Electronic Protection for Exam Paper Leakage

International Journal of Emerging Research in Science, Engineering, and Management
Vol. 1, Issue 6, pp. 19-25, December 2025.

https://doi.org/10.58482/ijersem.v1i6.3

Electronic Protection for Exam Paper Leakage

M.A. Manivasagam

G. Hema

A. Maheswarareddy

P. Vinitha

T. Manasa

K. Dileep

Department of CSE, Siddartha Institute of Science and Technology, Puttur, India.

Abstract: Examination paper leakage is a critical issue that threatens the integrity, fairness, and credibility of academic evaluation systems. Conventional security approaches such as physical locks, sealed containers, and manual supervision are highly vulnerable to tampering, insider threats, and delayed response mechanisms. To address these challenges, this paper presents an Electronic Protection System for Exam Paper Leakage Prevention using a multi-level security framework. The proposed system integrates RFID-based authentication, Real-Time Clock (RTC)-based time restriction, and One-Time Password (OTP) verification to ensure that examination papers are accessed only by authorized personnel and only at the predefined scheduled time. Any unauthorized access attempt triggers immediate alerts and security responses. By combining time-controlled access with dynamic authentication, the system minimizes human intervention and enhances confidentiality, reliability, and trust in the examination process.

Keywords: Exam Paper Leakage Prevention, RFID Authentication, OTP Verification, Real-Time Clock (RTC), Embedded Security System, Access Control.

References: 

  1. G. V. Bhai and K. Swetha, “RTC based implementation of RFID and OTP based exam paper leakage protection system,” Türk Bilgisayar Ve Matematik Eğitimi Dergisi, vol. 10, no. 3, pp. 1629–1633, Dec. 2019, doi: 10.61841/turcomat.v10i3.14580.
  2. G. S. Ram, P. Meghana, P. Nandini, and V. Mahanthi, “Finger based protection system to avoid exam paper leakage,” International Journal of Communication and Information Technology, vol. 6, no. 1, pp. 125–128, Jan. 2025, doi: 10.33545/2707661x.2025.v6.i1b.125.
  3. H. Ghosh, P. K. Maurya, S. Bagchi, and A. D. Dwivedi, “Lightweight RFID-enabled authentication protocol in post-quantum environment,” Computers & Electrical Engineering, vol. 124, p. 110367, Apr. 2025, doi: 10.1016/j.compeleceng.2025.110367.
  4. V. Kumar and S. K. Das, “Enhancing security in IIoT: RFID authentication protocol for edge computing and blockchain-enabled supply chain,” Cyber Security and Applications, vol. 3, p. 100087, Feb. 2025, doi: 10.1016/j.csa.2025.100087.
  5. S. Khan, B. Ray, and N. Karmakar, “Fingerprinting chipless RFID with a MIMO system for tag authentication in Internet of Things,” Internet of Things, vol. 31, p. 101542, Feb. 2025, doi: 10.1016/j.iot.2025.101542.
  6. I. Mirzaali et al., “Evaluating security pitfalls of ultra-lightweight IoT authentication: A critical analysis of permutation functions,” Journal of Information Security and Applications, vol. 93, p. 104188, Aug. 2025, doi: 10.1016/j.jisa.2025.104188.
  7. Y. Song et al., “Enhancing wircless channel authentication in industrial control: Attack-resistant CSI-based PUF,” Ad Hoc Networks, vol. 178, p. 103919, Jun. 2025, doi: 10.1016/j.adhoc.2025.103919.
  8. G. R. Kumar and C. Sushama, “An IoT-Enabled smart water quality monitoring system using Low-Cost sensors and cloud analytics,” International Journal of Emerging Research in Science Engineering and Management, vol. 1, no. 5, pp. 7–12, Nov. 2025, doi: 10.58482/ijersem.v1i5.2.
  9. A. Elhence and V. Chamola, “HardSecUAV: A hardware-based mutual authentication protocol for network of drones,” Computers & Electrical Engineering, vol. 123, p. 110286, Apr. 2025, doi: 10.1016/j.compeleceng.2025.110286.
  10. H. Men, L. Cao, G. Zheng, and L. Chen, “A PUF-based lightweight identity authentication protocol for Internet of Vehicles,” Computers & Electrical Engineering, vol. 123, p. 110210, Feb. 2025, doi: 10.1016/j.compeleceng.2025.110210.
  11. Y. Kuang, Q. Wu, R. Chen, and X. Liu, “Blockchain based lightweight authentication scheme for internet of things using lattice encryption algorithm,” Computer Standards & Interfaces, vol. 93, p. 103981, Feb. 2025, doi: 10.1016/j.csi.2025.103981.