BYOD security issues: a systematic literature review

Author(s):  
Melva Ratchford ◽  
Omar El-Gayar ◽  
Cherie Noteboom ◽  
Yong Wang
Author(s):  
Faraz Masood ◽  
Arman Rasool Faridi

: The Internet of Things (IoT) is one of the most emerging technologies, specially with the introduction of smart cities, smart homes etc. anticipating fifty billion connected devices. IoT devices are usually limited in their processing, storage, and network bandwidth, and are more vulnerable to attacks can be easily hacked and compromised. As IoT deals with personal life, so its security is one of the most critical challenges that need to resolve before its adoption. Distributed ledger technology (DLT), especially blockchain, is a relatively new technology that deals with the distributed immutable ledger. DLT is a promising technology that may solve the security issues of IoT. So a study needs to be done to know what security challenges of IoT can be solved using DLT and what are the ways in which DLT can be used to increase security.In this paper first we have set the research questions, then the systematic literature review has been done in view of research questions, then answers to research questions are presented, and discussion about the answers to research questions have been presented. A solution has been proposed that can be used to increase the security of IoT. Based on the review results, the paper concludes with the suggestions for using blockchain for IoT security.


TEKNOKOM ◽  
2021 ◽  
Vol 4 (2) ◽  
pp. 43-47
Author(s):  
Sigit Wibawa

This paper provides an overview of the wireless handoff process on wireless networks by investigating Authentication Protocol using EAP -AKA (Extensible Authentication Protocol) - Authentication and Key Agreement The EAP-AKA protocol was developed for LAN networks or mobile network devices, the authors found ineffective network procedures guaranteed that made the attacks MITM and DoS attacks may occur. In addition, we find the storage procedures and resource submissions not safe enough to withstand DoS attacks. Focusing on Both types of attacks, the authors are interested in existing security protocol methods and written by researchers, then perform Systematic Literature Review (SLR) by using international journals database ie from the IEEE organization with the use of wireless handoff attack keyword in the middle of the world and obtained some related journals which need further research to deepen the Systematic Literature review, by offering a structured, methodical, and meticulous approach to understanding the research trends of handoff security issues on wireless networks and mobile networks. The purpose of this research is to provide credible intellectual guidance for future researchers to help them identify areas in the study. Most SLR is limited to conference papers and journal articles published by IEEE from 2015 to 2021. This study reveals that the protocol, privacy and security of the handoff process are the least studied, while the operating problems, architecture, methods in the handoff process get much attention in the literature.


Author(s):  
Emmanuel O.C. Mkpojiogu ◽  
Azham Hussain ◽  
Monday Onah Agbudu

<p>Although, there are several literatures pertaining to the security issues in the use of mobile apps, these literatures do not sufficiently address issues about the security challenges in the use of mobile educational app. Hence, this work attempts to review the available literatures with the aim of capturing the security issues in the use of mobile educational apps. To achieve the stated research goal, the study applied systematic literature review methodology. Sixty four (64) papers in the area of security issues in the use of mobile educational apps were downloaded. Out of these papers, twenty one (21) most relevant studies were selected for review in order to extract the appropriate information needed for the analysis. The results from the review reveals the scarcity of appropriate literatures on security issues in the use of mobile educational apps and that these issues are a thing of concern, and needed to be looked into in this ever growing world of technologies. However, most of the studies, taken single handedly reviewed lack of comprehensive framework to demonstrate the security challenges in the use of mobile educational apps. Thus, the results from this paper provide additional knowledge to the users of mobile apps as a whole; students in their usage of mobile educational apps and the research community on the current security challenges in the use of mobile educational apps.</p>


2014 ◽  
Author(s):  
Heather T. Snyder ◽  
Maggie R. Boyle ◽  
Lacey Gosnell ◽  
Julia A. Hammond ◽  
Haley Huey

2018 ◽  
Vol 19 (4) ◽  
pp. 600-611 ◽  
Author(s):  
Nathan Beel ◽  
Carla Jeffries ◽  
Charlotte Brownlow ◽  
Sonya Winterbotham ◽  
Jan du Preez

Sign in / Sign up

Export Citation Format

Share Document