Secured Session Based Profile Caching for E-Learning Systems Using WiMAX Networks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 33122
Secured Session Based Profile Caching for E-Learning Systems Using WiMAX Networks

Authors: R. Chithra, B. Kalaavathi

Abstract:

E-Learning enables the users to learn at anywhere at any time. In E-Learning systems, authenticating the E-Learning user has security issues. The usage of appropriate communication networks for providing the internet connectivity for E-learning is another challenge. WiMAX networks provide Broadband Wireless Access through the Multicast Broadcast Service so these networks can be most suitable for E-Learning applications. The authentication of E-Learning user is vulnerable to session hijacking problems. The repeated authentication of users can be done to overcome these issues. In this paper, session based Profile Caching Authentication is proposed. In this scheme, the credentials of E-Learning users can be cached at authentication server during the initial authentication through the appropriate subscriber station. The proposed cache based authentication scheme performs fast authentication by using cached user profile. Thus, the proposed authentication protocol reduces the delay in repeated authentication to enhance the security in ELearning.

Keywords: Authentication, E-Learning, WiMAX, Security, Profile caching.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1338710

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1572

References:


[1] IEEE 802.16 Working Group, "IEEE Standard for Local and Metropolitan Area Networks, Part 16: Air Interface for Fixed Broadband Wireless Access Systems," IEEE Standard 802.16-2004, October 2004.
[2] IEEE 802.16 Working Group, "IEEE Standard for Local and Metropolitan Area Networks, Part 16: Air Interface for Fixed and Mobile Broadband Wireless Access Systems, Amendment 2: Physical and Medium Access Control Layers for Combined Fixed and Mobile Operation in Licensed Bands," IEEE Standard 802.16e-2005, February 2006.
[3] Noudjoud Kahya, Naara Ghoualmi, Pascal Lafourcade, Key Management Protocol in WiMAX Revisited, Springer, 2012.
[4] Fuden Tshering, Anjali Sharma, A Review of Privacy and Key Management Protocol in IEEE 802.16e, International Journal of Computer Applications, 2011.
[5] Perularaja Rengaraju, Chung-Horng Lung, Yi Qu, Anand Srinivasan, Analysis on Mobile WiMAX Security, IEEETIC-STH, Information Assurance in Security and Privacy, 2009.
[6] Felician Alecu, Paul Pocatilu, Sergiu Capisizu, WiMAX Security Issues in E- Learning System, Journal of Mobile Embedded and Distributed Systems,2010.
[7] Paul Pocatilu, Using WiMAX Technology for E-Learning Solutions, Economics of Knowledge, Vol.2 (3), 2010.
[8] R. Chithra, Dr. B. Kalaavathi, “Survey of Key Management Algorithms in WiMAX” International Journal of Mathematical, Computational, Natural and Physical Engineering, World Academy of Science, Engineering and Technology, Vol:8, No:9, 2014.
[9] Chithra Rajagopal and Kalaavathi Bhuvaneshwaran, “Secured Session Based Authentication Protocol for E-Learning using WiMAX networks”, International Journal of Advancements in Computing Technology, 2015.