Implementation and Performance Analysis of Network Access Control Based on 802.1X for Effective Access Control on BYOD


KIPS Transactions on Computer and Communication Systems, Vol. 4, No. 9, pp. 271-282, Sep. 2015
10.3745/KTCCS.2015.4.9.271,   PDF Download:

Abstract

In the business environment BYOD(Bring Your Own Device) is used and being expanded continuously. According to a survey conducted by Cisco in 2012 on 600 companies, 95% of them are already permitting the use of BYOD in their work environments so that productivity of their employees has improved as a result. Gartner predicted that the use of BYOD will be caused new security threat. They also suggested to introduce NAC(Network Access Control) to resolve this threat, to separate network zone based on importance of their business, to establish the policy to consider user authority and device type, and to enforce the policy. The purpose of this paper is to design and implement the NAC for granular access control based on IEEE(Institute of Electrical and Electronics Engineers) 802.1X and DHCP(Dynamic Host Configuration Protocol) fingerprinting, and to analyze the performance on BYOD environment.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from September 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
M. C. Lee and J. H. Kim, "Implementation and Performance Analysis of Network Access Control Based on 802.1X for Effective Access Control on BYOD," KIPS Transactions on Computer and Communication Systems, vol. 4, no. 9, pp. 271-282, 2015. DOI: 10.3745/KTCCS.2015.4.9.271.

[ACM Style]
Min Choul Lee and Jeong Ho Kim. 2015. Implementation and Performance Analysis of Network Access Control Based on 802.1X for Effective Access Control on BYOD. KIPS Transactions on Computer and Communication Systems, 4, 9, (2015), 271-282. DOI: 10.3745/KTCCS.2015.4.9.271.