Вы находитесь на странице: 1из 6

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/261489760

Implement network security control solutions in BYOD environment

Conference Paper · November 2013


DOI: 10.1109/ICCSCE.2013.6719923

CITATIONS READS
13 938

2 authors, including:

Khoula AL-Harthy
Middle East College
8 PUBLICATIONS   15 CITATIONS   

SEE PROFILE

Some of the authors of this publication are also working on these related projects:

smartphone security View project

All content following this page was uploaded by Khoula AL-Harthy on 17 September 2015.

The user has requested enhancement of the downloaded file.


Implement Network Security control solutions in
BYOD Environment

Khoula AlHarthy Wael Shawkat


Department of Computing Department of IT
Middle East College Middle East College
Muscat/Oman Muscat/Oman
khoula@mec.edu.om Wshawkat@mec.edu.om

Abstract—Bring Your Own Device (BYOD) security is the This paper is to design and implements a BYOD solution
way to protect organization’s network against Variety of which builds security strategy for educational institution. The
threats which come through mobile devices and access strategy is focusing in providing almost all details about
channels. This research paper explains the implementation of latest BYOD threats which effect the network and security
BYOD security solution in higher education institution in requirements to prevent these threats.
Oman This security solution will help to protect the network
data from unauthorized access, as well as, controlling
unmanaged devices which are smartphones and mobile II. RELATED WORK:
devices. This research will follow these steps starting with
literature review, data collection, analysis, design the
network structure with suggested solution and Donahue, Tom in his book [1] has agreed that BYOD in the
implementation for BYOD security solutions. As well as, work environment increased productivity but he added that
monitoring the network performance with the implanted BYOD connection also enhance customer services as
solutions to keep track if traffic flow with high availability and employees can respond to the customer inquiries and deal
security. This research paper will help to facilitate the work to
with problems from any place at any time. Additionally, the
the network users through allowing BYOD as well as increase
the network availability, ability and security through 802.1x,
network administrator can control the user devices and
CA and RADius. monitor the business data without affecting the user
privacy in his personal information [2]. [1] Loss or theft of
mobile devices is the biggest risk that business could face
Index Terms— BYOD, Network infrastructure, BYOD by implementing BYOD, because it leads to loss of data to
unknown user.
implementation, Security, BYOD solutions
―With increased number for mobile device holders and
access to the Wi-Fi, the network administrator should
I. INTRODUCTION
increase availability and uptime. Furthermore, the users start
The dramatic increase of using the mobile device in the to use their mobile device for video conferences; it needs to
work environment makes the IT members in each add the bandwidth and uptime with reducing the possibilities
organization start planning on how to deal with this of downtime [3]. The BYOD risk can be covered into five
overload access to the network. Consumerization is not a main risks Mobile applications gab, user’s policies, lack of
new topic in IT world. However, BYOD or Consumerization device- protection level, attacks and bandwidth capacity [4].
increases organizations productivity because the staff keeps The Bandwidth is the most risk that IT professionals
working from their mobile devices whenever they can and thinking about, because it leads to reduce the network
anytime out of working hours. Also, BYOD increases the performance and increase the downtime. [5] With increased
speed of work as well as customers satisfaction because of number of mobile users over the network the administrator,
good communication and fast respond. But then again, the the administrator need to make sure that everything should be
real concern about dealing with BYOD devices and under his control and be able to manage mobile devices as
provide the flexibility to access the network with the normal PC’s and laptops in the company. Although, the
security at the same time. That’s because different threats can security is acting as first priority risk that the IT professionals
appear through allowing BYOD such as losing the should deal with it, especially with increasing number of
smartphones will cause to loss the data in it and it also allow harmful mobile applications which easily provided to the
unauthorized users to read. Also, damage the devices, worms user. Moreover, accessing through wireless and using LAN
and harm application which cannot control by the resources a s I P address and file server and others is
administrator. causing huge concern about how the administrator will be
able to apply the policies and access restriction.
III. METHOD: A. Authentication:
This section will describe the procedure that has been For wired and wireless networks there are different
considered to complete the steps that have been done to authentication processes for the users when they are
complete the BYOD framework as in ―Fig.1‖: The first step accessing the network if the user use local computer
is data collection where the primary and secondary data he/she will need to pass user authentication only because the
collection methods have been used to get all the details about device has already joined the domain and it is under control.
the users and the network. In the primary data collection the Also, if the user plug network wire to his own PC and
interview and the questionnaire are the two methods which connect to the network so he will need to pass two
were followed to gather the data and later in this paper the authentication stages which is computer authentication
results will be given and the finding that we got. After data failed so it will not open any services to the user and deny the
collection the second step will start which is analyzing the access request Moreover, the authentication process of the
current network and environment. Through analyzing we will staff is different from students. When any staff member is
try to find the problems and possible risks network can face accessing through the wireless they will pass three stages of
because of BYOD [6]. The third step is design the network authentications First stage is called hashing which is
with possible solutions that can help to reduce the risk and authentication (encrypting the data), second stage is
locating the network devices. The fourth step, is computer authentication (Join to domain) and last stage user
implementation and testing which we will configure the authentication. All of this process is called WEP
network devices and system to control the mobile device authentication. [6][9]. This research paper will apply network
access over the network and test the efficiency of the authentication to mobile users though RADius and CA which
solutions. will be explained in discussion part.
In the end, the recommendation will be given for future
B. Firewall:
improvement because the BYOD is new systems and the
risk will keep appear in BYOD environment thus, the process Forefront is hardware firewall which is used
of improvement will keep cycling Analysis:
to increase the level of in the institution. Is located at the front of the network
reliability in the network. and monitors all incoming and outgoing data between the
Through the data collection process analyzed the different network and the internet. The firewall is directing the access
types of data that has been collected during primary data either to DMZ (public data area) or private LAN base on
collection [6]. he data will be presented in two categories the level of authentications required and user pass.
which are qualitative data and quantitative data. The network The main advantage of this firewall is the firewall supplier
has two classifications of user's in the network which includes keeps updating the server by giving the divisions or
students and staff. The network access is divided into four classifications of the websites. For example, games websites,
parts. First part is the area which is only for students. Second shopping websites or educational websites and others. Thus,
access part services area for the staff. Third access part is it blocks automatically a harmful websites and adds it to its
server network area which provides sharing service for both black list [6]. The main use of the firewall in this research is
students and staffs. Lastly, the fourth one is the DMZ checking the traffic which coming from wireless controller
(demilitarize zone) area which allocates the services to the and define if it authenticated, if yes so the firewall will apply
users who access from the internet. The Institution network all the roles and access permission to these traffic.
has two different networks which are wired and wireless
Data IV. DATA ANALYSIS:
collection
and
Literature The Quantitative results show surprising results in some
points. During the interview the network administrator was
thinking that less number of users are currently accessing to
Monitoring Analysis of wireless network and using network resources. But the
and current results of the questionnaire show 73% of the participants are
recommendation
network using their own mobile device for internet browsing
through wireless network. Not that all, 46% of them are
using more than one smartphones and mobile devices. This
means that the organization needs to apply BYOD strategy as
soon as possible to be able to control user access through the
network lines. Moreover, currently the network administrator
Implementation is blocking accesses to the network resources on shared
and testing Design drive, remote accessing, or active directory and allowing only
HTTP access which is web browsing.
Figure 1: BYOD Project life cycle [6]
shows that more than 48% of the participants very often
access the network and 25% extremely often access the
network [6]

show the result of often users use network service

Figure 2: Analysis of user level of usage over the network

Do you use more than one mobile device to access to the network?

Figure 5: Percentage show access the network

With all of these g i v e n d a t a main target will be


increase the network capability to be up all the time and
increase the security and manageability of it resources. But
there will be a barrier which is the restriction of social
customs and deal with social sensitivity regards privacy.

Figure 3: Analysis of user level of usage over the network V. DISCUSSION


Current network includes 6 running servers which are Active
Questionnaire is asking the participants of what exactly
Directory (Domain Controller), Exchange server (Mail
they access in the network. And the result of the users as
server), Moodle server, two storing servers one for student
shown in ―Fig.4‖ that almost the users are accessing the
and other for staff and last one is frontend server which is
wireless network for internet browsing and e-mailing was
(Firewall server). Moreover, it provides two main
above 66% access. Some of the participants selected access to
connections which are wired and wireless which students and
shared drive or database but actually till now they do not
staff. Each technical lab is separated in different VLAN so
have the permission to access remotely or over any device to
any students’ practices will not affect the real network
these parts of the network. [6]
performance or configurations such as projects labs, database
which of the following services is mostly accessed by you through your labs and Network Labs. Moreover, the wireless connection
mobile device? also divided into two VLANs which is one for staff and
other for the students and that because for each
category different privileges and security level should go
through it. [6]

Figure 4: the most services that is used in the network

In concept of increase security over network access and


network resources also it should make sure that these services
are available to the users. During the questionnaire ―Fig.5‖ it Figure 6: Current network.
the idea of separate access between student and staff into As well as, the certificate authority will help to verify the
different VLANs are increase the level of security and mobile user access and validate their transmission [8].
reduce the risk of ability of the students to access to staff The firewall and access point controller are playing big rule.
data. For that, the suggested solution is create separate VLAN Where the access point controller authenticated the mobile
which specify rang of IP address to it. Thus, any mobile user and make sure that he access through the right SSID.
device access will go through this VLAN which will be After that, the firewall will define the traffic apply the needful
secured by set of policies and permissions. roles then direct it to mobile VLAN which restrict the
permissions on resource access and access limitations. The
new updates of the firewall help to define the mobile serial
numbers that access though the network and generate a report
of all activities of the devices.

VI. CONCLUSION:
The research presents a set of principles that any organization
should follow before implementing the BYOD framework.
As a consequence of these principles one is provided with
availability, usability, mobility and security. A summary of
all findings that has been listed through the research steps
Figure 7: New mobile VLAN in the network indicates that the BYOD framework should be applied
in phaseswhich is not the typical case as in other systems in
Data flow in the Mobile VLAN: which the IT team will configure and then train the users how
to use it. Upgrading the network infrastructure and adding
802.1x a new Wi-Fi encryption standard and it are the most mobile VLAN with using 802.1x as encryption algorithms
secure as well. 802.1x is used to increase the network and support RADius and CA for authentication was only the
protection against many network attacks such as Dos. In this first step of implementing BYOD in the organization and few
proposed network as in ―Fig.7‖ the mobile user will access more steps are required to achieve secure BYOD. Such as,
through the wireless access point and it will be secured by upgrade the storage capacity to handle data three times more
using 802.1x standard and using AES over CCMP which is the capacity that it currently can. Monitor the wireless
used to reach the highest speed in data transmission and performance and wireless bandwidth. All mobile devices such
encryption then it will crows the switch and the need to be as smartphones and tablets are now able to access through
authenticated. To allow smartphones users to access through wireless connection. Finally, it will recommend choosing
the wireless network of the enterprise the administrator BYOD management system which is compatible with the
decide to add two main roles in Windows server 2008 majority of mobile platforms.
(Active Directory) which are Certificate Authority RADius
[7] Remote authentication dial-in user services. Both of the
roles will work to authenticate the mobile users. When the ACKNOWLEDGMENT
mobile user access through the access point it will specify I would like to thank the MIDDLE EAST COLLEGE which is
as RADius client so at that point the RADius will centralize the sponsor of my research. management, IT teams and
the authentication and the authorization to the user and help colleagues for all their support. Thanks to Dr. Ahmed Norri
To increase the security of all access details over the network and Dr. Mohammed Alani for their comment and support.
[7].

REFERENCES
[1] mark, S., Lewis , P., & Thornhill , A. (2012). Research Methods
For Business . UK: Pearson Books.
[2] Symantec/BYOD. (2012, Nov 19). Retrieved Mar 13, 2013, from
Symentec: http://www.symantec.com/products-
solutions/solutions/detail.jsp?parent=mobile&child=byod_
mobile
[3] Philip, C. (2013, April 30). etworking-byod-enterprise. Retrieved
May 22, 2013, from Nemertes:
https://www.nemertes.com/reports/networking-byod-enterprise
[4] RADIUS. (2012, March 29). Retrieved April 17, 2013, from
teachnet.microsoft: RADIUS,, ,

Figure 8: Traffic flow in Mobile VLA


[5] BYOD Policy. (2013). Retrieved May 11, 2013, from
bitpipe.com: [8] Keith W. Miller, George F., H., & Jeffrey, V. (n.d.). BYOD:
http://docs.media.bitpipe.com/io_10x/io_108916/item_660 Security and Privacy Considerations,. MIT conference,
292/Solution%20Brief- IEEE (p. 3). Bostan: IEEE.
Top%20Five%20Considerations%20for%20 [9] Philip, C. (2013, April 30). etworking-byod-enterprise. Retrieved
a%20BYOD%20Policy.pdf – 2012 May 22, 2013, from Nemertes
[10] Sean Chung, Sam Chung, Teresa Escrig, Yan Bai, Barbara
Endicott-Popovsky, "2TAC: Distributed Access Control Architecture
[6] AlHarthy. Khoula, Master thesis, Proposed Network Security for "Bring Your Own Device" Security," biomedcom, pp.123-126,
framework: Case study in BYOD , Coventry University, 2013 2012 ASE/IEEE International Conference on BioMedical Computing
(BioMedCom), 2012
[7] active directory certificate services step- by-step guid. (2013., Jan
7). Retrieved Feb 13, 2013, from technet.microsoft.com:
http://technet.microsoft.com/en-
us/library/cc772393(v=ws.10).aspx

View publication stats

Вам также может понравиться