Abstract

There is a growing concern about systems security and how to organize it. This is because the internet which is the backbone of all systems is regarded as unsafe. Also, the internet transmits all connection transactions in the E-learning and similar web-based systems and as a result, intruders and attackers by abusing security holes can compromise the system. The E-learning and other similar systems should be safe against threats and manipulation by intruders and should protect the privacy of users. The purpose of this paper is to provide an authentication model based on hardware, software and iriscode identifiers through the SSL/TLS protocol, in order to significantly improve the security and privacy level, while at the same time, maintain the system performance at an acceptable level. There are major differences between our model and other similar works, such as: no need to password in registration and login phase, using of iriscode identifier, isolation of users profiles based on hardware and software identifiers of relying party, enhancing master secret key exchange phase in the SSL/TLS protocol, no need to password change phase, strong performance in comparison with other approaches because of using SHA-3 function and removing password change phase, capability of providing authentication services over large networks and internet. Also according to conducted studies and tests, the mentioned solution can significantly improve the system security, as well as maintain its function at an acceptable level. Therefore the proposed model easily can be used for immunize E-learning and similar web-based systems that works through internet. The proposed model improves the 32.50% security and 63.58% execution time in comparison to average of five newest methods.

Highlights

  • The Internet has had a huge effect on the human community and created a revolution in the 21st century

  • The aim of this research was to provide an authentication protocol based on hardware, software and iriscode identifier through a SSL/TLS protocol for the Elearning and other similar web-based systems such that a sample has been assessed and examined in the Islamic Azad University Electronic Unit (Zivi et al, 2017b) in order to promote the level of privacy, security in the system, protect the student information and maintain optimal function of the system

  • There are major differences between our model and other similar works, such as: No need to password in registration and login phase, using of iriscode identifier, isolation of users profiles based on hardware and software identifiers of relying party, enhancing master secret key exchange phase in the SSL/TLS protocol, no need to password change phase, strong performance in comparison with other approaches because of using sha3 function and removing password change phase and capability of providing authentication services over large networks and internet

Read more

Summary

Introduction

The Internet has had a huge effect on the human community and created a revolution in the 21st century. With the development of information and connection technology, the field of study cannot be isolated from the Internet and connections dispute (Dharmawansa et al, 2013). The network of a trading company can use E-learning to educate people in the field of trade. Online education is a fast developing field in education and has been used in many universities for numerous studies (Dharmawansa et al, 2013).

Objectives
Methods
Findings
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.