scholarly journals Secure Data Exchange in M-Learning Platform using Adaptive Tunicate Slime-Mold-Based Hybrid Optimal Elliptic Curve Cryptography

2021 ◽  
Vol 11 (12) ◽  
pp. 5316
Author(s):  
Ghadah Aldabbagh ◽  
Daniyal M. Alghazzawi ◽  
Syed Hamid Hasan ◽  
Mohammed Alhaddad ◽  
Areej Malibari ◽  
...  

The utilization of mobile learning continues to rise and has attracted many organizations, university environments and institutions of higher education all over the world. The cloud storage system consists of several defense issues since data security and privacy have become known as the foremost apprehension for the users. Uploading and storing specific data in the cloud is familiar and widespread, but securing the data is a complicated task. This paper proposes a cloud-based mobile learning system using a hybrid optimal elliptic curve cryptography (HOECC) algorithm comprising public and private keys for data encryption. The proposed approach utilizes an adaptive tunicate slime-mold (ATS) algorithm to generate optimal key value. Thus, the data uploaded in the cloud system are secured with high authentication, data integrity and confidentiality. The study investigation employed a survey consisting of 50 students and the questionnaire was sent to all fifty students. In addition to this, for obtaining secure data transmission in the cloud, various performance measures, namely the encryption time, decryption time and uploading/downloading time were evaluated. The results reveal that the time of both encryption and decryption is less in ATF approach when compared with other techniques.

2021 ◽  
Vol 12 (1) ◽  
pp. 74
Author(s):  
Mohammad Y. Alshahrani

Blockchain technology allows for the decentralized creation of a propagated record of digital events, in which third parties do not control information and associated transactions. This methodology was initially developed for value transmission. Still, it now has a broad array of utilization in various industries, including health, banking, the internet of things, and several others. With its numerous added benefits, a blockchain-based learning management system is a commonly utilized methodology at academic institutes, and more specifically during and after the COVID-19 period. It also presents several potentials for decentralized, interoperable record management in the academic system in education. Integrity, authenticity, and peer-executed smart contracts (SC) are some of the qualities of a blockchain that could introduce a new degree of safety, trustworthiness, and openness to e-learning. This research proposes a unique encryption technique for implementing a blockchain system in an e-learning (EL) environment to promote transparency in assessment procedures. Our methodology may automate evaluations and provide credentials. We built it to be analytical and content-neutral in order to demonstrate the advantages of a blockchain back-end to end-users, including student and faculty members particularly during this COVID-19 era. This article explains the employment of blockchain and SC in e-learning. To improve the trust in the assessment, we propose a novel improved elliptic curve cryptography algorithm (IECCA) for data encryption and decryption. The performance of the suggested method is examined by comparing it with various existing algorithms of encryption. The evaluation of the behaviour of the presented method demonstrates that the technique shall enhance trust in online educational systems, assessment processes, educational history, and credentials.


2020 ◽  
Vol 17 (1) ◽  
pp. 402-408
Author(s):  
Soram Ranbir Singh ◽  
Khan Kumar Ajoy

The Internet of Things (IoT) has ushered in numerous devices in many areas in our life and in industries. It could comprise devices with sensors to gather and broadcast data over the internet. As the devices are IP-based and the media are shared, any user in the network can have an access to the communication contents. The only way to impose access control in the sensor networks is through cryptography. A key is applied to encrypt the communication to prevent from unauthorized access to the network. Choosing a suitable key management scheme is very important in sensor networks as it should satisfy the constraints of the sensors. There are two indispensable public cryptosystems available in the literatures-RSA and Elliptic curve cryptography (ECC). ECC gives strong resistance to cryptanalytic attacks. So, it is used with smaller key sizes than RSA (Valenta, L., et al., 2018. In Search of CurveSwap: Measuring Elliptic Curve Implementations in the Wild. 2018 IEEE European Symposium on Security and Privacy (EuroS&P), April; IEEE. pp.384–398). The most prettiness of using elliptic curve cryptography over other cryptosystems (i.e., RSA) is that it provides same security strength for a lesser key without breaching the system, thereby consuming less resources and ameliorating performances and fast data throughput of the devices. To choose a suitable public cryptosystem for use in IoT devices like sensor networks, elliptic curve cryptography and RSA are comparatively analyzed in this paper.


2013 ◽  
Vol 347-350 ◽  
pp. 2223-2227
Author(s):  
Xian Ying Huang ◽  
Qiong Cao

The rapid development of mobile technology has brought the change of learning. Mobile learning refers to a new kind of learning for the use of wireless communication technologies and mobile equipments to obtain the educational information, resources, and services. The framework of mobile learning system using wireless communication technology is proposed, a mobile learning support system with multiple wireless terminals is implemented which customs communication protocol to communicate with each other and uses multi-threading technology. The server push learning content to the terminal, learners receive information or to send information to the server through wireless terminal, to feedback information and interaction, and server processes terminal information, data analysis, and then sent to the learner. The system can be applied to a variety of mobile learning occasions, the application shows that the effect of the system effectively reduce the learning environment, and to increase the participation and interest of the learner, improve learning efficiency and learning outcomes.


2014 ◽  
Vol 687-691 ◽  
pp. 2929-2932
Author(s):  
Yin Lei ◽  
Jia Hong Zhong

In the mobile Internet era, in order to learn whenever and wherever possible, we design a mobile learning system based on Android platform. With the key technologies introduced, we design the overall architecture, structure layer and system flow of the mobile learning system, and further design some function modules.


Author(s):  
Jeenat Sultana ◽  
Tasnuva Ahmed

Mobile nodes roaming around in the hostile environment of mobile adhoc network (MANET) play the role of router as well as terminal. While acting as a router, a node needs to choose a reliable routing protocol. Besides, an encryption algorithm is needed to secure data to be conveyed through the unfriendly atmosphere while acting as a terminal. We have implemented Elliptic Curve Cryptography (ECC) along with Adhoc On Demand Multipath Distance Vector (AOMDV) routing protocol to secure data transmission against blackhole attack in a MANET. ECC, a public key cryptography that works on discrete logarithm problem with a much smaller key size, has been used to encrypt data packets at source node before transmission. We have used AOMDV, a reliable routing protocol compared to its parent protocol, Adhoc On Demand Distance Vector (AODV), with a multipath extension, for routing. The encrypted packets transferring between nodes via AOMDV, has been proved secured against blackhole attack. The performance of the secured protocol has been analyzed in terms of different performance metrics and in terms of varying number of blackhole attacker nodes.


2020 ◽  
Vol 8 (5) ◽  
pp. 5560-5563

Wireless Sensor Network (WSN) extends the advantages of small price, quick employment, and shared transaction medium, although it induces a lot of security and secrecy challenges. In this paper, the Elliptic Curve Cryptography based Secure Data Communication and Enhance sensor Reliability (SDER) in WSN. In this scheme, an Elliptic Curve Cryptography (ECC) Weierstrass function is used to verify the sensor reliability, and ECC cryptography technique is useful for providing the data security in the network. The simulation result demonstrates that the SDER reduces both the packet loss rate and the network delay.


Sign in / Sign up

Export Citation Format

Share Document