Inhyok Cha
InterDigital, Inc.
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Inhyok Cha.
IEEE Vehicular Technology Magazine | 2009
Inhyok Cha; Yogendra C. Shah; Andreas Schmidt; Andreas Leicher; Michael V. Meyerstein
Machine-to-machine (M2M) communication is viewed as one of the next frontiers in wireless communications. M2M communication applications and scenarios are growing and lead the way to new business cases. Because of the nature of M2M scenarios, involving unguarded, distributed devices, new security threats emerge. The use case scenarios for M2M communication also address the new requirement on flexibility, because of deployment scenarios of the M2ME in the field. We believe that these new requirements require a paradigm shift. One important pillar of such a shift will be a new, more balanced mix of device-centric trust and traditional enforcement of security properties.
security and privacy in mobile information and communication systems | 2009
Mike Meyerstein; Inhyok Cha; Yogendra C. Shah
The Third Generation Partnership Project (3GPP) standardisation group currently discusses advanced applications of mobile networks such as Machine-to-Machine (M2M) communication. Several security issues arise in these contexts which warrant a fresh look at mobile networks’ security foundations, resting on smart cards. This paper contributes a security/efficiency analysis to this discussion and highlights the role of trusted platform technology to approach these issues.
International Journal of Internet Technology and Secured Transactions | 2011
Andreas Leicher; Andreas Schmidt; Yogendra C. Shah; Inhyok Cha
Trusted computing, used as a security technology, can establish trust between multiple parties. One implementation of trusted computing technology standardised by the Trusted Computing Group is the trusted platform module (TPM). We build on the security provided by the TPM to create a trusted variant of identity management systems based on the popular OpenID protocol. We show that it is feasible to bind OpenID identities to the trustworthiness of the device. Our concept and implementation builds on previous work which showed that trusted computing can be used to create tickets. In this work, we use such tickets as a building block to establish trust in the OpenID protocol between the identity provider and the device. Furthermore, we investigate how mutual trust can be established in the communication between device and user during authentication. The concept of trust visualisation via a trusted environment and binding to user authentication are presented.
2010 IEEE 2nd Workshop on Collaborative Security Technologies | 2010
Andreas Schmidt; Andreas Leicher; Yogendra C. Shah; Inhyok Cha; Louis J. Guccione
Sender Scorecards are conceived as a method to enable different IP Multimedia Subsystem (IMS) domains and networks to exchange trustworthy information on sender identities and other relevant information, to allow discrimination between legitimate and unsolicited IMS communication. The approach uses a secure and interoperable scorecard about the sender of IMS calls. Such a scorecard is generated, transported, and evaluated collaboratively between different network domains. Scorecards are used to generate a standardized exchange format for sender and message related information. Depending on the outcome of the scorecard evaluation, the receiving domain can take appropriate actions such as denying or allowing a communication attempt. The present paper proposes a blueprint for an IMS architecture including scorecard elements, based on 3GPP standards. In this context, procedures operating with scorecards for prevention of unsolicited communications are presented.
Archive | 2007
Yogendra C. Shah; Inhyok Cha; Alexander Reznik
Archive | 2009
Inhyok Cha; Yogendra C. Shah; Andreas Schmidt; Michael V. Meyerstein
Archive | 2008
Inhyok Cha; Yogendra C. Shah; Chunxuan Ye
Archive | 2010
Andreas Schmidt; Andreas Leicher; Inhyok Cha; Yogendra C. Shah; Sudhir B. Pattar; Dolores F. Howry; David G. Greiner; Lawrence Case; Michael V. Meyerstein; Louis J. Guccione
Archive | 2006
Inhyok Cha; Eldad Zeira; Keith Richard Baldwin
Archive | 2006
Yingxue Li; Inhyok Cha; Jungwoo Lee