1. NIST Special Publication 800-53 Revision 5, "Security and Privacy Controls for Information Systems and Organizations." The Identification and Authentication (IA) control family is designed to "identify and authenticate organizational users." The discussion for control IA-2, "Identification and Authentication (Organizational Users)," emphasizes the necessity of verifying a user's identity before granting access, which is the foundational principle for preventing impersonation. (See: NIST SP 800-53 Rev. 5, Chapter 3, IA Control Family).
2. Saltzer, J. H., & Schroeder, M. D. (1975). "The Protection of Information in Computer Systems." This foundational paper in computer security, often cited in university curricula, outlines the principle of complete mediation, which requires that every access to every object be checked for authority. This process begins with reliable authentication to establish the identity of the subject (the student). An LMS must first know who the user is before it can grant access to an exam. (See: Section I.A.3, "Design Principles"). Available via MIT's DSpace.
3. Garrison, G., & R.O. Briggs. (2012). "A Framework for Discovering and Mitigating the Security Risks in E-Learning Systems." In this peer-reviewed article, the authors identify impersonation as a key security risk in e-learning. They state, "Authentication mechanisms are the first line of defense against many security threats... Strong authentication can help to mitigate the risk of impersonation." This directly links secure authentication to the prevention of a primary form of cheating. (See: Proceedings of the 45th Hawaii International Conference on System Sciences, p. 115). DOI: 10.1109/HICSS.2012.493.