A systematic review of Bring Your Own Device (BYOD) authentication technique

This article provides a systematic review of Bring Your Own Device (BYOD) authentication technique. The review main goal is to identify the existing BYOD authentication technique and to categorize the technique according to BYOD security threat as well as to analyze the technique limitation. The rev...

Full description

Bibliographic Details
Main Authors: Jamal, Fara, Abdullah@Selimun, Mohd. Taufik, Abdullah, Azizol, Mohd. Hanapi, Zurina
Format: Article
Language:English
Published: IOP Publishing 2020
Online Access:http://psasir.upm.edu.my/id/eprint/87730/1/ABSTRACT.pdf
_version_ 1796981882246660096
author Jamal, Fara
Abdullah@Selimun, Mohd. Taufik
Abdullah, Azizol
Mohd. Hanapi, Zurina
author_facet Jamal, Fara
Abdullah@Selimun, Mohd. Taufik
Abdullah, Azizol
Mohd. Hanapi, Zurina
author_sort Jamal, Fara
collection UPM
description This article provides a systematic review of Bring Your Own Device (BYOD) authentication technique. The review main goal is to identify the existing BYOD authentication technique and to categorize the technique according to BYOD security threat as well as to analyze the technique limitation. The review result shows that there are 25 authentication techniques proposed across both industry and academic areas to fit into BYOD implementation to enhance the security in preventing and detecting data leakage in the organization. It is hoped that the proposed BYOD authentication solution can help organizations to minimize the number of cases in data leakage while allowing the BYOD concept.
first_indexed 2024-03-06T10:44:09Z
format Article
id upm.eprints-87730
institution Universiti Putra Malaysia
language English
last_indexed 2024-03-06T10:44:09Z
publishDate 2020
publisher IOP Publishing
record_format dspace
spelling upm.eprints-877302022-07-06T03:25:39Z http://psasir.upm.edu.my/id/eprint/87730/ A systematic review of Bring Your Own Device (BYOD) authentication technique Jamal, Fara Abdullah@Selimun, Mohd. Taufik Abdullah, Azizol Mohd. Hanapi, Zurina This article provides a systematic review of Bring Your Own Device (BYOD) authentication technique. The review main goal is to identify the existing BYOD authentication technique and to categorize the technique according to BYOD security threat as well as to analyze the technique limitation. The review result shows that there are 25 authentication techniques proposed across both industry and academic areas to fit into BYOD implementation to enhance the security in preventing and detecting data leakage in the organization. It is hoped that the proposed BYOD authentication solution can help organizations to minimize the number of cases in data leakage while allowing the BYOD concept. IOP Publishing 2020 Article PeerReviewed text en http://psasir.upm.edu.my/id/eprint/87730/1/ABSTRACT.pdf Jamal, Fara and Abdullah@Selimun, Mohd. Taufik and Abdullah, Azizol and Mohd. Hanapi, Zurina (2020) A systematic review of Bring Your Own Device (BYOD) authentication technique. Journal of Physics: Conference Series, 1529. art. no. 042071. pp. 1-11. ISSN 1742-6588; ESSN: 1742-6596 https://iopscience.iop.org/article/10.1088/1742-6596/1529/4/042071 10.1088/1742-6596/1529/4/042071
spellingShingle Jamal, Fara
Abdullah@Selimun, Mohd. Taufik
Abdullah, Azizol
Mohd. Hanapi, Zurina
A systematic review of Bring Your Own Device (BYOD) authentication technique
title A systematic review of Bring Your Own Device (BYOD) authentication technique
title_full A systematic review of Bring Your Own Device (BYOD) authentication technique
title_fullStr A systematic review of Bring Your Own Device (BYOD) authentication technique
title_full_unstemmed A systematic review of Bring Your Own Device (BYOD) authentication technique
title_short A systematic review of Bring Your Own Device (BYOD) authentication technique
title_sort systematic review of bring your own device byod authentication technique
url http://psasir.upm.edu.my/id/eprint/87730/1/ABSTRACT.pdf
work_keys_str_mv AT jamalfara asystematicreviewofbringyourowndevicebyodauthenticationtechnique
AT abdullahselimunmohdtaufik asystematicreviewofbringyourowndevicebyodauthenticationtechnique
AT abdullahazizol asystematicreviewofbringyourowndevicebyodauthenticationtechnique
AT mohdhanapizurina asystematicreviewofbringyourowndevicebyodauthenticationtechnique
AT jamalfara systematicreviewofbringyourowndevicebyodauthenticationtechnique
AT abdullahselimunmohdtaufik systematicreviewofbringyourowndevicebyodauthenticationtechnique
AT abdullahazizol systematicreviewofbringyourowndevicebyodauthenticationtechnique
AT mohdhanapizurina systematicreviewofbringyourowndevicebyodauthenticationtechnique