Please use this identifier to cite or link to this item: http://idr.nitk.ac.in/jspui/handle/123456789/14987
Full metadata record
DC FieldValueLanguage
dc.contributor.authorG H S.G.
dc.contributor.authorSwamy S.C.
dc.date.accessioned2021-05-05T10:16:08Z-
dc.date.available2021-05-05T10:16:08Z-
dc.date.issued2020
dc.identifier.citationProceedings of B-HTC 2020 - 1st IEEE Bangalore Humanitarian Technology Conference , Vol. , , p. -en_US
dc.identifier.urihttps://doi.org/10.1109/B-HTC50970.2020.9298010
dc.identifier.urihttp://idr.nitk.ac.in/jspui/handle/123456789/14987-
dc.description.abstractModern learning systems, say a tutoring platform, has many characteristics like digital data presentation with interactivity, mobility, which provides information about the study-content as per the learners understanding levels, intelligent learners behavior, etc. A sophisticated ubiquitous learner system maintains security and monitors the mischievous behavior of the learner, and authenticates and authorizes every learner, which is quintessential. Some of the existing security schemes aim only at single entry-point authentication, which may not suit to ubiquitous tutor platform. We propose a secured authentication scheme which is based on the information utility of the learner. Whenever a learner moves into a tutor platform, which has ubiquitous learner system technology, the system at first-begins with learners' identity authentication, and then it initiates trust evaluation after the successful authentication of the learner. Periodic credential verification of the learner will be carried out, which intensifies the authentication scheme of the system proposed. BAN logic has been used to prove the authentication in this system. The proposed authentication scheme has been simulated and analyzed for the indoor tutor platform environment. © 2020 IEEE.en_US
dc.titleA Security Approach to Build a Trustworthy Ubiquitous Learning Systemen_US
dc.typeConference Paperen_US
Appears in Collections:2. Conference Papers

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.