The Role of SSL/TLS, IPsec & IKEv2 Protocols in Security of E-learning System’s Communications, A Study & Simulation Approach

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2017 by IJCTT Journal
Volume-50 Number-1
Year of Publication : 2017
Authors : Afshin Zivi, Gholamreza Farahani, Kooroush Manochehri
DOI :  10.14445/22312803/IJCTT-V50P105

MLA

Afshin Zivi, Gholamreza Farahani, Kooroush Manochehri "The Role of SSL/TLS, IPsec & IKEv2 Protocols in Security of E-learning System’s Communications, A Study & Simulation Approach". International Journal of Computer Trends and Technology (IJCTT) V50(1):20-33, August 2017. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
E-learning is a new educational concept that provides digital content and learner-centered environment for both student and teacher. Security on all systems is an important way to organize it, since internet as the backbone of all systems is considered unsafe and in fact transfers all the communicational transactions in the e-learning system, thus intruders and attackers can abuse security holes, and cause troubles for the system. E-learning system must be secure against threats and manipulations by intruders as well as to protect student privacy. Security is a basic principle in the development of networks, however, the lack of security procedures that can be easily implemented, is fully tangible, and because, an e-learning system mainly provides services through its varied services’ networks to users, so the lack of security mechanisms can cause irreparable damage to the system. The aim of this study was to evaluate and compare the protocols of SSL/TLS, IPsec, and IKEv2 to secure communications of e-learning system. It should be noted that all obtained solutions including securing e-learning system with the help of the above-mentioned protocols is based on the administrative-technical model presented in the previous study.

References
[1] D. Dharmawansa, K. T. Nakahira, Y. Fukumura, ‘Detecting Eye Blinking of a Real-World Student and Introduction to The Virtual E-Learning Environment’ Procedia Computer Science, Vol. 22, pp. 717-726, 2013.
[2] S. Karforma, B. Ghosh, ‘on security issues in e-learning system’ Proceedings of COCOSY-09, University Institute of Technology, Burdwan University, 2009.
[3] C. J. Richardson, K. Swan, ‘Examining social presence in online courses in relation to students` perceived learning and satisfaction’ Journal of Asynchronous Learning Networks, Vol. 7, Issue 1, pp. 68-84. 2003.
[4] K. Swan, P. Shea, E. Fredericksen, A. Pickett, W. Pelz, G. Maher, ‘Building knowledge building communities: Consistency, contact and communication in the virtual classroom’ Journal of Educational Computing Research, Vol. 23, Issue 4, pp. 359-383, 2000.
[5] S. Adibi, ‘A Remote Interactive Non-Repudiation Multimedia-Based M-learning System’ Telematics and Informatics, Vol. 27, pp. 377-393, 2010.
[6] A. Ortiz de Guinea, H. Kelley, M. G. Hunter, ‘Information Systems Effectiveness in Small Businesses: Extending a Singaporean Model in Canada’ Journal of Global Information Management (JGIM), Vol. 13, Issue 3, 55-79, 2005.
[7] W. H. DeLone, E. R. McLean, ‘Information systems success: The quest for the dependent variable’ Information Systems Research, Vol. 3, Issue 1, pp. 60-94, 1992.
[8] W. H. DeLone, E. R. McLean, ‘The DeLone and McLean model of information systems success: A ten-year update’ Journal of Management Information Systems, Vol. 19, Issue 4, No. 9, 2003.
[9] A. Zivi, S. Rezaeian, N. Shahhoseini, ‘A Survey Approach to Analyze E-Learning System of Islamic Azad University from the Perspectives of Optimality, Privacy and Data Protection, Review Phase, Analysis of Statistical Data and Providing a Managerial Model, International Journal of Computer and Information Technology, Vol. 5, No, 1, pp. 24-45 2017. Available Online: http://ijocit.org/IJOCIT/Vol%205,%20No.1/IJOCIT-Vol05I0103.pdf.
[10] B. Daya, ‘Network Security: History, Importance, and Future’ University of Florida Department of Electrical and Computer Engineering, p. 13, 2013.
[11] K. El-Khatib, L. Kobra, Y. Xu, G. Yee, ‘Privacy and Security in E-Learning’ International Journal of Distance Education, Vol. 1, Issue 4, pp. 1-15, 2003.
[12] S. Chanasuc, P. Praneetpolgrang, ‘An Empirical Study on the Effect of Organizational Culture on the Acceptance of eLearning in Thai Higher Education’ Fifth International Conference on eLearning for Knowledge-Based Society, pp. 1-6, 2008.
[13] Y. E. A. Mustafa, S. M. Sharif, ‘An Approach to Adaptive E-Learning Hypermedia System based on Learning Styles (AEHS-LS): Implementation and evaluation’ International Journal of Library and Information Science, Vol. 3, Issue 1, pp. 15-28, 2011.
[14] A. E. S. Khedr, ‘Towards Three Dimensional Analyses for Applying E-Learning Evaluation Model: The Case of E-Learning in Helwan University’ International Journal of Computer Science Issues (IJCSI), Vol. 9, Issue 4, 2012.
[15] Y. Bentley, H. Selassie, A. Shegunshi, ‘Design and Evaluation of Student-Focused eLearning’ The Electronic Journal of e-Learning, Vol. 10, issue 1, pp. 1-12, 2012. Available online: www.ejel.org.
[16] N. Barik, S. Karforma, ‘Risks and Remedies in E-Learning System’ International Journal of Network Security & Its Applications (IJNSA), Vol. 4, No. 1, pp. 51-59, 2012.
[17] Z. F. Zamzuri, M. Manaf, A. Ahmad, Y. Yunus, ‘Computer Security Threats Towards the E-learning System Assets’ Communications In Computer and Information Science, Vol. 180, pp. 335-345, 2011.
[18] H. J. Kim, ‘E-learning Privacy and Security Requirements: Review’ Journal of Security Engineering, Vol. 10, No. 5, pp. 591-600, 2013.
[19] C. C. Lim, J. S. Jin, ‘A Study on Applying Software Security to Information System: E-learning Portals’ International Journal of Computer Science and Network Security, Vol. 6, No. 3B, 2006.
[20] I. Risti?, ‘Bulletproof SSL and TLS’ Fiesty Duck Limited, p. 531, 2015. Available Online: www.fiestyduck.com.
[21] S. Frankel, S. Krishnan, ‘IP Security (IPsec) and Internet Key Exchange (IKE) Document Roadmap’ Internet Engineering Task Force (IETF), Request for Comments: 6071, ISSN: 2070-1721, p. 63, 2011.
[22] Z. Faigl, S. Lindskog, A. Brunstorm, ‘A Measurement Study on IKEv2 Authentication Performance in Wireless Networks’ Proceedings of the 6th Swedish National Computer Networking Workshop (SNCNW), 2009.
[23] W. Stallings, ‘Cryptography and Network Security: Principals and Practices’ Prentice Hall, ISBN-10: 0-13-187319-9, 4th Ed. pp. 334-340, 2005.

Keywords
E-learning system, security, SSL/TLS protocol, IPsec protocol, IKEv2 protocol.