Bring your own device security issues and challenges

Author(s):  
Yong Wang ◽  
Jinpeng Wei ◽  
Karthik Vangury
2020 ◽  
Vol 10 (20) ◽  
pp. 7203 ◽  
Author(s):  
Jaehyuk Choi

As Bring Your Own Device (BYOD) policy has become widely accepted in the enterprise, anyone with a mobile device that supports Wi-Fi tethering can provide an active wireless Internet connection to other devices without restriction from network administrators. Despite the potential benefits of Wi-Fi tethering, it raises new security issues. The open source nature of mobile operating systems (e.g., Google Android or OpenWrt) can be easily manipulated by selfish users to provide an unfair advantage throughput performance to their tethered devices. The unauthorized tethering can interfere with nearby well-planned access points (APs) within Wi-Fi networks, which results in serious performance problems. In this paper, we first conduct an extensive evaluation study and demonstrate that the abuse of Wi-Fi tethering that adjusts the clear channel access parameters has strong adverse effects in Wi-Fi networks, while providing the manipulated device a high throughput gain. Subsequently, an online detection scheme diagnoses the network condition and detects selfish tethering devices by passively exploiting the packet loss information of on-going transmissions. Our evaluation results show that the proposed method accurately distinguishes the manipulated tethering behavior from other types of misbehavior, including the hidden node problem.


SAGE Open ◽  
2015 ◽  
Vol 5 (2) ◽  
pp. 215824401558037 ◽  
Author(s):  
Morufu Olalere ◽  
Mohd Taufik Abdullah ◽  
Ramlan Mahmod ◽  
Azizol Abdullah

Author(s):  
Imants Gorbāns ◽  
Ivans Kulesovs ◽  
Uldis Straujums ◽  
Jānis Buls

<p class="R-AbstractKeywords"><span lang="EN-US">Android is the most popular mobile operating system nowadays both for smartphones and tablets. This fact creates many not fully recognized risks. Often even advanced users naive think that using antivirus software, firewall, encryption, updates, as well as avoiding potentially risky sites and applications are enough for security. This list is not full, but nevertheless each its item in most cases only conceals an illusion of reaching the security. Authors have summarized and pointed out several actual Android security issues and have proposed a number of possible solutions.</span></p><p class="R-AbstractKeywords"><span lang="EN-US">The practical experience as well as direct testing show that part of Android applications may contain a malware. The harmful characteristics of an application often become visible only after some runs, or after an update, or after a harmful web content is downloaded and shown by the application. It is observed that applications often try to get an unauthorized or inattentively authorized access to user data and send it outside the device. </span></p><p class="R-AbstractKeywords"><span lang="EN-US">The situation with Android applications gets more and more out of the control. The authors propose a solution to overcome the security issues, while respecting the latest Google solutions. Target group of the proposal are users that use smartphone or tablet both for private and corporate needs, i.e. Bring Your Own Device (BYOD) case.</span></p><p class="R-AbstractKeywords"><span lang="EN-US">The authors point out and compare four possible Android technical administration solutions based on the unified model for BYOD case. The authors also propose the changes to Android architecture to enhance its security. It is proposed to look at the mobile operating system as a web server. Such principle allows implementing in Android a number of security principles taken from the web servers solutions.</span></p>


Sign in / Sign up

Export Citation Format

Share Document