CFP last date
16 December 2024
Reseach Article

Biometry, Encryption and Spyware (BES): A Multi-factor Security and Authentication Mechanism for JAMB E-Examination

by Amadi Rapheal Sunday, Ismaila Idris, Hussaini Abubakar Zubairu, Stella Oluyemi Etuk, Idris Mohammed Kolo
International Journal of Applied Information Systems
Foundation of Computer Science (FCS), NY, USA
Volume 12 - Number 32
Year of Publication: 2020
Authors: Amadi Rapheal Sunday, Ismaila Idris, Hussaini Abubakar Zubairu, Stella Oluyemi Etuk, Idris Mohammed Kolo
10.5120/ijais2020451878

Amadi Rapheal Sunday, Ismaila Idris, Hussaini Abubakar Zubairu, Stella Oluyemi Etuk, Idris Mohammed Kolo . Biometry, Encryption and Spyware (BES): A Multi-factor Security and Authentication Mechanism for JAMB E-Examination. International Journal of Applied Information Systems. 12, 32 ( August 2020), 17-26. DOI=10.5120/ijais2020451878

@article{ 10.5120/ijais2020451878,
author = { Amadi Rapheal Sunday, Ismaila Idris, Hussaini Abubakar Zubairu, Stella Oluyemi Etuk, Idris Mohammed Kolo },
title = { Biometry, Encryption and Spyware (BES): A Multi-factor Security and Authentication Mechanism for JAMB E-Examination },
journal = { International Journal of Applied Information Systems },
issue_date = { August 2020 },
volume = { 12 },
number = { 32 },
month = { August },
year = { 2020 },
issn = { 2249-0868 },
pages = { 17-26 },
numpages = {9},
url = { https://www.ijais.org/archives/volume12/number32/1096-2020451878/ },
doi = { 10.5120/ijais2020451878 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2023-07-05T19:10:39.616159+05:30
%A Amadi Rapheal Sunday
%A Ismaila Idris
%A Hussaini Abubakar Zubairu
%A Stella Oluyemi Etuk
%A Idris Mohammed Kolo
%T Biometry, Encryption and Spyware (BES): A Multi-factor Security and Authentication Mechanism for JAMB E-Examination
%J International Journal of Applied Information Systems
%@ 2249-0868
%V 12
%N 32
%P 17-26
%D 2020
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Electronic examination is the innovation of assessing students electronically. In recent times, it has gain popularity and acceptance. The gradual acceptance and popularity of electronic examination was underscored by its benefits. However, e-examination security has been considered a major challenge in e-learning, in which malpractices-free e-examination seems elusive. Collusion, online assistance, surfing the Internet and remote sharing of desktop are security threat to the current JAMB’s e-examination. This paper proposes an e-exam system using a multi-factor security and authentication mechanism. Biometry, Encryption and Spyware (BES) are adopted to enhance security and authentication of JAMB’s electronic examination. Biometrics are used for authentication, Encryption for the security of the data and the databases and Spyware for e-monitoring. The proposed system addresses the security and authentication lapses of the existing JAMB’s online examination. Evaluation of the system was performed in term of impersonation, accessing the Internet or remote sharing of desktop to assess the security and authentication effectiveness of the proposed system. The evaluation shows a promising results towards addressing authentication and security issues in the JAMB’s online e-exam.

References
  1. Al-Hakeem, M. S. & Abdulrahman, M.S (2017). Developing a New e-Exam Platform to Enhance the University Academic Examinations: the Case of Lebanese French University, International .Journal of Modern Education and Computer Science, 5(1), 9-16
  2. Ann, B., & Kannammal, A. (2014). Information Security Modelling in An E-learning Environment. International Journal of Computer Science, 11(1), 23 -29.
  3. Alwi, N.H.M., & Fan, I. (2010). E-Learning and Information Security Management, International Journal of Digital Society (IJDS), 1(2), 148-156
  4. Baller, M., Lukandu, A. & Radwan, A. (2015). Improving Learning Throughput in E-learning using Interactive-Cognitive Based Assessment. The International Journal of E-learning and Educational Technologies in the Digital Media (IJEETDM) 1(1); 32-49.
  5. Baller, M., Lukandu, A. & Radwan, A. (2015). Reversed Roulette Wheel Selection Algorithms (RWSA) and Reinforcement Learning (RL) for Personalizing and Improving E-learning System: The case study and its implementation. The International Journal of E-learning and Educational Technologies in the Digital Media (IJEETDM) 1(2); 92-108.
  6. Bobde, S., Chaudhari, S. Golguri, J. & Shahane, R. (2017). Web Based Online Examination System, Global Research and Development Journal for Engineering, 2(5), 58- 61
  7. Farid, S. Alam, M., XQaiser, M., Haq, A. A. U. & Itmazi, J. (2017). Security Threats and Measures in E-learning in Pakistan: A Review, Technical Journal, University of Engineering and Technology (UET) Taxila, Pakistan, 22(3), 98-107.
  8. Frank, A. J. (2010). Dependable Distributed Testing – Can the Online Proctor be reliably computerized. In: Proc. International Conference on e-Business (ICE-B), Athens.
  9. Furnell, S. M., & Karweni, T. (2001). Security issues in Online Distance Learning, VINE. The Journal of Information and Knowledge Management Systems, 31(2), 28- 35
  10. Ismail, H. M. & Soye, M. (2018). Biometric Enabled Computer-Based Testing System (CBT) With Advanced Encryption Standard (AES), Journal of Emerging Technologies and Innovative Research, 5(8),579- 585
  11. Jegatha D. L., Karthika, R., Vijayakumar, P., Rawal, B.S. & Wang, Y. (n.d).Secure Online Examination System for e-learning
  12. Kitahara, R., Westfall, F., & Mankelwicz, J. (2011). New, multi-faceted hybrid approaches to ensuring academic integrity. Journal of Academic and Business Ethics, 3(1), 1–12.
  13. Maity,P., Patil, S., Pednekar,P. , Sawant4, A. & Rupnar, M. (2018). Online Examination System, International Research Journal of Engineering and Technology (IRJET), 5(3), 1956 – 1957
  14. Meletiou, G.I., Voyiatzis, V. & Sgouropoulou, C. (2012). Design and Implementation of an e-exam system based on the Android platform, In: Proc. 16th Panhellenic Conference on Informatics.
  15. Naveen, J. M., Kumar, G. P. Mukhilan, V, Manoj Prasad, T Ramasamy, & Harini N. (2018). Multi-factor authentication scheme for online examination, International Journal of Pure and Applied Mathematics, 119(15), 1705-1712
  16. Osang, F. (2012). Electronic Examination in Nigeria, Academic Staff Perspective—Case Study: National Open University of Nigeria (NOUN). International Journal of Information and Education Technology, 2(4), 304 – 307.
  17. Ramim, M., & Levy, Y. (2006). Securing e-learning systems: A case of insider cyber-attacks and novice IT management in a small university. Journal of Cases on Information Technology, 8(4), 24-34.
  18. Sarjiyus, O. (2019). Securing Computer Based Testing (CBT) System for Tertiary Institutions in Nigeria Asian Journal of Research in Computer Science, 3(3): 1-16.
  19. Singh, U. G. (2015). Solving the ‘Riddel’ of e-Assessment: Student perceptions. The International Journal of E-learning and Educational Technologies in the Digital Media (IJEETDM), 1(3); 142-153.
  20. Swathi P. S., Narayanan, A. & Bijlani, K. (2016). ”An Intelligent System for Online Exam Monitoring” in Information Science (ICIS), International Conference, 2016
  21. Traoré, I., Nakkabi, Y. , Saad, S. Sayed, B., J.D. Ardigo & de Faria Quinan, P.M. (2017). Ensuring Online Exam Integrity Through Continuous Biometric Authentication, Information Security Practices, Springer International Publishing, DOI 10.1007/978-3-319-48947-6_6, 73 – 81.
  22. Treenantharath, T., & Sutheebanjard, P. (2013). Secure Online Exams on Thin Client. In: Proc. 11th International Conference on ICT and Knowledge Engineering (ICT&KE).
  23. Ullah, A., Xiao, H. & Barker, T. (2019). A study into the usability and security implications of text and image based challenge questions in the context of online examination, Educational Informational Technology, 24(1),:13–39.
  24. Wong, T.-K., Xie, H., Zou, D., Wang, F. L., Tai Tang, J. K., & Kong, A.(2019). How to facilitate self-regulated learning? A case study on open educational resources. Journal of Computers in Education. https://doi.org/10.1007/s40692-019-00138-4.
  25. Zhang, J., Zhao, L. & Nunamaker, J. F. (2004): Can e-learning replace classroom learning? Communications of the ACM, 47(5): 75-
Index Terms

Computer Science
Information Sciences

Keywords

Electronic examination; biometric security encryption spyware JAMB