Skip to main content

A Study on Context Information Collection for Personal Mobile Device Identification in BYOD and Smart Work Environment

  • Conference paper
  • First Online:
Internet of Things. IoT Infrastructures (IoT360 2014)

Abstract

With the advent of BYOD (bring your own device) environment where personal mobile devices are used in work, companies began introducing NAC and MDM systems to prevent the leaks of, to access control and to efficiently manage confidential information. However, NAC and MDM access control policy is uniformly applied to users, and thus BYOD is not being actively introduced as of current where security threats exist as a result of frequent device loss and theft as well as low security level. Therefore, flexible policy setting and control method through personalized information collection are necessary. This study discusses the definition of context information and a method to collect the information to detect users’ abnormal behaviors considering the diversity of devices used and connection environments for BYOD.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Miller, K.W.: BYOD: security and privacy considerations. IT Prof. 14(5), 53–55 (2012)

    Article  Google Scholar 

  2. Electronic Frontier Foundation: Panopticlick(browser fingerprint). https://panopticlick.eff.org/index.php?action=log&js=yes

  3. Fyodor: Remote OS detection via TCP/IP stack fingerprinting, October 1998. http://www.insecure.org/nmap/nmap-fingerprinting-article.html

  4. Smart, M.: Defeating TCP/IP stack fingerprinting. In: Proceedings of the 9th USENIX Security Symposium, August 2000

    Google Scholar 

  5. Virvilis N., Gritzalis D., Trusted computing vs. advanced persistent threats: can a defender win this game? In: Proceedings. of 10th IEEE International Conference on Autonomic and Trusted Computing, pp. 396–403, IEEE. Press, Italy (2013)

    Google Scholar 

  6. Singh, M., Patterh, M.S.: Formal specification of common criteria based access control policy model. Int. J. Netw. Secur. 10(3), 232–241 (2010)

    Google Scholar 

  7. Singh, M., Patterh, M.S., Kim, T.H.: A formal policy oriented access control model for secure enterprise network environment. Int. J. Secur. Appl. 3(2), 1–14 (2009)

    Google Scholar 

  8. Rhee, K., Jeon, W., Won, D.: Security requirements of a mobile device management system. Int. J. Secur. Appl. 6(2), 353–358 (2012)

    Google Scholar 

Download references

Acknowledgments

This work was supported by the IT R&D program of MSIP/KEIT (Ministry of Science, ICT and Future Planning/Korea Evaluation Institute of Industrial Technology). [10045109, The Development of Context-Awareness based Dynamic Access Control Technology for BYOD, Smart work Environment].

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Taeeun Kim .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Kim, T., Noh, M., Chung, K., Im, C. (2015). A Study on Context Information Collection for Personal Mobile Device Identification in BYOD and Smart Work Environment. In: Giaffreda, R., Cagáňová, D., Li, Y., Riggio, R., Voisard, A. (eds) Internet of Things. IoT Infrastructures. IoT360 2014. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 151. Springer, Cham. https://doi.org/10.1007/978-3-319-19743-2_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-19743-2_16

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-19742-5

  • Online ISBN: 978-3-319-19743-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics