International Journal of Computer Networks and Communications Security

Volume 4, Issue 4, April 2016

 

 

 

A Brief Survey and Comparison of m-Learning and e-Learning

Pages: 89-95 (7) | [Full Text] PDF (271 KB)
R Zouhair, BlE habib, T Abderrahim
LABORATOIRE TECHNOLOGIES DE L INFORMATION ET MODELISATION FACULTE DES, SCIENCES BEN M SIK

Abstract -
Recent years have been marked by the rise of electronic learning (E-Learning) and that of mobile learning (M-Learning), promoted by the continuous development of new information and communications technology. We cannot work in society without online technology. Online technology has also entered the field of education. E-learning is a subset of the Distance Learning and m-learning is an e-learning subset. But the two terms are not always used correctly, with a bit of confusion and differences between them where they overlap. And more complex words, thinking about the differences between e-learning and m-learning can be especially useful for teachers who use technology in the classroom, as it can help them choose the techniques that are best for the teaching scenario. The present article is based on secondary data sources highlighting the concept of comparison, the characteristics, advantages, disadvantages, similarities and differences between e-learning and m-learning.
 
Index Terms - E-learning, M-learning, U-learning, Technology, Distance learning

Citation - R Zouhair, BlE habib, T Abderrahim. "A Brief Survey and Comparison of m-Learning and e-Learning." International Journal of Computer Networks and Communications Security 4, no. 4 (2016): 89-95.

 

Scientific and Technical Challenges Facing the Effective Implementation of Radio Frequency Identification (RFID)-based Systems

Pages: 96-106 (11) | [Full Text] PDF (704 KB)
EG Zahran, AA Arafa, H.I.Saleh, MI Dessouky
Dept. of Radiation Engineering, NCRRT, Atomic Energy Authority
Dept. of Electrical Communications, Faculty of Electronic Engineering, Menoufia University

Abstract -
Radio frequency identification (RFID) is a wireless technology used to identify objects at distance using radio waves. RFID has wide area of applications such as inventory management, production process monitoring, assembly process control, access control and security, toll collection at highways, shipping operations at ports, wild animal tracking, livestock tracking, and improving safety at hazardous areas. This paper presents an overview of the state of art of the RFID system, its applications, architecture, and challenges in deployment in order to highlight its implementation and for further investigations.
 
Index Terms - RFID, Security, Safety, Privacy, Anti-collision

Citation - EG Zahran, AA Arafa, H.I.Saleh, MI Dessouky. "Scientific and Technical Challenges Facing the Effective Implementation of Radio Frequency Identification (RFID)-based Systems." International Journal of Computer Networks and Communications Security 4, no. 4 (2016): 96-106.

 

Secured and Centralized Identification System of Subscribers with Mobile Networks: The Case of SENEGAL

Pages: 107-113 (7) | [Full Text] PDF (704 KB)
S NDIAYE, LT YELOME, A RAIMY, SM FARSSI, S OUYA
Cheikh Anta Diop University, Polytechnic High School, Dakar, Senegal

Abstract -
Nowadays, with the mobile phone, it is possible to commit several infringements, threat, blackmail, insult, terrorist acts etc. To mitigate these possibilities, the identification of the subscribers is a necessary and obligatory operation. In Senegal, the identification is a matter of national security. For the best regulation of subscribers, we suggest a platform of secured and centralized identification integrating advanced technologies which will on the run put an end to the unregulated sale of chips. The proof of the good realization of our platform of identification was made by the use of a secure and centralized database where terminals can log for operations of identification. This device will make it possible for the competent jurisdictions to have a visibility on the number of subscribers per operator and the total of subscribers on all the national extent of the territory.
 
Index Terms - Traffic, Cybercrime, Identification Management, Security, Mobile Network

Citation - S NDIAYE, LT YELOME, A RAIMY, SM FARSSI, S OUYA. "Secured and Centralized Identification System of Subscribers with Mobile Networks: The Case of SENEGAL." International Journal of Computer Networks and Communications Security 4, no. 4 (2016): 107-113.

 

Wireless Local Area Network Security Enhancement through Penetration Testing

Pages: 114-129 (16) | [Full Text] PDF (1.65 MB)
TM Refaat, TK Abdelhamid, AM Mohamed
Msc. Student at Assiut University, Assiut, Egypt
Department of Electrical Eng., Faculty of Engineering, Assiut University, Assiut, Egypt

Abstract -
Wireless Local Area Networks (WLANs) have become very popular due to their high data rates, cost effectiveness, flexibility and ease of use. On the other hand, they are facing major security threats due to the broadcast nature of the wireless media. WLANs with infrastructure mode are deployed as an extension to wired LANs, so it is necessary to be secured to avoid being a back door to the wired network. This paper presents a security solution for WLANs to achieve the standard network security requirements while combines the stability and low cost. The proposed solution works in two levels, namely, the frame security and the Radio Frequency (RF) security. It differs from the other solutions because it works in the two WLAN security levels. WPA/WPA2 encryption, AES, and strong 802.1x authentication are integrated into the solution to provide a high level of security. This paper has been done with real hardware in a lab environment. Finally, the strength of the proposed solution is examined with different penetration tests.
 
Index Terms - Wireless Security, WEP, WPA, WPA2, 802.1x, WIDS, Linux system

Citation - TM Refaat, TK Abdelhamid, AM Mohamed. "Wireless Local Area Network Security Enhancement through Penetration Testing." International Journal of Computer Networks and Communications Security 4, no. 4 (2016): 114-129.