You are on page 1of 6

TELECOMMUNICATION AND NETWORK ENGINEERING EDUCATION

SecRet: How to Apply the 5E Model for a


Master’s Level Network Security Course
Ruxandra F. Olimid

Engagement, exploration, Abstract Course Overview


explication, elaboration,
and evaluation are the Engagement, exploration, explication, elab- The Network Security course is a first-year
oration, and evaluation are the five stages of Master’s course given at the University of
five stages of learning
learning of the 5E’s Instructional Model. We Bucharest. This article refers to the spring
of the 5E’s Instructional show that the 5E’s main concepts can be suc- 2019 course given by the author, who is also
Model. The authors show cessfully applied to a Master’s level course in the proposer of the course as part of the cur-
that the 5E’s main con- network security to provide a student-centered riculum. We call the course SecRet, which
cepts can be successfully learning approach. We present the various tech- comes from Securitatea Retelelor, the name
niques that we have used during the course, of the Network Security course in Romanian.
applied to a Master’s level
with a focus on active learning enhanced Thirty-one students participated actively in the
course in network security by technology usage. We provide examples, lectures, laboratories, and projects. Because
to provide a student-cen- insights, and recommendations that are intend- the passing criteria do not require 100 percent
tered learning approach. ed to help other educators. Our findings are presence, not all students took part in all activ-
general and can be applied in other contexts ities. For course completion, students have to
as well. pass a final written exam and obtain an overall
score of at least 50 percent (50 out of 100
Introduction points). Table 1 shows the complete grading
The introduction of a standalone network security scheme. The number of credits allocated for
course in the curricula for engineering and com- the course is six (ECTS).
puter science education is a subject of debate. The course is organized in a two-hour lecture
Network security aspects are usually part of other per week and two-hour laboratory every two
courses, and still, not many Master’s programs weeks with a total duration of 14 weeks. We
have a dedicated network security course. reserved the first half of the semester for lectures
This article presents a way to implement the and lecture activities, with laboratory assignments
main objectives and thus benefit from the advan- proposed by the course staff. We dedicated the
tages of applying the 5E Instructional Model [1] in second part of the semester for students’ projects.
the context of a Master’s level course in network We refer to these activities in more detail later.
security. The applicability to our context is strictly As prerequisites, students need a background
in terms of the goals and objectives of each of in networking and cryptography. The Master’s
the 5E’s phases: engage, explore, explain, elabo- curriculum includes the Advanced Cryptography
rate, and evaluate. This is because the model is course in fall, but no mandatory course on net-
usually time-consuming and not appropriate for a working, so students are expected to come with
Master’s course for which the technical informa- the proper background from the bachelor pro-
tion is abundant. In this article, we present and gram.
discuss our findings. We consider our work to be
an example of how various active learning tech- The 5E Instructional Model
niques can be successfully applied in general, in For the course, we adopted a student-centered
the design and conduction of similar courses. In method of instruction, with a predominant con-
addition to well-known active learning techniques, structionism learning perspective based on active
we emphasize novel aspects (e.g., students creat- learning [2–5]. We started from the 5E Instruction-
ing and leading laboratory activities). We exem- al Model, first introduced by Bybee and Landes
plify various techniques and show how we have back in the 1990s [1], and later applied to other
enhanced the learning process by making use of engineering fields as well [6,7]. The model was
technology. We give examples and recommenda- first described in the context of a Biological Sci-
tions that hopefully will be helpful for other edu- ences Curriculum Study, so some differences will
cators. be noticed within instructional modalities when
The article is organized as follows. The next applying it to a network security course. More-
section introduces our course. We describe the over, because of time limitations and applicability
5E Instructional Model. We explain the methods for our purposes, we did not follow the model
that we have used to apply the 5Es to our course. as such but considered the five phases of the
We give some insights and discuss our findings. model for our needs. The 5E Instructional Model is
Finally, we conclude. described as follows [1, 6]:
Digital Object Identifier:
10.1109/MCOM.001.1900228 The author is with the University of Bucharest.

54 0163-6804/19/$25.00 © 2019 IEEE IEEE Communications Magazine • November 2019

OLIMID_LAYOUT.indd 54 11/6/19 2:42 PM


Engagement: The instructor seeks to know the Score We present the various
students, understand the level of their knowledge, Activity Type
(max. 100)
and identify strong and weak aspects in their edu- instructional methods
cational background. This phase also deals with 15 Laboratory Individual we have used for
the motivational aspects, aiming to engage stu-
15 Laboratory project Group work SecRet. Our methods
dents and make them like to learn.
Exploration: The students explore new con- 20 Course project Group work follow the 5E Instruc-
cepts by reading, experimentation, or discussions. tional Model in terms
The concepts have not been lectured or direct- 50 Written exam Individual
ly explained before. Using this approach, the of goals and main con-
Lecture activity
students actively increase their knowledge. The +10
(bonus)
Individual/group work
cepts (engage, explain,
instructor answers questions or gives directions
but does not directly transmit knowledge to the Most voted course explore, elaborate, and
+5 (Students’ proposal)
students in a traditional way. project (bonus) evaluate), but for the
Explanation: The instructor introduces the for- Table 1. Grading. overall syllabus, and not
mal definitions of concepts. This phase focuses
on particular aspects and usually comes as a con- a single unit of learning.
sequence of the exploration phase, where stu- Therefore, there are
dents should use the knowledge gained during
the exploration phase. Students are invited to ask differences in relation
questions and clarify their concepts. to the traditional 5E
Elaboration: Students develop a deeper and Instructional Model.
broader understanding by practicing what they
have already learned. They are supposed to per-
form new experiments, create presentations, or
explain concepts to their fellow students.
Evaluation: Students are evaluated by formal
or informal methods, such as exams, quizzes,
writing assignments, projects, and portfolios. This
phase allows the instructor to be aware of the stu-
dents’ progress and take corresponding actions.

APPlIed Methods
We present the various instructional methods we
have used for SecRet. Our methods follow the 5E
Instructional Model in terms of goals and main
concepts (engage, explain, explore, elaborate, Figure 1. The 5E Model applied to the SecRet
and evaluate), but for the overall syllabus, not a course.
single unit of learning. Therefore, there are differ-
ences in relation to the traditional 5E Instructional The surveys and feedback questionnaires were
Model. This mainly comes from a lack of time to conducted with the main goal of increasing the
cover all the topics of the course, because the 5E engagement of the students in the course.
Instructional Model might require several days
for a single topic. This makes it more suitable for lectures
school learning, where the number of allocated The course maintained the traditional tech-
hours is higher, and the quantity of information is niques of lecturing, but we enhanced the teach-
lower than in the higher education system. Never- ing process through modern technologies.
theless, we show that the main concepts can be Examples include video and audio support with
successfully applied to higher education programs real-life examples. Usage of slides and projector
as well and nicely adapted to students, who are was the usual method to explain and discuss
expected to be more independent learners. Fig- the topics.
ure 1 gives an overview of how we have applied We used lecturing as the main technique
the 5E model to our SecRet course. to explain new concepts and protocols. These
include the mandatory topics, such as general
surveys And feedbAck principles and security aspects, widely used stan-
In the first lecture, we conducted a survey to dis- dards and protocols for wired and wireless net-
cover the students’ backgrounds. We then based works (e.g., WEP/WPA/WPA2, 2G/3G/4G), and
our teaching process on their previous knowl- attacks and vulnerabilities.
edge. This is not an easy task, especially if they The lectures included inquiry-based teaching
have disparate backgrounds and knowledge lev- methods: asking questions, reviewing what is
els, but it makes the course more comprehensible already known, and reasoning about comparisons
for the majority. As a consequence, the students and predictions [6]. Moreover, we have tried to
are generally pleased to attend the lectures. repeat important concepts and make analogies to
Feedback is essential. Thus, we consider a good previously studied notions to make students learn
practice to collect feedback whenever possible by repetition.
during the course. In our case, we collected spe-
cific feedback at the end of the interactive labora- lecture ActIvItIes
tories and general feedback using an anonymous During the lecture hours, we sometimes paused
online form. For both the survey in the first lecture teaching and involved students in different
and the feedback we have used Google Forms. activities on the given topic. To preserve the

IEEE Communications Magazine • November 2019 55

OLIMID_LAYOUT.indd 55 11/6/19 2:42 PM


Name Description step-by-step interaction. The students were
asked to show their progress to the course staff,
Students participated in quizzes (created in Kahoot or Quizizz). Examples and they had the possibility to provide direct
Quizzes
include quizzes to test general knowledge, knowledge about standards and feedback via the laboratory platform at the end
protocols related to IEEE802.11i, and mobile networks. They are valuable to of their work.
test students’ knowledge, attention, and understanding. While performing practical tasks, students
experienced through learning by doing.
Students argue about the security of a given protocol. Examples include
Security evaluation
the analysis of WEP and EAP-MD5. They are valuable to test the capacity of Course and Laboratory Projects
of protocols
reasoning.
During the semester, the students had to deliver
Students fill in missing words in sentences or phrases. They are valuable to test a course and a laboratory project. Both are exam-
Fill in forms
students’ capacity of memorizing or comparison of similar notions. ples of collaborative work, and students were
asked to work in teams of two or three mem-
Students evaluate if the given statements are true or false. They are valuable to bers. We allowed the students to make their own
True/false
test the students’ level of knowledge or reasoning about different facts. teams, but we requested that all group members
Students fill in crosswords. Examples include complete naming of acronyms in must be involved in presenting the course project
Crosswords in leading the laboratory assignment.
WiFi or mobile networks. They are valuable to fix acronyms.
For the course projects, the students presented
Table 2. Lecture activities. a new topic in a 30-minute time slot during the
lecture. The course project deliverables consist
students’ attention and enthusiasm, we changed of materials (e.g., slides, written report) so that
the type of activities over time. For example, the notions can be comprehensible by absent
after talking about WiFi standards, we conduct- students as well. This is because the course proj-
ed a short Kahoot quiz to fix the notions, and ects become part of the syllabus and material for
after finishing the lectures dedicated to WiFi, the final exam. At students’ proposal, a bonus of
we asked the students to fill in a cross-word 5 (out of 100) points was awarded for the most
puzzle. Table 2 describes the main types of voted project. This motivated the students even
activities that we used during our course. Some more to deliver high-quality work.
of them make use of mobile technologies. This For the laboratory, the students created and
is the case of Kahoot and Quizizz applications led a laboratory for their fellow students. While
used to evaluate the students’ knowledge and project work is a known approach covered
understanding. These, along with the crossword by inquiry-based learning [8], leading the lab-
games, aimed to increase the engagement of oratory also engages the students in teaching
students. More advanced activities, such as activities (e.g., prepare the prerequisites for the
exercises related to the security evaluation of laboratory assignment, give hints and respond
protocols, required students to work in small to questions). Hence, we consider this to be an
groups (of two or three students) and elaborate innovative approach in active learning. The stu-
on specific topics. All lecture activities helped dents were allowed to use whatever tool they
to operate a continuous evaluation during the found useful, under the restriction that the tool
semester. had to be either freely available for educational
For every activity, we rewarded the three top purposes or available within the university labo-
students with 3, 2, and 1 activity point(s), respec- ratories. The deliverables consist of a laboratory
tively. At the end of the course, we granted a assignment, with required steps to complete
bonus of 10 points to the final grade to the top the tasks. The fellow students participating in
three students. This proved to highly motivate the laboratory had to follow the steps and solve
students and engage them actively in the lecture the proposed tasks. The material covered by
activities. the laboratory projects was not part of the final
We used the lecture activities as a method written exam.
of learning by repetition because the questions Projects help students explore new topics,
were always related to the notions discussed papers, and research results, evaluate their con-
during the lectures. This is also the method we tribution to the topic, elaborate, and explain their
have used to bring learn by gaming to class, findings to the other students.
because most of the times the activities were Students conducted project-based learning.
interactive and funny. While presenting the projects or leading the lab-
oratory, students learned by teaching. While pre-
Laboratory paring the laboratory tasks or participating in the
The hands-on activities performed during the other proposed laboratories, students performed
laboratory hours helped students explore and hands-on activities, so they were learning by
gather practical skills. To solve the tasks, the doing.
students used technology in terms of simula- For all the above-mentioned activities, we have
tors, virtual machines, and online tools. Exam- used a wide variety of techniques, such as:
ples include VirtualBox, Wireshark, OpenSSL, • Alternating individual (e.g., some lecture
and programming languages. To exemplify, activities, all laboratory activities) and collab-
one of the laboratory assignments asked the orative learning (e.g., some lecture activities,
students to analyze and understand the struc- the course and laboratory projects)
ture of a digital certificate, reason about the • Guided learning (e.g., lecturing) and indepen-
cryptographic primitives, use Putty to generate dent learning (e.g., projects)
a pair of OpenSSH keys, and experiment with • Active learning techniques (e.g., learn by
certificates in OpenSSL. The laboratory assign- gaming, learn by teaching, learn by doing,
ment was created in Google Forms to allow learn by inquiring)

56 IEEE Communications Magazine • November 2019

OLIMID_LAYOUT.indd 56 11/6/19 2:42 PM


Discussion Group Id No. of students Title of the course/laboratory project

In the following, we present our findings and give 1 3 Tor


some recommendations for educational practices
2 3 Cloud security
based on our observations.
We are aware that helping students enjoy the 3 3 Digital certificates
course and activities is very important. Thus, we
endeavored to make the learning process fun and 4 3 Attacks against 4G and 5G networks
engaging. One particular example is the acronym 5 2 FTP and FTPS/Network Analyzer with NMAP and Python
of the course itself: SecRet. This artifice adopted
from the beginning was nicely received by stu- 6 2 IPSec
dents. A recommendation is to collect information
7 3 Security management/Best Practices to Secure a Network
about the students’ background in the first lecture
[9]. To accomplish this, we used an anonymous 8 3 Quick UDP Internet Connections (QUIC)/CTF Wireshark
questionnaire built in Google Forms, a simple
solution that is freely available to all educators. 9 2 SSH/CTP Apache
Twenty-nine students responded to the survey, of 10 2 PPoE
whom two had never studied networking before.
Twenty-three students were employed full-time, 11 2 DHCP/Web Security
three students were employed part-time, and one
12 3 TLS/Docker
student worked occasionally.
We found continuous evaluation in combi- Table 3. Projects groups and topics.
nation with a reward (bonus points for the top
three students) to be a good strategy for several We scheduled all projects in the second half
reasons: it increases the number of students that of the semester to give students enough time to
attend the lectures, it keeps them more atten- prepare. This left us the first half of the semes-
tive and active, and it helps to fix new concepts ter to lecture the mandatory topics. Hence, look-
and principles in memory. The fact that continu- ing at the overall course, conducting the explain
ous evaluation improves performance is already phase before the explore phase might be seen
known from the existing literature [10]. as a change from the traditional 5E Instructional
For the projects, students were allowed to Model [1]. Nevertheless, this is not entirely true
choose their own group. There was no restric- because many of the project topics were new,
tion regarding the composition of the groups and a short explain phase was conducted after
other than the number of students. We asked each project presentation in the form of questions
for a maximum of three students in a group, and clarifications.
because it is believed that group learning gives Overall, learning by teaching proved to be
best results in small groups of two to five stu- successful for the presenting groups, but also
dents [9, 11, 12]. Table 3 shows the groups’ for the audience. In particular, the laboratory
structure and the topics chosen for the projects. exercises proposed by the students were well
Not surprisingly, everybody decided to keep the received by their fellow students. Students
same group for the course and laboratory proj- enjoyed leading the laboratory, and they helped
ects. This means that they preferred stability and others whenever they were stuck on a particu-
continuity within the team. Moreover, many of lar task. One specific example is a laboratory
the groups decided to maintain the same topic built by the students in the form of a Capture
for the course and laboratory assignments. If so, the Flag exercise. The knowledge required to
they presented the theoretical concepts at the complete the tasks and find the flag included
course and brought experimentation at the lab- Wireshark configuration to decrypt SSL traffic
oratory. This is marked by a single project title after recovering a password by Google Chrome
in Table 3. SSL key logging and using real-time capture of
We consider it a good idea to allow students Wi-Fi traffic.
to select their topics for several reasons. First, Group-based learning has its disadvantages,
the syllabus of the course changes from year to and it might be difficult for students to handle
year, which brings novelty and keeps it updated. (e.g., workload distribution, management prob-
Second, students choose topics in which they are lems, interpersonal relations) [9, 12]. We have
interested, so they find it more enjoyable and are also experienced a problem with one of the
more engaged in their work. We found it helpful groups: a student tried to ignore the other two
to ask students to send the course project topic in members and work individually on the laboratory
time and request approval to proceed with it. The assignment.
main reason for this is to prevent duplicate top- Throughout the semester, the students
ics. A second reason is to prevent students from learned about ethical aspects through demon-
selecting topics that are insignificant or unrelated stration. For example, many of the lecture
to the course. On the contrary, for the laboratory activities were conceived so that the students
project, we have assumed the risk of lower- qual- compute the score by themselves. More pre-
ity content as a trade-off with increasing students’ cisely, students wrote down their answers
independence and responsibility concerning their (individually or in a group). Then we discussed
work. We did not ask for any deliverable and only and pointed out the correct and incorrect
provided feedback before the presentation on answers and reasoning. Based on the discus-
students’ requests. We consider this to be feasible sions and explanations, the students computed
when working with graduate students who are their score. Nevertheless, we cannot generally
more mature and experienced. assume correct behavior in the student popula-

IEEE Communications Magazine • November 2019 57

OLIMID_LAYOUT.indd 57 11/6/19 2:42 PM


The course was well-re- Main targeted Not Very I don’t know/
Activity Little Medium Much
goals at all much I don’t answer
ceived by students.
They were engaged Lectures G1 — — 9% 36% 55% —

and motivated to learn Lecture activities G2 — 27% — 27% 46% —


throughout the semes- Laboratory G3 — — 18% 46% 36% —
ter, and not just before Course project G1, G2 — — 36% 36% 28% —
the final exam. This Laboratory project G3 — — 36% 36% 28% —
leads to better overall
Course projects of other students G1 — 9% 46% 36% — 9%
performance. We also
Laboratory projects of other students G3 — 9% 27% 46% 9% 9%
found that the students
Table 4. Students’ perception on how helpful each activity was in the learning process.
are more inclined to
find more valuable the tion because of a variety of factors [13], so we • The educational platform Moodle used to
traditional means of often collected a copy of the students’ answers communicate with the students, deliver
before the discussions. materials, news, and assignments, and post
teaching: lecturing and We found that feedback is not simple to col- grades
laboratory scheduled lect, even though we had facilitated anonymous • Interactive online quizzes for which students
hours. and easily filled in questionnaires. We received use their mobile phones to respond
most of the feedback during the scheduled • Software tools for the laboratory activities
hours. Alternatively, we also obtained valuable (e.g., virtual machines, programming lan-
feedback when we asked the students via email guages, PacketTracer, OpenSSL, Wireshark,
to fill in the form. We asked the students to Nmap, Tor, FTP servers)
express their opinion about the course in gener- • Cloud storage used by students to publish
al, and how useful they found each of the activ- their projects (e.g., Google Drive, Gitlab)
ities in the course. Table 4 lists the results. The • Other online resources (e.g., videos, presen-
students considered the lectures to be the most tations, papers)
helpful for their learning process. We obtained
similar but lower results for the utility of the Conclusions
laboratory. The opposition of students toward We have described how to implement a stu-
change to active learning is perceived as nor- dent-centered learning environment based on
mal: students can perceive that they learn less, active learning for a network security course at
but actually research shows the opposite [11, the Master’s level. Our pedagogical method was
12]. The students considered the course and lab- focused on the 5Es: engagement, exploration,
oratory projects equally helpful. With respect explication, elaboration, and evaluation. During
to the lecture activities, some students consid- the course, we have successfully used known
ered them to be a waste of time. They suggested techniques such as learn by gaming, learn by
maintaining the bonus, but they preferred to be repetition, learn by doing, learn by projects, and
awarded by simple questions that the lecturer learn by teaching. Whenever possible, we have
addresses to the students. We see this as a direct enhanced the learning environment using tech-
consequence of the students’ opinion on the nology.
importance of lecturing: the lecture activities The course was well received by students.
are time-consuming, and the students prefer to They were engaged and motivated to learn
use the allocated time for lecturing, which they throughout the semester, not just before the
believe maximizes the learning process. To over- final exam. This leads to better overall perfor-
come this while preserving the benefits of active mance. We also found that the students are
learning, we have conducted quickly completed more inclined to find the traditional means of
activities (e.g., fill-in forms, true/false questions). teaching more valuable: lecturing and laboratory
We have used different lecture activities to scheduled hours.
maximize the learning goals: (G1) learn about The methods, techniques, and examples we
security protocols and standards in wired and have presented and discussed in the article can
wireless communication, (G2) analyze and rea- be applied to any course in network engineering
son about security techniques and protocols, and or computer science, at both the undergraduate
(G3) develop practical abilities and skills. Table 4 and graduate levels. This makes our findings valu-
indicates the main goals targeted by each activity able in a general context.
type. The evaluation of reaching specific objec-
tives that derive from these goals has been done Acknowledgment
both during the semester (course and laboratory This work was partially supported by a grant from
projects, laboratory work, and lecture activities) the Romanian Ministry of Research and Innovation
and at the final exam. We note that the final exam CCCDI-UEFISCDI project no. 17PCCDI/2018.
did not evaluate any objectives related to (G3), References
but mostly (G2) and to some extent (G1). [1] R. W. Bybee and M. L. Nancy, 1990, “Science for Life & Liv-
Throughout the course, we tried to maximize ing: An Elementary School Science Program from Biological
the opportunities to enhance learning using tech- Sciences Curriculum Study,” The American Biology Teacher,
vol. 52, no. 2, pp. 92–98.
nology, which is recommended due to strong [2] S. E. Cooperstein and E. Kocevar-Weidinger, 2004, “Beyond
pedagogical reasons [9]. Examples in this respect Active Learning: A Constructivist Approach to Learning,”
include: Reference Services Review, vol. 32, no. 2, pp.141–48.

58 IEEE Communications Magazine • November 2019

OLIMID_LAYOUT.indd 58 11/6/19 2:42 PM


[3] G. B. Wright, “Student-Centered Learning in Higher Educa- [11] P. L. Machemer and P. Crawford, “Student Perceptions of
tion,” Int’l. J. Teaching and Learning in Higher Education, vol. Active Learning in A Large Cross-Disciplinary Classroom,” Active
23, no. 1, 2011, pp. 92–97. Learning in Higher Education, vol. 8, no. 1, 2007, pp. 9–30.
[4] R. M. Felder and R. Brent, “Active Learning: An Introduc- [12] E. Swanson et al., “The Effect of Team-Based Learning on
tion,” ASQ Higher Education Brief, vol. 2, no. 4, pp.1–5. Content Knowledge: A Meta-Analysis,” Active Learning in
[5] M. Prince, 2004, “Does Active Learning Work? A Review of Higher Education, vol. 20, no. 1, 2019, pp. 39–50.
the Research,” J. Engineering Education, vol. 93, no. 3, 2009, [13] M. Brimble, “Why Students Cheat: An Exploration of the
pp. 223–31. Motivators of Student Academic Dishonesty in Higher Edu-
[6] L. B. Duran and E. Duran, “The 5E Instructional Model: A cation,” Handbook of Academic Integrity, 2016, pp. 365–82.
Learning Cycle Approach for Inquiry-Based Science Teach-
ing,” Science Education Review, vol. 3, no. 2, 2004, pp. Biographies
49–58. Ruxandra F. Olimid (ruxandra.olimid@fmi.unibuc.ro) is a lec-
[7] P. Cheng, “5E Mobile Inquiry Learning Approach for Enhanc- turer in the Department of Computer Science, University of
ing Learning Motivation and Scientific Inquiry Ability of Uni- Bucharest, and an adjunct associate professor in the Depart-
versity Students,” IEEE Trans. Education, vol. 59, no. 2, 2016, ment of Information Security and Communication Technology,
pp. 147–53. Norwegian University of Science and Technology, Trondheim.
[8] P. Kahn and K. O’Rourke, “Guide to Curriculum Design: She received her Ph.D. in computer science from the University
Enquiry-Based Learning,” Higher Education Academy, vol. of Bucharest in 2013. She has a background in both computer
30, no. 3, 2004, . science (B.Sc. and M.Sc. from the University at Bucharest, 2008
[9] L. B. Nilson, Teaching at Its Best: A Research-Based Resource and 2010) and telecommunications (B.Sc. from the University
for College Instructors, 2016, Wiley. Politehnica of Bucharest, 2009). Her past experience includes
[10] J. L. Poza-Lujan et al., “Assessing the Impact of Continu- Cisco certifications (CCNA, WLAN/FE) and almost 10 years at
ous Evaluation Strategies: Tradeoff Between Student Perfor- Orange Romania. Her research interests include cryptography
mance and Instructor Effort,” IEEE Trans. Education, vol. 59, and privacy, with a current focus on security and privacy in com-
no. 1, 2015, pp. 17–23. munication networks.

IEEE Communications Magazine • November 2019 59

OLIMID_LAYOUT.indd 59 11/6/19 2:42 PM

You might also like