A Security Compliance Based Mobile User Authentication Scheme

Article Preview

Abstract:

The BYOD (Bring Your Own Device) scenario puts traditional two-factor authentication into great security challenge. To strengthen the authentication in BYOD scenario, we propose a security compliance based mobile user authentication scheme, which includes a novel calculation method for device identifier, and a fine-grained compliance strategy and its management. The scheme provides a secure authentication mechanism for BYOD scenario and satisfies the requirements of device authentication in mobile user authentication.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 989-994)

Pages:

4514-4518

Citation:

Online since:

July 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] B. Morrow, BYOD security challenges: control and protect your most sensitive data, Network Security, vol. 2012, pp.5-8, (2012).

DOI: 10.1016/s1353-4858(12)70111-3

Google Scholar

[2] S. Holtmanns, V. Niemi, P. Ginzboorg, P. Laitinen, and N. Asokan, Cellular Authentication for Mobile and Internet Services: Wiley. com, (2008).

DOI: 10.1002/9780470771013

Google Scholar

[3] A. Kemshall, Why mobile two-factor authentication makes sense, Network Security, vol. 2011, pp.9-12, (2011).

DOI: 10.1016/s1353-4858(11)70038-1

Google Scholar

[4] A. Scarfo, New Security Perspectives around BYOD,, 2012, pp.446-451.

Google Scholar

[5] G. Yang and F. Zhou, Trusted Computing-Based Double Factor Authentication for Mobile Terminals,, 2010, pp.683-685.

DOI: 10.1109/iptc.2010.104

Google Scholar

[6] J. Hu, C. Sueng, W. Liao, and C. C. Ho, Android-based mobile payment service protected by 3-factor authentication and virtual private ad hoc networking,, Hong Kong, China, 2012, pp.111-116.

DOI: 10.1109/comcomap.2012.6154013

Google Scholar

[7] B.A.P. Botelho, D.G.A.E. Pelluzi and E.T. Nakamura, A versatile access control implementation: secure box,, 2013, pp.249-252.

DOI: 10.1145/2462410.2463208

Google Scholar

[8] T. Kuseler, I. A. Lami and H. Al-Assam, Location-assured, multifactor authentication on smartphones via LTE communication,, 2013, p. 87550B-87550B.

DOI: 10.1117/12.2018027

Google Scholar

[9] S. Furnell, N. Clarke and S. Karatzouni, Beyond the pin: Enhancing user authentication for mobile devices, Computer fraud \& security, vol. 2008, pp.12-17, (2008).

DOI: 10.1016/s1361-3723(08)70127-1

Google Scholar

[10] B. Arkin, The case for mobile two-factor authentication, IEEE Security \& Privacy, (2011).

Google Scholar