Learn More
Several approaches have been proposed for Intrusion Detection Systems (IDS) in Mobile Ad hoc Networks (MANETs). Due to lack of MANETs infrastructure and well defined perimeter MANETs are susceptible to a variety of attacker types. To develop a strong security scheme it is necessary to understand how malicious nodes can attack the MANETs. Focusing on the(More)
Wireless network is a growing technology that facilitates users for sharing of information instantly through wireless electronic devices irrespective of their locations. It can be infrastructure based or infrastructure less (ad hoc networks). An ad hoc network gains more attention because of its convenience, mobility, scalability, cost and easy setup. It is(More)
This paper proposes a new approach for e-assessment or e-examination authentication. This approach enables educational institutions to conduct cheating-free e-examinations, which has been considered a big challenge of e-learning within the previous decade. It ensures that an examinee is the correct student throughout his exam. This approach provides(More)
Cognitive Radio Networks (CRNs) allow their unlicensed users named Secondary Users (SUs) to share and access licensed wireless spectrum band without any kind of interference with its original users named Primary Users (PUs); and under condition that the PUs' Quality of Service (QoS) won't degrade. Due to the large number of SUs and as all of them will have(More)
This paper presents a theoretical model for summative e-assessment in distance learning for the future, where exams can be conducted distantly, e.g. at home. This model aims to provide e-learning systems with an authentication approach that guarantees cheating-free summative e-assessment. It utilizes a combination of live video monitoring and a bimodal(More)
  • 1