Skip to main content

Context Based Smart Access Control on BYOD Environments

  • Conference paper
  • First Online:
Information Security Applications (WISA 2014)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8909))

Included in the following conference series:

Abstract

Recent mobile communication developments and the penetration of smartphones are spurring the increase of the number of smart devices owned by individuals. Mobile devices, because of the multitude of services they provide other than simple communication have become deeply rooted into each individual’s life. This development has spread into the work environment spawning a new trend commonly known as BYOD (bring your own device). However, with this trend serious security issues are emerging as a diversity of personal devices with unreliable security are increasingly accessing the typically closed intranets of conventional work environments. Corporations want to improve their productivity by taking advantage of the benefits of BYOD but it is difficult to handle an open BYOD work environment with current security technologies. This study analyzes the characteristics of BYOD environments, current threats to security and required security technologies, and presents a security framework suitable for BYOD environments. The framework presented here can manage a variety of devices despite their disparate operating systems and also control network factors according to the nature of the habits of BYOD users. As it is not based on IP or port-based analysis, which had been primarily used in the past, but on high quality, context information.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. IDG Deep Dive: Guide to BYOD Strategy. IDG Korea (2012)

    Google Scholar 

  2. Johnson, K.: Mobility/BYOD Security Survey. SANS Institute (2012)

    Google Scholar 

  3. Miller, K.W., Voas, J., Hurlburt, G.F.: BYOD: security and privacy considerations. IT Prof. 14(5), 53–55 (2012)

    Article  Google Scholar 

  4. Symantec, Smartphone Honey Stick Project. http://www.symantec.com

  5. Inverse, PacketFence. http://www.packetfence.org

  6. Henderson, T.: How mobile device management works. IT WORLD (2011)

    Google Scholar 

  7. Frias-Martinez, V., Stolfo, S.J., Keromytis, A.D.: Behavior-based network access control: a proof-of-concept. In: Wu, T-C., Lei, C-L., Rijmen, V., Lee, D-T. (eds.) ISC 2008. LNCS, vol. 5222, pp. 175–190. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  8. D’Alconzo, A.: A distribution-based approach to anomaly detection and application to 3G mobile traffic. In: GLOBECOM, pp. 1–8 (2009)

    Google Scholar 

  9. Fielding, R., Gettys, J., Mogul, J., Frystyk, H., Berners-Lee, T.: Hypertext Transfer Protocol-HTTP/1.1, RFC 2068 (1997)

    Google Scholar 

  10. W3C: Geolocation API. http://en.wikipedia.org/wiki/W3C_Geolocation_API

  11. Nmap: Remote OS Detection. http://nmap.org

  12. Kohno, T., Broido, A., Claffy, K.: Remote physical device fingerprinting. IEEE Trans. Dependable Secure Comput. 2(2), 93–108 (2005)

    Article  Google Scholar 

  13. Jose, M.B., Smith, A.F.M.: Bayesian Theory. Wiley, New York (1994)

    MATH  Google Scholar 

  14. Graham, P.: A Plan for Spam. http://www.paulgraham.com/spam.html

Download references

Acknowledgments

This work was supported by the ICT R&D program of MSIP/IITP. [10045109, The Development of Context-Awareness based Dynamic Access Control Technology for BYOD, Smartwork Environment].

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dongwan Kang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Kang, D., Oh, J., Im, C. (2015). Context Based Smart Access Control on BYOD Environments. In: Rhee, KH., Yi, J. (eds) Information Security Applications. WISA 2014. Lecture Notes in Computer Science(), vol 8909. Springer, Cham. https://doi.org/10.1007/978-3-319-15087-1_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-15087-1_13

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-15086-4

  • Online ISBN: 978-3-319-15087-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics