Asian Journal of Research in Computer Science

  • About
    • About the Journal
    • Submissions & Author Guideline
    • Accepted Papers
    • Editorial Policy
    • Editorial Board Members
    • Reviewers
    • Propose a Special Issue
    • Printed Hard copy
    • Subscription
    • Membership
    • Publication Ethics and Malpractice Statement
    • Digital Archiving
    • Contact
  • Archives
  • Indexing
  • Publication Charge
  • Submission
  • Testimonials
  • Announcements
Advanced Search
  1. Home
  2. Archives
  3. 2022 - Volume 14 [Issue 2]
  4. Original Research Article

Submit Manuscript


Subscription



  • Home Page
  • Author Guidelines
  • Editorial Board Member
  • Editorial Policy
  • Propose a Special Issue
  • Membership

Comparative Analysis and Development of Mobile Device Authentication Framework for Corporate Networks

  • Mboto Peter
  • Gilbert Gilibrays Ocen
  • Godliver Owomugisha
  • Alunyu Andrew Egwar
  • Matovu Davis
  • Twaibu Semwogerere
  • Rwahwire Samson

Asian Journal of Research in Computer Science, Page 33-46
DOI: 10.9734/ajrcos/2022/v14i230335
Published: 19 July 2022

  • View Article
  • Download
  • Cite
  • References
  • Statistics
  • Share

Abstract


Several systematic reviews on mobile device technologies have been undertaken mostly identifying mobile security threats and challenges to corporate organisations' sensitive private information. This paper surveyed the existing level of secure authentication achieved by various mobile device-related frameworks against their listed goals. The solutions and security level of the existing authentication approaches among these categories were compared and improved on the KANYI BYOND framework by introducing a Radius server with the 802.11 authentications supported feature that provides access control to wireless routers, access points, hotspots in EAP/WPA-Enterprise/WPA2-Enterprise modes as means to achieve multiple authentications to mobile device users in corporate networks. Testing and validation of the resulting framework were done with the help of a riverbed modeler and a Denial of Service attack was simulated on all mobile devices' nodes in the designed network. The results indicated that the resulting framework provides multiple authentications and is thought to overcome self-reassuring by mobile device users on the network.


Keywords:
  • Mobile device authentication
  • framework
  • DOS attacks
  • CVSS
  • simulation
  • Full Article - PDF
  • Review History

How to Cite

Peter, M., Ocen, G. G., Owomugisha, G., Egwar, A. A., Davis, M., Semwogerere, T., & Samson, R. (2022). Comparative Analysis and Development of Mobile Device Authentication Framework for Corporate Networks. Asian Journal of Research in Computer Science, 14(2), 33-46. https://doi.org/10.9734/ajrcos/2022/v14i230335
  • ACM
  • ACS
  • APA
  • ABNT
  • Chicago
  • Harvard
  • IEEE
  • MLA
  • Turabian
  • Vancouver

References

Lutui PR. Digital forensic process model for mobile business devices: smart technologies; 2015. Available http://aut.researchgateway.ac.nz/bitstream/handle/10292/9242/LutuiPR.pdf.

Farrell G. Preventing phone theft and robbery: the need for government action and international coordination. Crime Sci. 2015;4(1).

DOI: 10.1186/s40163-014-0015-0.

Omori S. Information security report. 2017;2011:1-32.

Breitinger F, Nickel C. User survey on phone security and usage. Lecture Notes in Informatics (LNI). Proceedings of the – series of the Gesellschaft fur informatik (GI); 2010.

Taylor K, Silver L 2019. Smartphone ownership is growing rapidly around the world, but not always equally | Pew Research Center. In.

Available:https://www.Pewresearch.Org/Global/2019/02/05/Smartphone-Ownership-Is-Growing-Rapidly-Around-the-World-But-Not-Always-Equally/.

Silverio-Fernández M, Renukappa S, Suresh S. What is a smart device? - a conceptualisation within the paradigm of the internet of things. Vis Eng. 2018;6(1).

DOI: 10.1186/s40327-018-0063-8.

Androulidakis II Mobile Phone Security and Forensics: A Practical Approach. Mobile phone security and forensics: A practical approach. 2nd ed; 2016.

DOI: 10.1007/978-3-319-29742-2.

Aker JC, Collier P, Vicente PC. Is information power? Using mobile phones and free newspapers during an election in Mozambique. Rev Econ Stat. 2017;99(2):185-200.

DOI: 10.1162/REST_a_00611.

Jack W, Ray A, Suri T. Transaction networks: evidence from mobile money in Kenya. Am Econ Rev. 2013;103(3):356-61.

DOI: 10.1257/aer.103.3.356.

Yan Q, Yu FR, Gong Q, Li J. Software-defined networking (SDN) and distributed denial of service (DDOS) attacks in cloud computing environments: A survey, some research issues and challenges. IEEE Commun Surv Tutorials. 2016;18(1):602-22.

DOI: 10.1109/COMST.2015.2487361.

Lane ND, Miluzzo E, Lu H, Peebles D, Choudhury T, Campbell AT et al. A survey of mobile phone sensing. IEEE Commun Mag. 2010;48(9):140-50.

DOI: 10.1109/MCOM.2010.5560598.

Rhee K, Jeon W, Won D. Security requirements of a mobile device management system. Int J Sec Appl; 2012.

NITA U. National information security policy (NITA-U). J Inf Sec; 2014.

Gimenez Ocano S, Ramamurthy B, Wang Y, Ocano G. Digital Commons@University of Nebraska-Lincoln Remote Mobile Screen (RMS): an approach for secure BYOD environments Remote Mobile Screen (RMS): an approach for secure BYOD environments; 2015.

DOI: 10.1109/ICCNC.2015.7069314.

Wei J, Liu LC, Koong KS. An onion ring framework for developing and assessing mobile commerce security. Int J Mob Commun. 2006;4(2):128-42.

DOI: 10.1504/IJMC.2006.008605.

Obodoeze FC, Okoye FAN. Asogwa SC, Ozioko FE. A Holistic Mobile Security Framework for Nigeria. 2013;3:5-11.

Chakraborti S, Acharjya DP, Sanyal S. Application Security framework for Mobile App Development in Enterprise setup; 2015.

Available:http://arxiv.org/abs/1503.05992

Ndeng’ere DK. A BYOD framework for secure use of mobile devices in; 2017.

ITU. Understanding cybercrime: phenomena, challenges and legal response. In: Proceedings of the annual Hawaii international conference on system sciences; 2014.

Gregor S, Hevner AR. Positioning and presenting design science research for maximum impact. MIS Q Manag Inf Syst. 2013;37(2):337-55.

DOI: 10.25300/MISQ/2013/37.2.01.

Hevner AR, March ST, Park J, Ram S. Design science in information systems research. MIS Q Manag Inf Syst. 2004;28(1).

DOI: 10.2307/25148625.

Chambers EA. An Introduction to meta-analysis with articles from the Journal of Educational Research (1992-2002). J Educ Res. 2004;98(1):35-45.

DOI: 10.3200/JOER.98.1.35-45.

Davis M, Gilbert M, Simon K, Stephen M, Gilibrays Ocen G. State of cyber security: the Ugandan perspective. Int J Sci Eng Res; 2019.

Jafari N, Alsadoon A, Withana CP, Beg A, Elchouemi A. Designing a comprehensive security framework for smartphones and mobile devices. Am J Eng Appl Sci. 2016;9(3):724-34.

DOI: 10.3844/ajeassp.2016.724.734.

Jeffrey PJH, Leong CC, Huat CG, Leng LS. Challenges in mobile security; 2016.

Majdi EB. Evaluation of mobile device management tools and analysing integration models for mobility enterprise; 2013.

Available:http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-74017.

Marler W. Mobile phones and inequality: findings, trends and future directions. New Media Soc. 2018;20(9):3498-520.

DOI: 10.1177/1461444818765154.

Matovu D, Gilbert MB, Authority of Kenya, C, Karume Simon K, Gilibrays Ocen G. The Internet of Things: applications and security metrics with the Ugandan perspective. Int J Adv Res; 2019.
  • Abstract View: 68 times
    PDF Download: 24 times

Download Statistics

Downloads

Download data is not yet available.
  • Linkedin
  • Twitter
  • Facebook
  • WhatsApp
  • Telegram
Make a Submission / Login
Information
  • For Readers
  • For Authors
  • For Librarians
Current Issue
  • Atom logo
  • RSS2 logo
  • RSS1 logo


© Copyright 2010-Till Date, Asian Journal of Research in Computer Science. All rights reserved.