Mobile Application and Wi-Fi Network Security for e-Learning Platforms

被引:3
|
作者
Suciu, George [1 ]
Anwar, Muneeb [1 ]
Istrate, Cristiana [1 ]
机构
[1] BEIA Consult Int, Str Peroni 16, Bucharest, Romania
关键词
e-Learning; Security; Cyber-threats; Mobile Applications; m-Learning; Crypto jacking;
D O I
10.12753/2066-026X-19-052
中图分类号
G40 [教育学];
学科分类号
040101 ; 120403 ;
摘要
e-Learning embodies the use of electronic data along with information and communication technologies (ICT) in education. An e-Learning platform is a web-based software and represents an important tool for educators to create and manage courses on the web. However, due to the close relation of e-Learning with the Internet, such platforms are cyber-threatened and recent attacks have increasingly targeted platforms vulnerable to cryptojacking, a technique used for mining cryptocurrencies using the computing resources of devices from unsuspecting users. The number of educational web platforms has increased in the last years, and are now widespread in the mobile applications environment to reach a broad audience of users. The use of e-Learning mobile applications (m-Learning) enables employees to enrich their professional knowledge on their terms, whenever they want, by ensuring easy access to the learning material available on cloud platforms using any kind of Internet connection. The problem analyzed in the paper is related to the security of these m-Learning applications when connecting to public Wi-Fi network at a hotel or library, as an example of an unsecured network, while an office network is usually considered as secure. Our goal is to identify and mitigate the risks when users connect to a Wi-Fi public network, and also analyze how vulnerable devices are exposed to cybercriminals, as hackers can intercept communications between mobile devices such as smartphones or tablets using public Wi-Fi hotspots, namely a man-in-the-middle (MitM) attack. Furthermore, we evaluate several open source penetration testing tools which aid to the identification of vulnerabilities and propose proper security solutions for e-Learning platforms in the context of using public Wi-Fi networks.
引用
收藏
页码:393 / 399
页数:7
相关论文
共 50 条
  • [41] Utilising Fuzzy Logic to Improve Wi-Fi Security
    Naqvi, Ali
    2013 ELEVENTH INTERNATIONAL CONFERENCE ON ICT AND KNOWLEDGE ENGINEERING (ICT&KE), 2013,
  • [42] Fuzzing Wi-Fi drivers to locate security vulnerabilities
    Mendonca, Manuel
    Neves, Nuno
    EDCC-7: SEVENTH EUROPEAN DEPENDABLE COMPUTING CONFERENCE, PROCEEDINGS, 2008, : 110 - 119
  • [43] Longitudinal analysis of a campus Wi-Fi network
    Camacho, Jose
    McDonald, Chris
    Peterson, Ron
    Zhou, Xia
    Kotz, David
    COMPUTER NETWORKS, 2020, 170
  • [44] A Framework to Test Reliability and Security of Wi-Fi Device
    Wang, Dong
    Zhou, Ming
    2014 15TH INTERNATIONAL CONFERENCE ON ELECTRONIC PACKAGING TECHNOLOGY (ICEPT), 2014, : 953 - 958
  • [45] Fuzzing Wi-Fi drivers to locate security vulnerabilities
    Mendonca, Manuel
    Neves, Nuno Ferreira
    HASE 2007: 10TH IEEE HIGH ASSURANCE SYSTEMS ENGINEERING SYMPOSIUM, PROCEEDINGS, 2007, : 379 - 380
  • [46] Practical Studying of Wi-Fi Network Vulnerabilities
    Ismukhamedova, Aigerim
    Satimova, Yelena
    Nikiforov, Andrei
    Miloslavskaya, Natalia
    2016 THIRD INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION PROCESSING, DATA MINING, AND WIRELESS COMMUNICATIONS (DIPDMWC), 2016, : 227 - 232
  • [47] PUBLIC WI-FI NETWORKS IN THE GLOBAL ENVIRONMENT AND THEIR SECURITY
    Losonczi, Peter
    GLOBALIZATION AND ITS SOCIO-ECONOMIC CONSEQUENCES, 2018, : 2206 - 2213
  • [48] Integration of Software Router with Wi-Fi for Enhanced Security
    Chaitra, S.
    Sharma, Rinki
    2017 7TH IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2017, : 33 - 36
  • [49] WLAN industry announces Wi-Fi security plan
    不详
    COMPUTERS & SECURITY, 2003, 22 (01) : 12 - 12
  • [50] A Sample of Consumer Wi-Fi Use & Security in the UK
    Cunningham, Stuart
    Grout, Vic
    Ghita, Bogdan V.
    2009 7TH ANNUAL COMMUNICATION NETWORKS AND SERVICES RESEARCH CONFERENCE, 2009, : 386 - +