Vinod Kumar Choyi
InterDigital, Inc.
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Vinod Kumar Choyi.
mobile cloud computing & services | 2015
Yogendra C. Shah; Vinod Kumar Choyi; Lakshmi Subramanian
An architecture for providing multi-factor authentication as a service is proposed, resting on the principle of a loose coupling and separation of duties between network entities and end user devices. The multi-factor authentication architecture leverages Identity Federation and Single-Sign-On technologies, such as the OpenID framework, in order to provide for a modular integration of various factors of authentication. The architecture is robust and scalable enabling service providers to define risk-based authentication policies by way of assurance level requirements, which map to concrete authentication factor capabilities on user devices.
ieee conference on standards for communications and networking | 2016
Vinod Kumar Choyi; Ayman Abdelhamid; Yogendra C. Shah; Samir Ferdi; Alec Brusilovsky
5G Networks are anticipated to provide a diverse set of services over Network Slices (NS) using Network Function Virtualization (NFV) technologies. We propose solutions to enable NS selection and routing of traffic routing through a NS. A framework for enabling negotiation, selection and assignment of NSs for requesting applications in 5G networks is presented. A definition for service description has been developed, which is then leveraged for negotiation between an application/user equipment and the serving network. Virtualized networks or slices of virtualized networks are selected and assigned based on QCI and security requirements associated with a requested service. We also describe static and dynamic mechanisms for packet routing within NSs.
international conference on communications | 2013
Yousif Targali; Vinod Kumar Choyi; Yogendra C. Shah
With the increasing demand for mobile data services and increased availability of multimode devices with multiple wireless interfaces, seamless mobility and service continuity across heterogeneous networks has become a differentiating service for Operators to offer users an enhanced mobile experience. In recent years, the Federated Identity Management (IdM) standards and technologies have rapidly evolved to address security, user experience, and privacy needs from an application layer perspective or as seen from the end user. As a result of these Federated IdM activities, a Single Sign-On (SSO) concept has been created in which a user may use a single set of authentication credentials to gain access to multiple independent Application Services. This paper provides an overview of the various layers of security in a communications protocol stack and then presents an approach to achieve seamless mobility across heterogeneous networks based on Federated Identity systems. By leveraging a pre-established application layer security association, access layer authentication and setup of a secure channel in an on-demand, automated and seamless manner may be carried out whilst roaming across disparate networks.
international conference on wireless communications and mobile computing | 2013
Yousif Targali; Vinod Kumar Choyi; Yogendra C. Shah
With the increasing demand for mobile data services and increased availability of multimode devices with multiple wireless interfaces, seamless mobility and service continuity across heterogeneous networks has become a differentiating service for Operators to offer users an enhanced mobile experience. In recent years, the Federated Identity Management (IdM) standards and technologies have rapidly evolved to address security, user experience, and privacy needs from an application layer perspective or as seen from the end user. As a result of these Federated IdM activities, a Single Sign-On (SSO) concept has been created in which a user may use a single set of authentication credentials to gain access to multiple independent Application Services. This paper provides an overview of the various layers of security in a communications protocol stack and then presents an approach to achieve seamless mobility across heterogeneous networks based on Federated Identity systems. By leveraging a pre-established application layer security association, access layer authentication credentials may be generated using a bootstrapping mechanism to enable authentication and setup of a secure channel in an on-demand, automated and seamless manner may be carried out whilst roaming across disparate networks. A comparison of the proposed scheme and state-of-the-art techniques is included.
Archive | 2014
Vinod Kumar Choyi; Samian Kaur; Alec Brusilovsky; Yogendra C. Shah
Archive | 2013
Alexander Reznik; Yogendra C. Shah; Eldad Zeira; Ravikumar V. Pragada; Balaji Raghothaman; Kiran K. Vanganuru; Gregory S. Sternberg; Vinod Kumar Choyi; Xavier De Foy
Archive | 2013
Yousif Targali; Vinod Kumar Choyi; Yogendra C. Shah; Aamer Sattar Chaudry; Andreas Schmidt; Andreas Leicher
Archive | 2014
Yogendra C. Shah; Andreas Schmidt; Vinod Kumar Choyi; Lakshmi Subramanian; Andreas Leicher
Archive | 2013
Vinod Kumar Choyi; Yogendra C. Shah; Dolores F. Howry; Alpaslan Demir; Amith V. Chincholi; Sanjay Goyal; Yousif Targali
Archive | 2014
Kenneth F. Lynch; Scott C. Hergenhan; Angelo Cuffaro; Alexander Reznik; Yousif Targali; Yogenndra C. Shah; Vinod Kumar Choyi