JOURNAL BROWSE
Search
Advanced SearchSearch Tips
A Scheme for Detecting and Preventing an Unauthorized Device Using Context Awareness and Mobile Device Management
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
A Scheme for Detecting and Preventing an Unauthorized Device Using Context Awareness and Mobile Device Management
Mun, Jiman; Jung, Souhwan;
  PDF(new window)
 Abstract
This paper proposed a method that prevents data leakage and modulation and detects an unauthorized device by using AP and mobile device. Most of existing method for detecting and preventing an unauthorized device are similar to type of Evil Twin. However, in previous studies can not resolve many security accident and have the problem to cope with effectively security accident on various network. In order to solve these problem, companies prepare security accident through the varies policy and guideline. but It is hard to prevent all security accident because it is consistently increasing everyday. This paper suggests technique of detecting and preventing an unauthorized device using Context Awareness and Mobile Device Management. Firstly, when mobile device go into internal network, server distinguish access permission and authorization of mobile device using acquiring the conetxt information of mobile device. By using this result, server applies the appropriate management technique to the mobile device for leakage and accident of internal network.
 Keywords
Context Aware;Mobile Device Management;Mobile Security;Bring Your Own Device;Authentication;
 Language
Korean
 Cited by
1.
다중 요소를 가지는 SVM을 이용한 이블 트윈 탐지 방법,강성배;양대헌;이경희;

한국통신학회논문지, 2015. vol.40. 2, pp.334-348 crossref(new window)
 References
1.
A. Scarfo, "New security perspectives around BYOD," in Proc. 2012 Seventh Int'l Conf. Broadband, Wireless Computing, Commun. and Applications(BWCCA), pp. 446-451, Nov. 2012.

2.
K. Rhee, H. Kim, and H. Y. Na, "Security test methodology for an agent of a mobile device management system," Int'l J. Security and Its Applications, Vol. 6, No. 2, Apr. 2012.

3.
J. Burke, B. Hartselle, B. Kneuven, and B. Morgan, Wireless security attacks and defense, Retrieved May 2006, from http://www.windo wsecurity.com/whitepapers/Wireless_Security/ Wireless-Security-Attacks-Defenses.html.

4.
AirDefense, "Tired of rogues: Solutions for detecting and eliminating rogue wireless networks," AirDefense white paper, 2011.

5.
AirTight Networks, "Conquering the minefield of Soft rogue APs in the enterprise," AirTight white paper, 2012.

6.
S. Jana and S. K. Kasera, "On fast and accurate detection of unauthorized wireless access points using clock skews," IEEE Trans. Mobile Computing, Vol. 9, No. 3, pp. 449-462, Mar. 2010. crossref(new window)

7.
P. Bhatia, C. Laurendeau, and M. Barbeau, "Solution to the wireless evil-twin transmitter attack," in Proc. IEEE CRiSIS 2010, pp. 1-7, Oct. 2010.

8.
S. Shetty, M. Song, and L. Ma, "Rogue access point detection by analyzing network traffic characteristics," in Proc. IEEE MILCOM 2007, pp. 1-7, Oct. 2007.

9.
W. Wei, S. Jaiswal, J. Kurose, and D. Towsley, "Identifying 802.11 traffic from passive measurements using iterative bayesian inference," in Proc. In: 25th IEEE int'l conf. on computer commun.(INFOCOM), pp. 1-12, Apr. 2006.

10.
F. Guo and T. Chiueh, "Sequence numberbased MAC address spoof detection," in Proc. RAID 2005, pp. 309-329, Sept. 2005.

11.
D. Monica, and C. Ribeiro, "WiFiHop -mitigating the evil twin attack through multi-hop detection," in Proc. ESORICS 2011, pp. 21-39, Sept. 2011.

12.
Y. Song, C. Yang, and G. Gu, "Who is peeping at your passwords at starbucks? - To catch an evil twin access point," in Proc. IEEE/IFIP DSN 2010, pp. 323-332, Chicago, IL, USA, Jun. 2010.

13.
H. Kim, Y. J. Cbo, and S.-R. Oh, "CAMUS - a middleware supporting context-aware services for network-based robots," IEEE Workshop on Advanced Robotics and Its Social Impacts, pp. 237-242, Jun. 2005.

14.
J. Byun, I. Hong, B. Kang, and S. Park, "A smart energy distribution and management system for renewable energy distribution and context-aware services based on user patterns and load forecasting," IEEE Trans. Consumer Electronics, vol. 57, no. 2, May 2011.

15.
S. K. Park and J. h. Lee, "Propulsion systems and practices for smart work(스마트워크 추진체계 및 사례)," J. KICS, vol. 29, no 12, pp. 3-9, Nov. 2012