Security Enhancement of Smart Phones for Enterprises by Applying Mobile VPN Technologies

  • Young-Ran Hong
  • Dongsoo Kim
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6784)


Nowadays, many organizations are adopting smart phones for implementing a smart work environment or smart office. We implements mobile VPN client for smart phones in order to enhance the security level of organizations that adopt smart phones for business purposes enterprise widely. This paper shows that it is effective to implement the concept of enterprise VPN and mobile VPN client as a security technology for securing the network between enterprise information systems and smart phones. For implementing the mobile VPN client, VPN tunneling and encryption were used for user authentication and access control. When the smart phone OS is dualized with the usual OS and virtual OS, the VPN client application can be implemented and operated only on the virtual OS in order to be connected to the intranet. Thus, the enterprise smart phone security methodology can be enhanced more profoundly and be adapted to other smart mobile devices in the future.


Enterprise Smart Phone VPN Mobile VPN Client ICT Security 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Yague, M.I., Mana, A., Lopez, J., Troya, J.M.: Applying the Semantic Web Layers to Access Control. In: Proceedings of Database and Expert Systems Applications, pp. 622–626 (2003)Google Scholar
  2. 2.
    Loukides, M., Gorman, C.: Security Power Tools, pp. 101–129, 225–241. O’Reilly Media, Sebastopol (2007)Google Scholar
  3. 3.
    Gast, M.: 802.11 Wireless Networks: The Definitive Guide, 2nd edn. pp. 114–238. O’Reilly, Sebastopol (2005)Google Scholar
  4. 4.
    Sathu, H.: War driving dilemmas. In: Proceedings of the Nineteenth Annual Conference of the National Advisory Committee on Computing Qualifications, Wellington, pp. 237–242 (2006)Google Scholar
  5. 5.
    Sailer, R., Zhang, X., Jaeger, T., van Doorn, L.: Design and Implementation of a TCG-based Integrity Measurement Architecture. In: Proceedings of the 13th Usenix Security Symposium, San Diego (2004)Google Scholar
  6. 6.
    Bertino, E., Catania, B., Ferrari, E., Perlasca, P.: A System to Specify and Manage Multi-policy Access Control Models. In: Proceedings of the Third IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2002), pp. 116–127 (2002)Google Scholar
  7. 7.
    Schmidt, A.-D., Albayra, S.: Malicious Software for Smart-phones: Technical Report: TUB-DAI 02/08-01 (2008)Google Scholar
  8. 8.
    Trusted Computing Group: TCG Specification Architecture Overview: Specification Revision 1.4 (2007)Google Scholar
  9. 9.
    Spencer, R., Smalley, S., Loscocco, P., Hibler, M., Andersen, D., Lepreau, J.: The Flask Security Architecture: System Support for Diverse Security Policies. In: Proceedings of the Eighth Security Symposium, pp. 123–139 (1999)Google Scholar
  10. 10.
    Guo, X., Yang, K., Galis, A., Cheng, X., Yang, B., Liu, D.: A Policy-based Network Management System for IP VPN. In: Proceedings of International Conference on Communication Technology (ICCT 2003), pp. 1630–1633 (2003)Google Scholar
  11. 11.
    ANSI: X9.45 - Enhanced Management Controls using Digital Signatures and Attribute Certificates (1999)Google Scholar
  12. 12.
    Farrell, S., Housley, R.: An Internet Attribute Certificate Profile for Authorization: RFC 3281 (2001)Google Scholar
  13. 13.
    Moffett, J.D., Sloman, M.S.: Content-dependent access control. ACM SIGOPS Operating Systems Review 25(2), 63–70 (1991)CrossRefGoogle Scholar
  14. 14.
    Ryutov, T., Neuman, C., Kim, D., Zhou, L.: Integrated access control and intrusion detection for Web servers. IEEE Transaction on Parallel and Distributed Systems 14(9), 841–850 (2003)CrossRefGoogle Scholar
  15. 15.
    Steinmuller, B., Safarik, J.: Extending Role-based Access Control Model with States. In: Proceedings of International Conference on Trends in Communications (EUROCON 2001), pp. 398–399 (2001)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Young-Ran Hong
    • 1
    • 2
  • Dongsoo Kim
    • 1
  1. 1.Department of Industrial and Information Systems EngineeringSoongsil UniversitySeoulKorea
  2. 2.SomansaSeoulKorea

Personalised recommendations