana Radovic, and Elizabeth Miller. Social Media Use and Perceived Social Isolation Among Young Adults in the U.S. American Journal of Preventive Medicine, 53(1):1-8, July 2017. URL: https://doi.org/10.1016/j.amepre.2017.01.010.
  15. Sethuraman Rao, S. Deepak, and Preeja Pradeep. Parametric analysis of impact of jamming in wireless sensor networks. In IFIP International Conference on Wireless and Optical Communications Networks, WOCN, 2013. URL: https://doi.org/10.1109/WOCN.2013.6616191.
  16. Deborah R Tindell and Robert W Bohlander. The use and abuse of cell phones and text messaging in the classroom: A survey of college students. College Teaching, 60(1):1-9, 2012. Google Scholar
  17. Walter HW Tuttlebee. Software defined radio: enabling technologies. John Wiley & Sons, 2003. Google Scholar
  18. Mathy Vanhoef and Frank Piessens. Advanced Wi-Fi attacks using commodity hardware. In ACM International Conference Proceeding Series, volume 2014-December, pages 256-265. Association for Computing Machinery, December 2014. URL: https://doi.org/10.1145/2664243.2664260.
Questions / Remarks / Feedback
X

Feedback for Dagstuhl Publishing


Thanks for your feedback!

Feedback submitted

Could not send message

Please try again later or send an E-mail