A systematic review of Bring Your Own Device (BYOD) authentication technique

This article provides a systematic review of Bring Your Own Device (BYOD) authentication technique. The review main goal is to identify the existing BYOD authentication technique and to categorize the technique according to BYOD security threat as well as to analyze the technique limitation. The rev...

Full description

Bibliographic Details
Main Authors: Jamal, Fara, Abdullah@Selimun, Mohd. Taufik, Abdullah, Azizol, Mohd. Hanapi, Zurina
Format: Article
Language:English
Published: IOP Publishing 2020
Online Access:http://psasir.upm.edu.my/id/eprint/87730/1/ABSTRACT.pdf
Description
Summary:This article provides a systematic review of Bring Your Own Device (BYOD) authentication technique. The review main goal is to identify the existing BYOD authentication technique and to categorize the technique according to BYOD security threat as well as to analyze the technique limitation. The review result shows that there are 25 authentication techniques proposed across both industry and academic areas to fit into BYOD implementation to enhance the security in preventing and detecting data leakage in the organization. It is hoped that the proposed BYOD authentication solution can help organizations to minimize the number of cases in data leakage while allowing the BYOD concept.