Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Inhyok Cha is active.

Publication


Featured researches published by Inhyok Cha.


IEEE Vehicular Technology Magazine | 2009

Trust in M2M communication

Inhyok Cha; Yogendra C. Shah; Andreas Schmidt; Andreas Leicher; Michael V. Meyerstein

Machine-to-machine (M2M) communication is viewed as one of the next frontiers in wireless communications. M2M communication applications and scenarios are growing and lead the way to new business cases. Because of the nature of M2M scenarios, involving unguarded, distributed devices, new security threats emerge. The use case scenarios for M2M communication also address the new requirement on flexibility, because of deployment scenarios of the M2ME in the field. We believe that these new requirements require a paradigm shift. One important pillar of such a shift will be a new, more balanced mix of device-centric trust and traditional enforcement of security properties.


security and privacy in mobile information and communication systems | 2009

Security Aspects of Smart Cards vs. Embedded Security in Machine-to-Machine (M2M) Advanced Mobile Network Applications

Mike Meyerstein; Inhyok Cha; Yogendra C. Shah

The Third Generation Partnership Project (3GPP) standardisation group currently discusses advanced applications of mobile networks such as Machine-to-Machine (M2M) communication. Several security issues arise in these contexts which warrant a fresh look at mobile networks’ security foundations, resting on smart cards. This paper contributes a security/efficiency analysis to this discussion and highlights the role of trusted platform technology to approach these issues.


International Journal of Internet Technology and Secured Transactions | 2011

Trusted computing enhanced user authentication with OpenID and trustworthy user interface

Andreas Leicher; Andreas Schmidt; Yogendra C. Shah; Inhyok Cha

Trusted computing, used as a security technology, can establish trust between multiple parties. One implementation of trusted computing technology standardised by the Trusted Computing Group is the trusted platform module (TPM). We build on the security provided by the TPM to create a trusted variant of identity management systems based on the popular OpenID protocol. We show that it is feasible to bind OpenID identities to the trustworthiness of the device. Our concept and implementation builds on previous work which showed that trusted computing can be used to create tickets. In this work, we use such tickets as a building block to establish trust in the OpenID protocol between the identity provider and the device. Furthermore, we investigate how mutual trust can be established in the communication between device and user during authentication. The concept of trust visualisation via a trusted environment and binding to user authentication are presented.


2010 IEEE 2nd Workshop on Collaborative Security Technologies | 2010

Sender Scorecards for the prevention of unsolicited communication

Andreas Schmidt; Andreas Leicher; Yogendra C. Shah; Inhyok Cha; Louis J. Guccione

Sender Scorecards are conceived as a method to enable different IP Multimedia Subsystem (IMS) domains and networks to exchange trustworthy information on sender identities and other relevant information, to allow discrimination between legitimate and unsolicited IMS communication. The approach uses a secure and interoperable scorecard about the sender of IMS calls. Such a scorecard is generated, transported, and evaluated collaboratively between different network domains. Scorecards are used to generate a standardized exchange format for sender and message related information. Depending on the outcome of the scorecard evaluation, the receiving domain can take appropriate actions such as denying or allowing a communication attempt. The present paper proposes a blueprint for an IMS architecture including scorecard elements, based on 3GPP standards. In this context, procedures operating with scorecards for prevention of unsolicited communications are presented.


Archive | 2007

Method and apparatus for providing trusted single sign-on access to applications and internet-based services

Yogendra C. Shah; Inhyok Cha; Alexander Reznik


Archive | 2009

Method and Apparatus For Enabling Machine To Machine Communication

Inhyok Cha; Yogendra C. Shah; Andreas Schmidt; Michael V. Meyerstein


Archive | 2008

Method and apparatus for securing location information and access control using the location information

Inhyok Cha; Yogendra C. Shah; Chunxuan Ye


Archive | 2010

Platform validation and management of wireless devices

Andreas Schmidt; Andreas Leicher; Inhyok Cha; Yogendra C. Shah; Sudhir B. Pattar; Dolores F. Howry; David G. Greiner; Lawrence Case; Michael V. Meyerstein; Louis J. Guccione


Archive | 2006

Method and apparatus for antenna mapping selection in mimo-ofdm wireless networks

Inhyok Cha; Eldad Zeira; Keith Richard Baldwin


Archive | 2006

Method and apparatus for selecting a beam combination of multiple-input multiple-output antennas

Yingxue Li; Inhyok Cha; Jungwoo Lee

Collaboration


Dive into the Inhyok Cha's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Andreas Leicher

Goethe University Frankfurt

View shared research outputs
Top Co-Authors

Avatar

Andreas Leicher

Goethe University Frankfurt

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge