Browse > Article
http://dx.doi.org/10.7840/kics.2014.39C.1.1

A Scheme for Detecting and Preventing an Unauthorized Device Using Context Awareness and Mobile Device Management  

Mun, Jiman (숭실대학교 전자공학과 통신망보안 연구실)
Jung, Souhwan (숭실대학교 정보통신전자공학부 통신망보안 연구실)
Abstract
This paper proposed a method that prevents data leakage and modulation and detects an unauthorized device by using AP and mobile device. Most of existing method for detecting and preventing an unauthorized device are similar to type of Evil Twin. However, in previous studies can not resolve many security accident and have the problem to cope with effectively security accident on various network. In order to solve these problem, companies prepare security accident through the varies policy and guideline. but It is hard to prevent all security accident because it is consistently increasing everyday. This paper suggests technique of detecting and preventing an unauthorized device using Context Awareness and Mobile Device Management. Firstly, when mobile device go into internal network, server distinguish access permission and authorization of mobile device using acquiring the conetxt information of mobile device. By using this result, server applies the appropriate management technique to the mobile device for leakage and accident of internal network.
Keywords
Context Aware; Mobile Device Management; Mobile Security; Bring Your Own Device; Authentication;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 A. Scarfo, "New security perspectives around BYOD," in Proc. 2012 Seventh Int'l Conf. Broadband, Wireless Computing, Commun. and Applications(BWCCA), pp. 446-451, Nov. 2012.
2 K. Rhee, H. Kim, and H. Y. Na, "Security test methodology for an agent of a mobile device management system," Int'l J. Security and Its Applications, Vol. 6, No. 2, Apr. 2012.
3 J. Burke, B. Hartselle, B. Kneuven, and B. Morgan, Wireless security attacks and defense, Retrieved May 2006, from http://www.windo wsecurity.com/whitepapers/Wireless_Security/ Wireless-Security-Attacks-Defenses.html.
4 AirDefense, "Tired of rogues: Solutions for detecting and eliminating rogue wireless networks," AirDefense white paper, 2011.
5 AirTight Networks, "Conquering the minefield of Soft rogue APs in the enterprise," AirTight white paper, 2012.
6 S. Jana and S. K. Kasera, "On fast and accurate detection of unauthorized wireless access points using clock skews," IEEE Trans. Mobile Computing, Vol. 9, No. 3, pp. 449-462, Mar. 2010.   DOI   ScienceOn
7 P. Bhatia, C. Laurendeau, and M. Barbeau, "Solution to the wireless evil-twin transmitter attack," in Proc. IEEE CRiSIS 2010, pp. 1-7, Oct. 2010.
8 S. Shetty, M. Song, and L. Ma, "Rogue access point detection by analyzing network traffic characteristics," in Proc. IEEE MILCOM 2007, pp. 1-7, Oct. 2007.
9 W. Wei, S. Jaiswal, J. Kurose, and D. Towsley, "Identifying 802.11 traffic from passive measurements using iterative bayesian inference," in Proc. In: 25th IEEE int'l conf. on computer commun.(INFOCOM), pp. 1-12, Apr. 2006.
10 F. Guo and T. Chiueh, "Sequence numberbased MAC address spoof detection," in Proc. RAID 2005, pp. 309-329, Sept. 2005.
11 D. Monica, and C. Ribeiro, "WiFiHop -mitigating the evil twin attack through multi-hop detection," in Proc. ESORICS 2011, pp. 21-39, Sept. 2011.
12 Y. Song, C. Yang, and G. Gu, "Who is peeping at your passwords at starbucks? - To catch an evil twin access point," in Proc. IEEE/IFIP DSN 2010, pp. 323-332, Chicago, IL, USA, Jun. 2010.
13 S. K. Park and J. h. Lee, "Propulsion systems and practices for smart work(스마트워크 추진체계 및 사례)," J. KICS, vol. 29, no 12, pp. 3-9, Nov. 2012
14 H. Kim, Y. J. Cbo, and S.-R. Oh, "CAMUS - a middleware supporting context-aware services for network-based robots," IEEE Workshop on Advanced Robotics and Its Social Impacts, pp. 237-242, Jun. 2005.
15 J. Byun, I. Hong, B. Kang, and S. Park, "A smart energy distribution and management system for renewable energy distribution and context-aware services based on user patterns and load forecasting," IEEE Trans. Consumer Electronics, vol. 57, no. 2, May 2011.