SlideShare a Scribd company logo
A Method for Cloud-Assisted Secure Wireless Grouping of
Client Devices at Network Edge
Marat Zhanikeev – maratishe@gmail.com — PDF: bit.do/190806
presented as CyberSciTech 2019 @ Fukuoka
2019/08/06
Marat Zhanikeev – maratishe@gmail.com — PDF: bit.do/190806A Method for Cloud-Assisted Secure Wireless Grouping of Client Devices at Network Edge 1/9
1/9
Theoretical comm. capabilities at network
edge
• vast majority of (smartphone) apps today run online
◦ for example, see if you can find an offline news reader
• yet there are at least 3 separate methods for P2P WiFi
WiFi
3G
Connectivity
WebApp
Cloud
New
paradigm
Beacon
Stuffing
Marat Zhanikeev – maratishe@gmail.com — PDF: bit.do/190806A Method for Cloud-Assisted Secure Wireless Grouping of Client Devices at Network Edge 1/9
1/9
Cloud-Backed Device Groups at NetEdge
• devices should not trust each
other when forming groups
• a 3-way cloud-in-the-middle
handshake is proposed
• locally visible info is meaningless
code, which makes sense only when
run via the cloud
• this paper: a hashkey as SSID
Marat Zhanikeev – maratishe@gmail.com — PDF: bit.do/190806A Method for Cloud-Assisted Secure Wireless Grouping of Client Devices at Network Edge 2/9
2/9
The 3-Way Handshake
Cloud
Client A Client B
id,
GPS,
APs
Seeking group!
Check -in
HashkeyHashkey
>> SSID
Grouping
request
Matching
Check-in
B s hashkey
Hashkey
>> SSID
Direct comm.
• both sides need to ① put up WiFi APs and
➁ run AP scans
◦ doable on Android? I have had mixed results, but
the worst case is to toggle between AP and scan
• the matching part is non-trivial: the
cloud can pack ① GPS, ➁ WiFi signal level, ③
mobility trace/prediction, ④ sampling in dense
crowds ... into a smart grouping candidate
list
Marat Zhanikeev – maratishe@gmail.com — PDF: bit.do/190806A Method for Cloud-Assisted Secure Wireless Grouping of Client Devices at Network Edge 3/9
3/9
Session Modeling
• the biggest impact comes from lazy beaconing, no practical way to make it
better
• always-on-alert mode for short periods of time is possible, but out of scope for now
Cloud API
Client A
Effective
range
Walking path
Lazy Beaconing
WiFi Direct
GroupingDiscovery
Client B
Local traffic
Marat Zhanikeev – maratishe@gmail.com — PDF: bit.do/190806A Method for Cloud-Assisted Secure Wireless Grouping of Client Devices at Network Edge 4/9
4/9
Trace-Based Modeling
0 1 2 3 4 5 6 7 8 9
Time order
20
40
60
80
100
120
140
160
180
200
distance
0 1 2 3 4 5 6 7 8 9
Time order
0
0.2
0.4
0.6
0.8
1
speed
• mobility traces
from crawdad
(Statefair)
• mined the trace and
extracted pairwise
encounters
• each such encounter
is extraced and made
ready for easy replay
Marat Zhanikeev – maratishe@gmail.com — PDF: bit.do/190806A Method for Cloud-Assisted Secure Wireless Grouping of Client Devices at Network Edge 5/9
5/9
d2d vs d2i cases
• gridify the trace, track counts for each grid cell
to visualize the best spots for the infra
nodes – those are slow mobility, high density grid
cells
Speed map Density mapMap for potential infrastructure hubs
Marat Zhanikeev – maratishe@gmail.com — PDF: bit.do/190806A Method for Cloud-Assisted Secure Wireless Grouping of Client Devices at Network Edge 6/9
6/9
Performance
• infra-assisted models have poorer overall
performance (few nodes), but can be used to
further enhance the D2D performance
• these are aggregate views, better visualizations
are needed to see details
3 5 10 15 30 60 90 180
5
7
10
15
20
25
50
03 01 00 00 00 00 00 00
05 04 01 01 01 00 00 00
10 08 06 04 03 01 00 00
20 18 14 11 09 03 02 00
26 25 22 20 16 06 03 01
32 31 30 27 23 12 07 02
55 53 51 50 48 41 33 12
Effectiverange(meters)
Session duration (seconds)
25 25 25 25 25 13 09 06 06 06 06 06 06 06
34 34 34 34 34 18 13 09
06 06 06 06 06 04 03 02
05 05 05 05 05 03 02 01
03 03 03 03 03 02 02 01
01 01 01 01 01 01 01 01
16 16 16 16 16 08 05 03
02 02 02 02 02 01 01 01
01 01 01 01 01 01 01 01
01 01 01 01 01
3 5 10 15 30 60 90 180
5
7
10
15
20
25
50
26 26 26 26 26 14 10 06
11 11 11 11 11 06 03 02
08 08 08 08 08 04 03 01
04 04 04 04 04 02 02 01
02 02 02 02 02 01 01
31 31 31 31 31 15 10 07
02 02 02 02 02
02 02 02 02 02 02 02 02
WiFiRange(meters)
Session duration
Marat Zhanikeev – maratishe@gmail.com — PDF: bit.do/190806A Method for Cloud-Assisted Secure Wireless Grouping of Client Devices at Network Edge 7/9
7/9
Wrapup
• the infra-assisted case is best described as much better performance for
some of the clients
• otherwise, infra nodes facilitate much faster handshake due to prefetch
◦ 3-way handshakes inevitably infer additional cost
• side note ① already implemented and tried on Android and RPi
• side note ➁ the proposal can be used as a component in a blockchain-based
security at network edge01
01 M.Zhanikeev ”The Last Man Standing Technique for Proof-of-Location in IoT Infrastructures at Network Edge” Wireless Comm. and Mobile Comp. (2019)
Marat Zhanikeev – maratishe@gmail.com — PDF: bit.do/190806A Method for Cloud-Assisted Secure Wireless Grouping of Client Devices at Network Edge 8/9
8/9
That’s all, thank you ...
Marat Zhanikeev – maratishe@gmail.com — PDF: bit.do/190806A Method for Cloud-Assisted Secure Wireless Grouping of Client Devices at Network Edge 9/9
9/9

More Related Content

PPTX
ECI Smart Cities Fundamentals EUW2017
PDF
Virtualized Transport for Edge Computing Services
PDF
TADSummit EMEA: Edge IoT and 5G – can WebRTC help? by Tim Panton is CTO at |p...
PDF
Small Cells & 5G IoT champions work item
PPTX
IoT in ITS: Network Impacts
PPTX
Medium-Large Enterprise Small Cell Deployment Case Studies
PDF
SD-WAN Orchestration
PDF
Small Cell Industry Insight & Experience Sharing
ECI Smart Cities Fundamentals EUW2017
Virtualized Transport for Edge Computing Services
TADSummit EMEA: Edge IoT and 5G – can WebRTC help? by Tim Panton is CTO at |p...
Small Cells & 5G IoT champions work item
IoT in ITS: Network Impacts
Medium-Large Enterprise Small Cell Deployment Case Studies
SD-WAN Orchestration
Small Cell Industry Insight & Experience Sharing

What's hot (20)

PPTX
Cisco Small Cells, Transforming Enterprise Wireless Access
PDF
Defining a modern day network
PDF
Innovations in Edge Computing and MEC
PPTX
Via Solutions, Transforming Networks, Unlocking Potential
PPTX
The Importance of Cloud Migration
PPTX
ECI OVUM Webinar-Cloud Revenue Opportunities-Feb 2016
PDF
Dynamic workload migration over optical backbone network to minimize data cen...
PDF
ThinkSmallCell Analyst Spotlight December 2016
PDF
Edge computing: Cord build 17 telefonica use cases
PPTX
Cellular Backhauling over Satellite: The Other Side of the Coin
PDF
Digital Transformation at ALE breeds new business model and opportunities for...
PPTX
Small Cell Deployment Stories 2016
PDF
Edge Computing risks and Opportunities for Telco and hyperscalers
PDF
Cisco: Accelerating Enterprise Deployments
PPTX
Enterprise Small Cell Opportunities and Challenges
PPTX
Real World Orchestration & Automation
PPTX
Small Cell Forum: Security Briefing
PDF
Soldatos io t-academy-cosmote-231117-v-final
PDF
5G
PPTX
Ericsson 5G Core System
Cisco Small Cells, Transforming Enterprise Wireless Access
Defining a modern day network
Innovations in Edge Computing and MEC
Via Solutions, Transforming Networks, Unlocking Potential
The Importance of Cloud Migration
ECI OVUM Webinar-Cloud Revenue Opportunities-Feb 2016
Dynamic workload migration over optical backbone network to minimize data cen...
ThinkSmallCell Analyst Spotlight December 2016
Edge computing: Cord build 17 telefonica use cases
Cellular Backhauling over Satellite: The Other Side of the Coin
Digital Transformation at ALE breeds new business model and opportunities for...
Small Cell Deployment Stories 2016
Edge Computing risks and Opportunities for Telco and hyperscalers
Cisco: Accelerating Enterprise Deployments
Enterprise Small Cell Opportunities and Challenges
Real World Orchestration & Automation
Small Cell Forum: Security Briefing
Soldatos io t-academy-cosmote-231117-v-final
5G
Ericsson 5G Core System
Ad

Similar to A Method for Cloud-Assisted Secure Wireless Grouping of Client Devices at Network Edge (20)

PDF
Design and Implementation of a 3-Party Cloud-Backed Handshake for Secure Grou...
PPTX
Introduction to sensor networks app.pptx
PDF
A Brief Review on Wireless Networks
PDF
Transformation From Today To Tomorrow - Market and Product Strategy 2018
PDF
THE ROLE OF EDGE COMPUTING IN INTERNET OF THINGS
PDF
Cooperative hierarchical based edge-computing approach for resources allocati...
PDF
February 2025 - Top 10 Read Articles in Network Security & Its Applications.pdf
PDF
June 2024 - Top 10 Read Articles in Network Security and Its Applications
PDF
March 2024 - Top 10 Read Articles in Network Security & Its Applications
PDF
January 2025 - Top 10 Read Articles in Network Security & Its Applications.pdf
PDF
April 2022 - Top 10 Read Articles in Network Security and Its Applications
PDF
May 2024 - Top 10 Read Articles in Network Security & Its Applications.pdf
PPTX
Emergence of IOT & Cloud – Azure by Narendra Sharma at Cloud focused 76th Dev...
PDF
June 2022: Top 10 Read Articles in Network Security and Its Applications
PDF
June 2023: Top 10 Read Articles in Network Security and Its Applications
PDF
July 2024 - Top 10 Read Articles in Network Security and Its Applications
PDF
January 2023: Top 10 Read Articles in Network Security and Its Applications
PDF
April 2024 - Top 10 Read Articles in Network Security & Its Applications
PDF
May 2022: Top 10 Read Articles in Network Security and Its Applications
PDF
June 2025 - Top 10 Read Articles in Network Security and Its Applications
Design and Implementation of a 3-Party Cloud-Backed Handshake for Secure Grou...
Introduction to sensor networks app.pptx
A Brief Review on Wireless Networks
Transformation From Today To Tomorrow - Market and Product Strategy 2018
THE ROLE OF EDGE COMPUTING IN INTERNET OF THINGS
Cooperative hierarchical based edge-computing approach for resources allocati...
February 2025 - Top 10 Read Articles in Network Security & Its Applications.pdf
June 2024 - Top 10 Read Articles in Network Security and Its Applications
March 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2025 - Top 10 Read Articles in Network Security & Its Applications.pdf
April 2022 - Top 10 Read Articles in Network Security and Its Applications
May 2024 - Top 10 Read Articles in Network Security & Its Applications.pdf
Emergence of IOT & Cloud – Azure by Narendra Sharma at Cloud focused 76th Dev...
June 2022: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its Applications
July 2024 - Top 10 Read Articles in Network Security and Its Applications
January 2023: Top 10 Read Articles in Network Security and Its Applications
April 2024 - Top 10 Read Articles in Network Security & Its Applications
May 2022: Top 10 Read Articles in Network Security and Its Applications
June 2025 - Top 10 Read Articles in Network Security and Its Applications
Ad

More from Tokyo University of Science (20)

PDF
Ultrasound Relative Positioning for IoT Devices in Dense Wireless Spaces
PDF
Towards a Packet Traffic Genome Project as a Method for Realtime Sub-Flow Tra...
PDF
What if We Atomize Student Data and Apps and Put Them on Docker Containers?
PDF
Large-Scale Crowdsourcing by Vehicular Data Packets in a Sparse Roadside Infr...
PDF
On Performance Under Hotspots in Hadoop versus Bigdata Replay Platforms
PDF
Taking the Step from Software to Product Development \\ when teaching PBL at ...
PDF
The Switchboard Optimization Problem and Heuristics for Cut-Through Networking
PDF
The Switchboard Traffic Engineering Problem for Mixed Contention/Cut-Through ...
PDF
Bulk-n-Pick Method for One-to-Many Data Transfer in Dense Wireless Spaces
PDF
Fog Cloud Caching at Network Edge via Local Hardware Awareness Spaces
PDF
On a Hybrid Packets-and-Circuits Switching Logic
PDF
Image-Related Uses for Roadside Infrastructure \\ based on Wireless Beacons
PDF
Complexity Resolution Control for Context Based on Metromaps
PDF
The Declarative-Coordinated Model for Self-Optimization of Service Networks
PDF
3-Way Scripts as a Practical Platform for Secure Distributed Code in Clouds
PDF
3-Way Scripts as a Base Unit for Flexible Scale-Out Code
PDF
Towards Social Robotics on Smartphones with Simple XYZV Sensor Feedback
PDF
Back to Rings but not Tokens: Physical and Logical Designs for Distributed Fi...
PDF
Browser Visualization using PNGs Generated by HTML5 Workers on Multicore
PDF
Population Management in Clouds is a Do-It-Yourself Technology
Ultrasound Relative Positioning for IoT Devices in Dense Wireless Spaces
Towards a Packet Traffic Genome Project as a Method for Realtime Sub-Flow Tra...
What if We Atomize Student Data and Apps and Put Them on Docker Containers?
Large-Scale Crowdsourcing by Vehicular Data Packets in a Sparse Roadside Infr...
On Performance Under Hotspots in Hadoop versus Bigdata Replay Platforms
Taking the Step from Software to Product Development \\ when teaching PBL at ...
The Switchboard Optimization Problem and Heuristics for Cut-Through Networking
The Switchboard Traffic Engineering Problem for Mixed Contention/Cut-Through ...
Bulk-n-Pick Method for One-to-Many Data Transfer in Dense Wireless Spaces
Fog Cloud Caching at Network Edge via Local Hardware Awareness Spaces
On a Hybrid Packets-and-Circuits Switching Logic
Image-Related Uses for Roadside Infrastructure \\ based on Wireless Beacons
Complexity Resolution Control for Context Based on Metromaps
The Declarative-Coordinated Model for Self-Optimization of Service Networks
3-Way Scripts as a Practical Platform for Secure Distributed Code in Clouds
3-Way Scripts as a Base Unit for Flexible Scale-Out Code
Towards Social Robotics on Smartphones with Simple XYZV Sensor Feedback
Back to Rings but not Tokens: Physical and Logical Designs for Distributed Fi...
Browser Visualization using PNGs Generated by HTML5 Workers on Multicore
Population Management in Clouds is a Do-It-Yourself Technology

Recently uploaded (20)

PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Encapsulation theory and applications.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Approach and Philosophy of On baking technology
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Empathic Computing: Creating Shared Understanding
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
Spectroscopy.pptx food analysis technology
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Machine learning based COVID-19 study performance prediction
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Unlocking AI with Model Context Protocol (MCP)
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Chapter 3 Spatial Domain Image Processing.pdf
Encapsulation theory and applications.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Diabetes mellitus diagnosis method based random forest with bat algorithm
Approach and Philosophy of On baking technology
MYSQL Presentation for SQL database connectivity
Empathic Computing: Creating Shared Understanding
Understanding_Digital_Forensics_Presentation.pptx
Spectroscopy.pptx food analysis technology
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Encapsulation_ Review paper, used for researhc scholars
Network Security Unit 5.pdf for BCA BBA.
Programs and apps: productivity, graphics, security and other tools
NewMind AI Weekly Chronicles - August'25 Week I
Machine learning based COVID-19 study performance prediction
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows

A Method for Cloud-Assisted Secure Wireless Grouping of Client Devices at Network Edge

  • 1. A Method for Cloud-Assisted Secure Wireless Grouping of Client Devices at Network Edge Marat Zhanikeev – maratishe@gmail.com — PDF: bit.do/190806 presented as CyberSciTech 2019 @ Fukuoka 2019/08/06 Marat Zhanikeev – maratishe@gmail.com — PDF: bit.do/190806A Method for Cloud-Assisted Secure Wireless Grouping of Client Devices at Network Edge 1/9 1/9
  • 2. Theoretical comm. capabilities at network edge • vast majority of (smartphone) apps today run online ◦ for example, see if you can find an offline news reader • yet there are at least 3 separate methods for P2P WiFi WiFi 3G Connectivity WebApp Cloud New paradigm Beacon Stuffing Marat Zhanikeev – maratishe@gmail.com — PDF: bit.do/190806A Method for Cloud-Assisted Secure Wireless Grouping of Client Devices at Network Edge 1/9 1/9
  • 3. Cloud-Backed Device Groups at NetEdge • devices should not trust each other when forming groups • a 3-way cloud-in-the-middle handshake is proposed • locally visible info is meaningless code, which makes sense only when run via the cloud • this paper: a hashkey as SSID Marat Zhanikeev – maratishe@gmail.com — PDF: bit.do/190806A Method for Cloud-Assisted Secure Wireless Grouping of Client Devices at Network Edge 2/9 2/9
  • 4. The 3-Way Handshake Cloud Client A Client B id, GPS, APs Seeking group! Check -in HashkeyHashkey >> SSID Grouping request Matching Check-in B s hashkey Hashkey >> SSID Direct comm. • both sides need to ① put up WiFi APs and ➁ run AP scans ◦ doable on Android? I have had mixed results, but the worst case is to toggle between AP and scan • the matching part is non-trivial: the cloud can pack ① GPS, ➁ WiFi signal level, ③ mobility trace/prediction, ④ sampling in dense crowds ... into a smart grouping candidate list Marat Zhanikeev – maratishe@gmail.com — PDF: bit.do/190806A Method for Cloud-Assisted Secure Wireless Grouping of Client Devices at Network Edge 3/9 3/9
  • 5. Session Modeling • the biggest impact comes from lazy beaconing, no practical way to make it better • always-on-alert mode for short periods of time is possible, but out of scope for now Cloud API Client A Effective range Walking path Lazy Beaconing WiFi Direct GroupingDiscovery Client B Local traffic Marat Zhanikeev – maratishe@gmail.com — PDF: bit.do/190806A Method for Cloud-Assisted Secure Wireless Grouping of Client Devices at Network Edge 4/9 4/9
  • 6. Trace-Based Modeling 0 1 2 3 4 5 6 7 8 9 Time order 20 40 60 80 100 120 140 160 180 200 distance 0 1 2 3 4 5 6 7 8 9 Time order 0 0.2 0.4 0.6 0.8 1 speed • mobility traces from crawdad (Statefair) • mined the trace and extracted pairwise encounters • each such encounter is extraced and made ready for easy replay Marat Zhanikeev – maratishe@gmail.com — PDF: bit.do/190806A Method for Cloud-Assisted Secure Wireless Grouping of Client Devices at Network Edge 5/9 5/9
  • 7. d2d vs d2i cases • gridify the trace, track counts for each grid cell to visualize the best spots for the infra nodes – those are slow mobility, high density grid cells Speed map Density mapMap for potential infrastructure hubs Marat Zhanikeev – maratishe@gmail.com — PDF: bit.do/190806A Method for Cloud-Assisted Secure Wireless Grouping of Client Devices at Network Edge 6/9 6/9
  • 8. Performance • infra-assisted models have poorer overall performance (few nodes), but can be used to further enhance the D2D performance • these are aggregate views, better visualizations are needed to see details 3 5 10 15 30 60 90 180 5 7 10 15 20 25 50 03 01 00 00 00 00 00 00 05 04 01 01 01 00 00 00 10 08 06 04 03 01 00 00 20 18 14 11 09 03 02 00 26 25 22 20 16 06 03 01 32 31 30 27 23 12 07 02 55 53 51 50 48 41 33 12 Effectiverange(meters) Session duration (seconds) 25 25 25 25 25 13 09 06 06 06 06 06 06 06 34 34 34 34 34 18 13 09 06 06 06 06 06 04 03 02 05 05 05 05 05 03 02 01 03 03 03 03 03 02 02 01 01 01 01 01 01 01 01 01 16 16 16 16 16 08 05 03 02 02 02 02 02 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 3 5 10 15 30 60 90 180 5 7 10 15 20 25 50 26 26 26 26 26 14 10 06 11 11 11 11 11 06 03 02 08 08 08 08 08 04 03 01 04 04 04 04 04 02 02 01 02 02 02 02 02 01 01 31 31 31 31 31 15 10 07 02 02 02 02 02 02 02 02 02 02 02 02 02 WiFiRange(meters) Session duration Marat Zhanikeev – maratishe@gmail.com — PDF: bit.do/190806A Method for Cloud-Assisted Secure Wireless Grouping of Client Devices at Network Edge 7/9 7/9
  • 9. Wrapup • the infra-assisted case is best described as much better performance for some of the clients • otherwise, infra nodes facilitate much faster handshake due to prefetch ◦ 3-way handshakes inevitably infer additional cost • side note ① already implemented and tried on Android and RPi • side note ➁ the proposal can be used as a component in a blockchain-based security at network edge01 01 M.Zhanikeev ”The Last Man Standing Technique for Proof-of-Location in IoT Infrastructures at Network Edge” Wireless Comm. and Mobile Comp. (2019) Marat Zhanikeev – maratishe@gmail.com — PDF: bit.do/190806A Method for Cloud-Assisted Secure Wireless Grouping of Client Devices at Network Edge 8/9 8/9
  • 10. That’s all, thank you ... Marat Zhanikeev – maratishe@gmail.com — PDF: bit.do/190806A Method for Cloud-Assisted Secure Wireless Grouping of Client Devices at Network Edge 9/9 9/9