Find evidence, practical ideas and fresh insight for greater impact

  • Decent Work and Economic Growth
  • Industry, Innovation and Infrastructure
  • For policymakers
  • United Kingdom
  • Brief created: 2024
  • Sign up

Security and Trust Issues in BYOD Networks

Brief about:

Journal Article (2023)

Paywalled link
Written by:
Senior Lecturer in Computer Network | University of Bedfordshire
Other researchers:
Ali Mansour
PrintShare
Cite page
Safdar, Ghazanfar Ali. 'Security and Trust Issues in BYOD Networks'. Acume. https://www.acume.org/r/security-and-trust-issues-in-byod-networks/

 Investigates the security and trust challenges organizations face in implementing Bring Your Own Device (BYOD) networks and explores existing and emerging solutions to address these issues.

BYOD networks, which allow employees to connect personal devices such as smartphones and tablets to corporate networks, are growing in popularity across various organizational environments due to potential cost savings and productivity gains. However, BYOD introduces significant security vulnerabilities and compliance challenges, as personal devices are often less secure and have varying levels of user-applied security measures. The risks associated with BYOD include exposure to malware, man-in-the-middle attacks, data leaks, and difficulties in enforcing security policies on devices not owned by the organization. To balance the benefits of BYOD with these security risks, organizations need reliable, secure frameworks that can protect corporate data and resources without alienating employees.

 

Key findings

  1. Zero-trust frameworks help secure BYOD networks by restricting access to only authenticated devices and users, addressing the lack of perimeter control in traditional security models.
    Evidence

    We detail the use of access control mechanisms, including profiling and captive portals, to verify device and user identities before allowing access to corporate resources, helping reduce unauthorized access to sensitive data.

    What it means

    A zero-trust approach strengthens the security of BYOD networks by enforcing strict access controls that do not rely on traditional network perimeters.

  2. Cloud computing can effectively support secure data sharing on BYOD networks by using a private or hybrid cloud model.
    Evidence

    We describe that private clouds allow organizations to control data storage and access while maintaining security through protocols like SSL or TLS, which secure data transfers and reduce the risk of man-in-the-middle attacks.

    What it means

    By leveraging private or hybrid clouds, organizations can provide secure access to corporate resources for BYOD users while retaining control over sensitive data.

  3. Mobile Application Management (MAM) enables organizations to manage corporate applications on personal devices without infringing on employees' personal data.
    Evidence

    MAM provides a containerized environment where corporate applications and data are kept separate from personal applications, allowing IT departments to manage access controls, enforce data policies, and remotely wipe data in case of device loss.

    What it means

    MAM enhances data security on BYOD devices, preserving employee privacy while allowing corporate oversight and control over critical applications.

  4. Transient authentication with tokens or wearables can secure BYOD devices against unauthorized access and ''shoulder surfing'' attacks.
    Evidence

    The article highlights the use of tokens, such as smartcards or wearables, that grant or revoke device access based on proximity, automatically logging users in or out as they approach or leave the device.

    What it means

    Transient authentication enhances security by providing an automatic login/logout function that secures devices against unauthorized physical access in BYOD environments.

Comments

You must log in to ask a question
 

Are you a researcher looking to make a real-world impact? Join Acume and transform your research into a practical summary.

Already have an account? Log in
Share

Security and Trust Issues in BYOD Networks

Cite this brief: Safdar, Ghazanfar Ali. 'Security and Trust Issues in BYOD Networks'. Acume. https://www.acume.org/r/security-and-trust-issues-in-byod-networks/

Brief created by: Dr Ghazanfar Ali Safdar | Year brief made: 2024

Original research:

  • Mansour, A., & Safdar, G. A., ‘Security and Trust Issues in BYOD Networks’ 25(4) (pp. 45–51) https://doi.org/10.1109/MITP.2023.3293714. – https://ieeexplore.ieee.org/document/3293714

Research brief:

Investigates the security and trust challenges organizations face in implementing Bring Your Own Device (BYOD) networks and explores existing and emerging solutions to address these issues.

BYOD networks, which allow employees to connect personal devices such as smartphones and tablets to corporate networks, are growing in popularity across various organizational environments due to potential cost savings and productivity gains. However, BYOD introduces significant security vulnerabilities and compliance challenges, as personal devices are often less secure and have varying levels of user-applied security measures. The risks associated with BYOD include exposure to malware, man-in-the-middle attacks, data leaks, and difficulties in enforcing security policies on devices not owned by the organization. To balance the benefits of BYOD with these security risks, organizations need reliable, secure frameworks that can protect corporate data and resources without alienating employees.

Findings:

Zero-trust frameworks help secure BYOD networks by restricting access to only authenticated devices and users, addressing the lack of perimeter control in traditional security models.

We detail the use of access control mechanisms, including profiling and captive portals, to verify device and user identities before allowing access to corporate resources, helping reduce unauthorized access to sensitive data.

A zero-trust approach strengthens the security of BYOD networks by enforcing strict access controls that do not rely on traditional network perimeters.

Cloud computing can effectively support secure data sharing on BYOD networks by using a private or hybrid cloud model.

We describe that private clouds allow organizations to control data storage and access while maintaining security through protocols like SSL or TLS, which secure data transfers and reduce the risk of man-in-the-middle attacks.

By leveraging private or hybrid clouds, organizations can provide secure access to corporate resources for BYOD users while retaining control over sensitive data.

Mobile Application Management (MAM) enables organizations to manage corporate applications on personal devices without infringing on employees’ personal data.

MAM provides a containerized environment where corporate applications and data are kept separate from personal applications, allowing IT departments to manage access controls, enforce data policies, and remotely wipe data in case of device loss.

MAM enhances data security on BYOD devices, preserving employee privacy while allowing corporate oversight and control over critical applications.

Transient authentication with tokens or wearables can secure BYOD devices against unauthorized access and ”shoulder surfing” attacks.

The article highlights the use of tokens, such as smartcards or wearables, that grant or revoke device access based on proximity, automatically logging users in or out as they approach or leave the device.

Transient authentication enhances security by providing an automatic login/logout function that secures devices against unauthorized physical access in BYOD environments.

Peer Reviewed

"Security and Trust Issues in BYOD Networks"

Cite paper

Mansour, A., & Safdar, G. A., ‘Security and Trust Issues in BYOD Networks’ 25(4) (pp. 45–51) https://doi.org/10.1109/MITP.2023.3293714.

2023 · It Professional · pp. 45-51Find full paper →DOI: 10.1109/MITP.2023.3293714
Co-authors
Ali Mansour
Methodology
This is a literature review.

This study uses a review-based approach, examining existing research, security models, and emerging technologies in the context of BYOD network security. The analysis includes a comparison of technologies such as cloud computing, transient authentication, and Mobile Application Management (MAM) that offer varying security solutions. The study also discusses security requirements unique to BYOD networks, including data access controls, encryption, and application management solutions.

Funding

This research was independently conducted and did not receive funding from outside of the university.

Your research brief is live

It’s now visible on your profile and searchable by practitioners. Thank you for making your work accessible to decision-makers who need it

Close

Your research brief was updated

Changes are live now. 

Close

Your account is pending verification

We’ve been notified and will review it shortly. Once verified, it will be published and visible to practitioners.

We have this email on file: . If this isn’t your work email, update it to speed things up.

Update email

Your draft has been saved

Your draft has been saved. You can return to edit and publish it anytime from your dashboard.

Close

Thank you for subscribing!

We’d love to know who we will be talking to, could you take a moment to share a few more details?

Thanks for signing up!
If you haven’t already, create a free account to access expert insights and be part of a global effort to improve real-world decisions.

Get started

Close

For researchers

Turn your paper into a practical brief practitioners will read.

Sign up freeLearn more

For professionals

Explore free briefs, and book a call for deeper insights when you need them.

Talk with the teamLearn more