PID5858197FInal(1)
PID5858197FInal(1)
PID5858197FInal(1)
Abstract—As advancements in information and throughout the exam. Rather dynamic security policy must be
communication technology increases rapidly in our day to day life, enforced for conducting the e-exams if the student writes the
the e-learning system has gained more attention in the educational exam through the device such as a mobile/tablet.
institutions. Many educational institutions try to progress from
pen-paper examination to online examination for many reasons, If the student wants to write the exam, then the
including personalized environment, secured system, and accurate authentication of the student must be ensured. Previous works
evaluation. This research work focuses on a simple scheme for [6] have suggested QR-code based authentication, in which the
mutual authentication between the student and the server and student will be given an access stamp to write the exams. The
secure delivery of question paper from the server. The access stamp is generated by the server, which consists of
experimental results shown in this research work are based on a student details such as registration number, subject name, seat
set of survey questions given for students and instructors. The no, hall no, etc. The exam access stamp is generated for each
results are promising towards the use of the proposed system student by the following steps.
during the examination
1. The server generates the private key and public key
Keywords— e-learning, online examination, mutual using the RSA algorithm. The private key is used for
authentication signing the QR-code access stamp, and the public key
is used to verify the signature.
I. INTRODUCTION 2. For each student, the server produces an exam access
In the present era, e-learning has witnessed tremendous stamp with the above said student details.
growth in many educational institutions and organizations. The 3. The SHA-1 algorithm is applied to the access stamp to
main advantage of e-learning is that it can reach to all categories get the message digest which is the hashed value of the
of people in which the age, place or time to learn the contents is exam access stamp.
not a barrier [1]. The most prominent tool of this e-learning 4. The private key is used to sign the message digest.
system is the Learning Management System (LMS). The LMS 5. Now the signed message digest is used to generate the
is used by many educational institutions and organizations QR-code.
which served as a platform to access the e-learning contents [2].
In e-learning scenario, the learners can decide on the device such The student's device will be installed with the exam
as mobile/tablet/laptop to use for learning the contents. Since the software, and he enters his user name and password into the
information can be accessed from any place, the security of an software to write the exam. When the student enters the exam
e-learning system is of primary concern [3], [4], [5]. Once the hall, the invigilator will distribute the QR-code based exam
learners have learned the contents, they must be assessed by access stamp. After collecting the exam access stamp, the
conducting exams. Hence, for accessing the performance of the student scans the QR-code based exam access stamp with the
learner, exam plays a prominent role in an e-learning system. help of the device camera which he has to write the exam. But
The traditional method of e-exam needs dedicated the drawback of this approach is, many universities consist of
examination centers along with computers for conducting the many blocks and each block may have many floors. In turn, each
exams. Moreover, to provide security measures during the exam, floor may have a large number of rooms. The student needs to
security policies need to be framed for conducting the exam. locate his exam hall correctly to collect the exam access stamp
Here, the students use the configured system setup for writing during the examination time. But finding the exact location of
their exam, which uses the security policy that never changes the exam hall will be a tedious process, and hence the student
Q. No Questions
1. I choose online exam rather than writing the exam
in the paper
2. I would be comfortable with the online exam
3. Performance assessment would be better using
online exam
4. The online exam prevents malpractice
5. The online exam gives us accurate valuation results
Fig. 1. Mutual authentication during the online examination
TABLE 3. SURVEY QUESTIONS FOR INSTRUCTORS network policies in the system to prevent the malpractice by the
Q. Questions students during the online examination.
No REFERENCES
1. I choose to conduct online exam rather than
allowing the students to write the exam in the [1] Abdallah Moubayed, Mohammadnoor Injadat, Ali Bou Nassif, Hanan
paper Lutfiyya, and Abdallah Shami, “E-Learning: Challenges and Research
Opportunities Using Machine Learning & Data Analytics,” IEEE Access,
2. An online exam would be useful to minimize the Vol. 6, pp. 39117-39138, August 2018.
time [2] S. Wexler, N. Grey, D. Miller, F. Nguyen, and A. Barnevelda,“Learning
3. Online exam enhances the evaluation of student management systems: The good, the bad, the ugly and the truth,” The E-
answers learning Guild Res. 360 Rep. on Learning Manage. Syst., May 2008.
[3] R. Raitman, L. Ngo, N. Augar, and W. Zhou, “Security in the online e-
4. The Online Examination system is easy to use learning environment,” in Proc. 5th IEEE Int. Conf. Adv. Learn., Jul.
2005, pp. 702–706.
5. Students will give positive feedback for the [4] E. Weipple and M. Ebner, “Security & privacy challenges in e-learning
online examination system 2.0,” in Proc. E-Learn., Nov. 2008, pp. 4001–4007.
[5] N. H. M. Alwi and I. S. Fan, “E-learning and information security
management,” Int. J. Digital Soc., vol. 1, no. 2, pp. 148–156, Jun.2010.
The feedback obtained from the survey questions is shown [6] M.Kaiiali, A.Ozkaya,andH.Atlun,H.Haddad,M.Alier, “Designing a
in Fig. 2 and Fig. 3 which depicts the positive attitude of the Secure Exam Management System (SEMS) for M-Learning
students and instructors for preferring the online examination Environments,” IEEE Transactions on Learning Technologies, Vol. 9, pp.
system when compared to pen-paper examination. 258-271, 2016.
[7] Z. Xu, T. Zhang, Y. Zeng, J. Wan, and W. Wu, “A secure mobile payment
framework based on face authentication,” in Proc. Int. MultiConf. Eng.
Comput. Scientists,Mar. 2015, pp. 495–501.
[8] S. Yi, I. Yoon, C. Oh, and Y. Yi, “Real-time integrated face detection and
Strongly agree recognition on embedded GPGPUs,” in Proc. IEEE 12th Symp.
Embedded Syst. Real-Time Multimedia, pp. 98– 107, Oct. 2014.
[9] G. Wang, Y. Xiong, J. Yun, and J. R. Cavallaro, “Accelerating computer
Agree vision algorithms using the openCL framework on the mobile GPU—A
case study,” in Proc. IEEE Int. Conf. Acoustics, Speech, Signal Process.,
May 2013, pp. 2629–2633.
Neutral [10] Andre Huszti and Attila Peths ,”A Secure Electronic Exam System,”
Pub.Math.Debrecen, vol. 77, pp. 299-312, Jun. 2010.
[11] Jordi Castilla-Roca, Jordi Herrera Joancomarti, and Aleix Dorca-Josa, “A
Disagree Secure E-Exam Management System,” Proceedings of the First
International Conference on Availability, Reliability and Security,2006.
[12] C.C.Ko and C.D.Chang,”Secure Internet Examination System based on
Video monitoring,” Internet Research: Electronic Networking
Applications and Policy, vol. 14, No. 1, pp. 48-61, 2004.
Fig. 2. Students’ feedback
[13] Y.Levy and M.M. Ramim ”A Theoretical Approach for Biometrics
Authentication of e-Exams,” American Journal of Educational
Research, Vol. 3, No. 10, 1224-1229, 2015.
Strongly agree
[14] Jodi Herrera- Joancomarti, Josep Prieto-Blazquez, Jordi Castella-Roca,
“A Secure Electronic Examination Protocol using Wireless Networks,”
Proceedings of the International Conference on Information Technology:
Agree Coding and Computing,2004.
[15] L.Jegatha Deborah, R.Karthika, S.Audithan, and B.Kiran Bala,
“Enhanced Expressivity using Deontic Logic and Reuse Measure of
Neutral Ontologies,” Eleventh International Conference on Data Mining and
Warehousing, ICDMW 2015 Proceedings of the Eleventh
International Conference on Data Mining and Warehousing in
Disagree Elsevier Procedia Computer Science, vol.54,pp 318-326, 2015.
[16] R.Karthika, L.Jegatha Deborah, P Vijayakumar,” Intelligent e-learning
System based on Fuzzy Logic”, Neural Computing and Applications,
Accepted for publication.
Fig. 3. Instructors’ feedback
V. CONCLUSION
This research work proposes a simple mutual authentication
dialogue to enable the students and the server for completing the
mutual authentication. Moreover, the online examination system
securely distributes and collects the question papers and answers
to the students and from the students respectively. The future
enhancement of this work can be done by imposing dynamic