Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Tae Hwan Oh is active.

Publication


Featured researches published by Tae Hwan Oh.


sensor networks ubiquitous and trustworthy computing | 2010

Security Issues on Wireless Body Area Network for Remote Healthcare Monitoring

Shinyoung Lim; Tae Hwan Oh; Young B. Choi; Tamil Lakshman

A case study of security risk analysis of a wireless body area network for remote health monitoring as a after measure fordeploying security and privacy features is introduced in this paper. The target system has a scalable platform that requires minimum human interaction during setup and monitoring. The core components of the system include: (i) biosensor/transceiver pairs, (ii) hardware modules to automatically setup the wireless body area network, (iii) data delivery mechanism to an internet sever, and (iv) automatic data collection, profiling and reporting. As the system contains personal health records that require high level of security when the records are being shared and transferred to health professionals and service providers. We assess security risk based on this critical needs of acknowledged risks and threats in the real time remote health monitoring system.


1st International Conference on Security-Enriched Urban Computing and Smart Grid, SUComS 2010 | 2010

State of the Art of Network Security Perspectives in Cloud Computing

Tae Hwan Oh; Shinyoung Lim; Young B. Choi; Kwang Roh Park; Heejo Lee; Hyunsang Choi

Cloud computing is now regarded as one of social phenomenon that satisfy customers’ needs. It is possible that the customers’ needs and the primary principle of economy – gain maximum benefits from minimum investment – reflects realization of cloud computing. We are living in the connected society with flood of information and without connected computers to the Internet, our activities and work of daily living will be impossible. Cloud computing is able to provide customers with custom-tailored features of application software and user’s environment based on the customer’s needs by adopting on-demand outsourcing of computing resources through the Internet. It also provides cloud computing users with high-end computing power and expensive application software package, and accordingly the users will access their data and the application software where they are located at the remote system. As the cloud computing system is connected to the Internet, network security issues of cloud computing are considered as mandatory prior to real world service. In this paper, survey and issues on the network security in cloud computing are discussed from the perspective of real world service environments.


International Journal of Mobile Communications | 2011

Security management in Wireless Sensor Networks for healthcare

Tae Hwan Oh; Young B. Choi; Jungwoo Ryoo; Kristian Stokes

This paper first discusses emerging security threats, requirements and solutions for WSNs. In addition, the current applications and architectures of WSNs in healthcare systems are explained in detail. Then an assessment framework for WSN security for healthcare is developed to determine the security impact of WSNs on the healthcare applications. This framework will evaluate the strengths and weaknesses of each WSN security architecture and standard for healthcare. Lastly, solutions to close the gap between the existing and idea security will be proposed as well as the future directions for WSN security management.


International Journal of Mobile Communications | 2009

A multi-dimensional classification framework for developing context-specific Wireless Local Area Network attack taxonomies

Jungwoo Ryoo; Young B. Choi; Tae Hwan Oh; Gregory Corbin

Despite the abundance of taxonomies for the high-level classification of computer or network security attacks, few researchers have worked on the development of a taxonomy dedicated to Wireless Local Area Network (WLAN) security attacks. The existing general-purpose taxonomies are not equipped with WLAN-specific classification criteria and, therefore, fail to reveal and categorise attacks that exploit vulnerabilities found only in WLANs. To address this problem, we propose a novel taxonomy development framework that features a rich set of classification criteria devoted to WLAN attacks. The new taxonomy is expressive enough to describe not only well-known attacks, but also newly emerging ones.


Electronic Government, An International Journal | 2009

A comprehensive readiness assessment framework for identity theft safeguards in web-based electronic government systems

Jungwoo Ryoo; Tae Hwan Oh; Seungjae Shin; Young B. Choi

Identity theft is becoming more commonplace as the number of criminals taking advantage of the World Wide Web to lure their victims increases. The users of web-based electronic government systems are certainly not immune to this trend although the governmental organisations of various levels (federal, state and local governments) are taking steps to adopt the best possible safeguards to prevent identity theft on their websites. Despite their enthusiasm to protect citizens, governmental organisations currently lack assessment methods specifically designed to measure the effectiveness of safeguards they deploy. To address this problem, we propose a comprehensive readiness assessment framework.


international conference on hybrid information technology | 2012

Nomadic Device Based CRL Acquisition Method for Vehicular Networks

HyunGon Kim; Tae Hwan Oh; Young B. Choi

Distributing a Certificate Revocation List (CRL) quickly to all vehicles in the system requires a very large number of road side units (RSUs) to be deployed and maintained by the CA. In reality, initial deployment stage of vehicular networks would be characterized by limited infrastructure as a result in very limited vehicle to infrastructure communication. However, every vehicle wants the most recent CRLs to protect itself from malicious users and malfunctioning equipments, as well as to increase the overall security of the vehicle networks. To address this challenge, we propose a nomadic device based CRL acquisition method using nomadic device’s communication capability with cellular networks. When a vehicle could not directly communicate with nearby RSUs, the nomadic device acts as a security mediator to perform vehicle’s security functions continuously through cellular networks. Therefore, even if RSUs are not deployed or sparsely deployed, vehicle’s security threats could be minimized by receiving the most recent CRLs in a reasonable time.


international conference on information security | 2011

RFID Implementation and Security Issues

Young B. Choi; Tae Hwan Oh; Rajath Chouta

Radio Frequency Identification (RFID) is a technology that uses electronic tags to store data which in turn can be accessed in real time wirelessly. There is great potential for RFID technology in our society. RFID tags can be used for supply chain management, inventory systems, animal tracking, instant payments or even human implantation. Standards in the RFID industry are examined with an emphasis place on global standardizing bodies. With the growing use of RFID devices in supply chain management and global shipping, several shipping standards including EPC and ASN are examined. Security has become a major concern with several threats to RFID technology recently exposed. Several solutions are presented for firms wishing to implement RFID technology and minimize the risk to sensitive information and company systems.


international conference on future generation communication and networking | 2011

RFID and Supply Chain Management: Generic and Military Applications

Tae Hwan Oh; Young B. Choi; Rajath Chouta

This paper explains two main aspects of RFID supply chain management – the generic supply chain management and the specific military application for the purpose of asset viability. The generic supply chain management is studied by examining how to improve supply chain management through accurately determining inventory levels in real time without human interaction. For the military application, the current legacy systems used by the military for Supply Chain Management and Asset Visibility are analyzed and suggestions are made for improvements in the form of Total Asset Visibility through Radio Frequency Identification tags, and Geographic Information Systems.


Archive | 2005

Ultrafine polytrimethylene terephthalate conjugate fiber for artificial leather and manufacturing method thereof

Tae Hwan Oh; Young Geun Choi; Do Kyoon Kim; Seung Woo Rew; Sun Woo Kim; Jae Hong Lee


conference on information technology education | 2010

Feasibility of virtual security laboratory for three-tiered distance education

Young B. Choi; Shinyoung Lim; Tae Hwan Oh

Collaboration


Dive into the Tae Hwan Oh's collaboration.

Top Co-Authors

Avatar

Young B. Choi

James Madison University

View shared research outputs
Top Co-Authors

Avatar

Jungwoo Ryoo

Pennsylvania State University

View shared research outputs
Top Co-Authors

Avatar

Shinyoung Lim

University of Pittsburgh

View shared research outputs
Top Co-Authors

Avatar

Rajath Chouta

Rochester Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Bill Stackpole

Rochester Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Emma Tang

Rochester Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Ernest Fokoué

Rochester Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Huda Ali Alatwi

Rochester Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Kristian Stokes

Rochester Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Swapna Kalpagam Subramaniam

Rochester Institute of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge