z-logo
open-access-imgOpen Access
A Robust User Authentication Technique in Online Examination
Author(s) -
Nader Abdel Karim,
Hasan Kanaker,
Shadi Almasadeh,
Jamal Zarqou
Publication year - 2021
Publication title -
computing
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.184
H-Index - 11
eISSN - 2312-5381
pISSN - 1727-6209
DOI - 10.47839/ijc.20.4.2441
Subject(s) - login , computer science , authentication (law) , process (computing) , human–computer interaction , realization (probability) , resource (disambiguation) , user interface , the internet , world wide web , focus (optics) , timer , multimedia , computer security , computer network , statistics , physics , mathematics , computer hardware , optics , microcontroller , operating system
User authentication in the online environment is promoting a hugely challenging issue. This has contributed to the realization of a user authentication where the exams can be performed over the Internet at any time and from any place and by using any digital device. Consequently, further investigations are required to focus on improving user authentication methods to enhance online security mechanisms, especially in the field of e-exams. This research proposes a new user authentication technique based on the user interface (UI). The novel idea is created based on the design preferences of candidates who are taking the e-exams. Several design features are used to design a special user interface for e-exams, for example, the font attributes, back colour, number of questions per page, group categories for questions based on difficulties, and timer setting. The introduced technique can be used to support the user authentication process in the e-exams environment. Furthermore, the proposed technique provides the ability to login to the e-exam without the need to remember the login information, but to select what the student prefers according to his/her personal information. Based on the literature review, a primary evaluation claiming that the students have differences in their preferences and that each user has stable design preferences within different sessions is revealed. In regard to these facts, they become the resource and essence of this research. The security performance of the proposed method is evaluated. The results of the experiments show a false positive (FP) rate of 0.416% and a false negative (FN) rate of 0%.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here