Abstract
Recent mobile communication developments and the penetration of smartphones are spurring the increase of the number of smart devices owned by individuals. Mobile devices, because of the multitude of services they provide other than simple communication have become deeply rooted into each individual’s life. This development has spread into the work environment spawning a new trend commonly known as BYOD (bring your own device). However, with this trend serious security issues are emerging as a diversity of personal devices with unreliable security are increasingly accessing the typically closed intranets of conventional work environments. Corporations want to improve their productivity by taking advantage of the benefits of BYOD but it is difficult to handle an open BYOD work environment with current security technologies. This study analyzes the characteristics of BYOD environments, current threats to security and required security technologies, and presents a security framework suitable for BYOD environments. The framework presented here can manage a variety of devices despite their disparate operating systems and also control network factors according to the nature of the habits of BYOD users. As it is not based on IP or port-based analysis, which had been primarily used in the past, but on high quality, context information.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
IDG Deep Dive: Guide to BYOD Strategy. IDG Korea (2012)
Johnson, K.: Mobility/BYOD Security Survey. SANS Institute (2012)
Miller, K.W., Voas, J., Hurlburt, G.F.: BYOD: security and privacy considerations. IT Prof. 14(5), 53–55 (2012)
Symantec, Smartphone Honey Stick Project. http://www.symantec.com
Inverse, PacketFence. http://www.packetfence.org
Henderson, T.: How mobile device management works. IT WORLD (2011)
Frias-Martinez, V., Stolfo, S.J., Keromytis, A.D.: Behavior-based network access control: a proof-of-concept. In: Wu, T-C., Lei, C-L., Rijmen, V., Lee, D-T. (eds.) ISC 2008. LNCS, vol. 5222, pp. 175–190. Springer, Heidelberg (2008)
D’Alconzo, A.: A distribution-based approach to anomaly detection and application to 3G mobile traffic. In: GLOBECOM, pp. 1–8 (2009)
Fielding, R., Gettys, J., Mogul, J., Frystyk, H., Berners-Lee, T.: Hypertext Transfer Protocol-HTTP/1.1, RFC 2068 (1997)
W3C: Geolocation API. http://en.wikipedia.org/wiki/W3C_Geolocation_API
Nmap: Remote OS Detection. http://nmap.org
Kohno, T., Broido, A., Claffy, K.: Remote physical device fingerprinting. IEEE Trans. Dependable Secure Comput. 2(2), 93–108 (2005)
Jose, M.B., Smith, A.F.M.: Bayesian Theory. Wiley, New York (1994)
Graham, P.: A Plan for Spam. http://www.paulgraham.com/spam.html
Acknowledgments
This work was supported by the ICT R&D program of MSIP/IITP. [10045109, The Development of Context-Awareness based Dynamic Access Control Technology for BYOD, Smartwork Environment].
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Kang, D., Oh, J., Im, C. (2015). Context Based Smart Access Control on BYOD Environments. In: Rhee, KH., Yi, J. (eds) Information Security Applications. WISA 2014. Lecture Notes in Computer Science(), vol 8909. Springer, Cham. https://doi.org/10.1007/978-3-319-15087-1_13
Download citation
DOI: https://doi.org/10.1007/978-3-319-15087-1_13
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-15086-4
Online ISBN: 978-3-319-15087-1
eBook Packages: Computer ScienceComputer Science (R0)