Towards Zero Trust: The Design and Implementation of a Secure End-Point Device for Remote Working

Kemal Bicakci, Yusuf Uzunay, Mansoor Khan

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Citations (Scopus)

Abstract

COVID-19 pandemic and lockdowns forced employees across the world to work from home. Remote working has become a necessity rather than a choice. However, in order to meet this increasing demand, the most pressing security concerns of organizations should be addressed. In this paper, we present the design and implementation of ProGun, an end-point device (a USB dongle) for remote working. We present the hardware/software co-design of ProGun, by which most security risks due to lack of physical protection could be mitigated. We also discuss choices we made among many alternatives for user authentication and their security and usability implications in a remote working environment.

Original languageEnglish
Title of host publication14th International Conference on Information Security and Cryptology, ISCTURKEY 2021 - Proceedings
EditorsSeref Sagiroglu, Sedat Akleylek, Mustafa Alkan, Ferruh Ozbudak, Yavuz Canbay, Ertugrul Karacuha, Ali Aydin Selcuk
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages28-33
Number of pages6
ISBN (Electronic)9781665407762
DOIs
Publication statusPublished - 2021
Event14th International Conference on Information Security and Cryptology, ISCTURKEY 2021 - Ankara, Turkey
Duration: 2 Dec 20213 Dec 2021

Publication series

Name14th International Conference on Information Security and Cryptology, ISCTURKEY 2021 - Proceedings

Conference

Conference14th International Conference on Information Security and Cryptology, ISCTURKEY 2021
Country/TerritoryTurkey
CityAnkara
Period2/12/213/12/21

Bibliographical note

Publisher Copyright:
© 2021 IEEE.

Funding

This research is funded by TUBITAK (The Scientific and Technological Research Council of Turkey) under the grant No: 3200964.

FundersFunder number
TUBITAK
Türkiye Bilimsel ve Teknolojik Araştirma Kurumu3200964

    Keywords

    • authentication
    • remote working
    • risk based authentication
    • security
    • security device
    • two-factor authentication
    • zero trust

    Fingerprint

    Dive into the research topics of 'Towards Zero Trust: The Design and Implementation of a Secure End-Point Device for Remote Working'. Together they form a unique fingerprint.

    Cite this