Comparative Analysis and Development of Mobile Device Authentication Framework for Corporate Networks
Asian Journal of Research in Computer Science,
Page 33-46
DOI:
10.9734/ajrcos/2022/v14i230335
Abstract
Several systematic reviews on mobile device technologies have been undertaken mostly identifying mobile security threats and challenges to corporate organisations' sensitive private information. This paper surveyed the existing level of secure authentication achieved by various mobile device-related frameworks against their listed goals. The solutions and security level of the existing authentication approaches among these categories were compared and improved on the KANYI BYOND framework by introducing a Radius server with the 802.11 authentications supported feature that provides access control to wireless routers, access points, hotspots in EAP/WPA-Enterprise/WPA2-Enterprise modes as means to achieve multiple authentications to mobile device users in corporate networks. Testing and validation of the resulting framework were done with the help of a riverbed modeler and a Denial of Service attack was simulated on all mobile devices' nodes in the designed network. The results indicated that the resulting framework provides multiple authentications and is thought to overcome self-reassuring by mobile device users on the network.
Keywords:
- Mobile device authentication
- framework
- DOS attacks
- CVSS
- simulation
How to Cite
References
Farrell G. Preventing phone theft and robbery: the need for government action and international coordination. Crime Sci. 2015;4(1).
DOI: 10.1186/s40163-014-0015-0.
Omori S. Information security report. 2017;2011:1-32.
Breitinger F, Nickel C. User survey on phone security and usage. Lecture Notes in Informatics (LNI). Proceedings of the – series of the Gesellschaft fur informatik (GI); 2010.
Taylor K, Silver L 2019. Smartphone ownership is growing rapidly around the world, but not always equally | Pew Research Center. In.
Available:https://www.Pewresearch.Org/Global/2019/02/05/Smartphone-Ownership-Is-Growing-Rapidly-Around-the-World-But-Not-Always-Equally/.
Silverio-Fernández M, Renukappa S, Suresh S. What is a smart device? - a conceptualisation within the paradigm of the internet of things. Vis Eng. 2018;6(1).
DOI: 10.1186/s40327-018-0063-8.
Androulidakis II Mobile Phone Security and Forensics: A Practical Approach. Mobile phone security and forensics: A practical approach. 2nd ed; 2016.
DOI: 10.1007/978-3-319-29742-2.
Aker JC, Collier P, Vicente PC. Is information power? Using mobile phones and free newspapers during an election in Mozambique. Rev Econ Stat. 2017;99(2):185-200.
DOI: 10.1162/REST_a_00611.
Jack W, Ray A, Suri T. Transaction networks: evidence from mobile money in Kenya. Am Econ Rev. 2013;103(3):356-61.
DOI: 10.1257/aer.103.3.356.
Yan Q, Yu FR, Gong Q, Li J. Software-defined networking (SDN) and distributed denial of service (DDOS) attacks in cloud computing environments: A survey, some research issues and challenges. IEEE Commun Surv Tutorials. 2016;18(1):602-22.
DOI: 10.1109/COMST.2015.2487361.
Lane ND, Miluzzo E, Lu H, Peebles D, Choudhury T, Campbell AT et al. A survey of mobile phone sensing. IEEE Commun Mag. 2010;48(9):140-50.
DOI: 10.1109/MCOM.2010.5560598.
Rhee K, Jeon W, Won D. Security requirements of a mobile device management system. Int J Sec Appl; 2012.
NITA U. National information security policy (NITA-U). J Inf Sec; 2014.
Gimenez Ocano S, Ramamurthy B, Wang Y, Ocano G. Digital Commons@University of Nebraska-Lincoln Remote Mobile Screen (RMS): an approach for secure BYOD environments Remote Mobile Screen (RMS): an approach for secure BYOD environments; 2015.
DOI: 10.1109/ICCNC.2015.7069314.
Wei J, Liu LC, Koong KS. An onion ring framework for developing and assessing mobile commerce security. Int J Mob Commun. 2006;4(2):128-42.
DOI: 10.1504/IJMC.2006.008605.
Obodoeze FC, Okoye FAN. Asogwa SC, Ozioko FE. A Holistic Mobile Security Framework for Nigeria. 2013;3:5-11.
Chakraborti S, Acharjya DP, Sanyal S. Application Security framework for Mobile App Development in Enterprise setup; 2015.
Available:http://arxiv.org/abs/1503.05992
Ndeng’ere DK. A BYOD framework for secure use of mobile devices in; 2017.
ITU. Understanding cybercrime: phenomena, challenges and legal response. In: Proceedings of the annual Hawaii international conference on system sciences; 2014.
Gregor S, Hevner AR. Positioning and presenting design science research for maximum impact. MIS Q Manag Inf Syst. 2013;37(2):337-55.
DOI: 10.25300/MISQ/2013/37.2.01.
Hevner AR, March ST, Park J, Ram S. Design science in information systems research. MIS Q Manag Inf Syst. 2004;28(1).
DOI: 10.2307/25148625.
Chambers EA. An Introduction to meta-analysis with articles from the Journal of Educational Research (1992-2002). J Educ Res. 2004;98(1):35-45.
DOI: 10.3200/JOER.98.1.35-45.
Davis M, Gilbert M, Simon K, Stephen M, Gilibrays Ocen G. State of cyber security: the Ugandan perspective. Int J Sci Eng Res; 2019.
Jafari N, Alsadoon A, Withana CP, Beg A, Elchouemi A. Designing a comprehensive security framework for smartphones and mobile devices. Am J Eng Appl Sci. 2016;9(3):724-34.
DOI: 10.3844/ajeassp.2016.724.734.
Jeffrey PJH, Leong CC, Huat CG, Leng LS. Challenges in mobile security; 2016.
Majdi EB. Evaluation of mobile device management tools and analysing integration models for mobility enterprise; 2013.
Available:http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-74017.
Marler W. Mobile phones and inequality: findings, trends and future directions. New Media Soc. 2018;20(9):3498-520.
DOI: 10.1177/1461444818765154.
Matovu D, Gilbert MB, Authority of Kenya, C, Karume Simon K, Gilibrays Ocen G. The Internet of Things: applications and security metrics with the Ugandan perspective. Int J Adv Res; 2019.
-
Abstract View: 68 times
PDF Download: 24 times