Leveraging Biometrics for User Authentication in Online Learning: A Systems Perspective

被引:25
作者
Moini, Assad [1 ]
Madni, Azad M. [1 ]
机构
[1] Intelligent Syst Technol Inc, Los Angeles, CA 90066 USA
来源
IEEE SYSTEMS JOURNAL | 2009年 / 3卷 / 04期
关键词
Authentication architecture; biometrics; e-learning; online learning; systems approach; systems thinking; STUDENTS;
D O I
10.1109/JSYST.2009.2038957
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid proliferation of online learning, students are increasingly demanding easy and flexible access to learning content at a time and location of their choosing. In these environments, remote users connecting via the public Internet or other unsecure networks must be authenticated prior to being granted access to sensitive content such as tests or personal/private records. Today, the overwhelming majority of online learning systems rely on weak authentication mechanisms to verify the identity of remote users only at the start of each session. One-time authentication using password, personal identification number (PIN), or even hardware tokens is clearly inadequate in that it cannot defend against insider attacks including remote user impersonation or illegal sharing or disclosure of these authentication secrets. As such, these methods are entirely unsuitable for circumstances where the outcome of an online assessment or a course of study is the granting of a formal degree, professional certification, or qualification or requalification for a particular skill or function. This paper examines the problem of remote authentication in online learning environments and explores the challenges and options of using biometric technology to defend against user impersonation attacks by certifying the presence of the user in front of the computer, at all times. It also leverages a 5-step process as the basis for a systems approach to ensuring that the proposed solution will meet the critical remote authentication assurance requirements. The process and systems approach employed here are generic, and can be exploited when introducing biometric-enabled authentication solutions to other applications and business domains. The paper concludes by presenting a biometrics-based client-server architecture for continuous user authentication in e-learning environments.
引用
收藏
页码:469 / 476
页数:8
相关论文
共 34 条
  • [1] [Anonymous], PERSONAL IDENTIFICAT
  • [2] Fusion of face and speech data for person identity verification
    Ben-Yacoub, S
    Abdeljaoued, Y
    Mayoraz, E
    [J]. IEEE TRANSACTIONS ON NEURAL NETWORKS, 1999, 10 (05): : 1065 - 1074
  • [3] Bowers W.J., 1964, STUDENT DISHONESTY I
  • [4] Burr William E., 2008, NIST SPECIAL PUBLICA
  • [5] CAMBIER J, 2002, P 3 WORKSH AUT ID AD
  • [6] Charlesworth P, 2006, J CHEM EDUC, V83, P1368
  • [7] Crown DF, 1998, J BUS ETHICS, V17, P683
  • [8] DERAKHSHANI R, 2003, PATTERN RECOGNIT, V17
  • [9] Edling R. J., 2000, Campus-Wide Information Systems, V17, P10, DOI 10.1108/10650740010317014
  • [10] Faculty and college student beliefs about the frequency of student academic misconduct
    Hard, Stephen F.
    Conway, James M.
    Moran, Antonia C.
    [J]. JOURNAL OF HIGHER EDUCATION, 2006, 77 (06) : 1058 - +