An IoT Endpoint System-on-Chip for Secure and Energy-Efficient Near-Sensor Analytics

Article, Preprint English OPEN
Conti, Francesco; Schilling, Robert; Schiavone, Pasquale Davide; Pullini, Antonio; Rossi, Davide; Gurkaynak, Frank Kagan; Muehlberghuber, Michael; Gautschi, Michael; Loi, Igor; Haugou, Germain; Mangard, Stefan; Benini, Luca;
(2016)
  • Journal: IEEE Transactions on Circuits and Systems I: Regular Papers,volume 64,issue 9,pages2,481-2,494 (issn: 1549-8328, eissn: 1558-0806)
  • Publisher copyright policies & self-archiving
  • Related identifiers: doi: 10.1109/tcsi.2017.2698019
  • Subject: approximate computing | parallel architectures | neural networks | Computer Science - Learning | encryption | Internet of Things | feature extraction | Computer architecture | Electrical and Electronic Engineering | Computer Science - Hardware Architecture | Computer Science - Neural and Evolutionary Computing | low-power electronics | Computer Science - Cryptography and Security

Near-sensor data analytics is a promising direction for internet-of-things endpoints, as it minimizes energy spent on communication and reduces network load - but it also poses security concerns, as valuable data are stored or sent over the network at various stages of ... View more
  • References (70)
    70 references, page 1 of 7

    [1] F. Bonomi, R. Milito, J. Zhu, and S. Addepalli, “Fog Computing and Its Role in the Internet of Things,” in Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, ser. MCC '12. New York, NY, USA: ACM, 2012, pp. 13-16. [Online]. Available: http://doi.acm.org/10.1145/2342509.2342513

    [2] H. Kumarage, I. Khalil, A. Alabdulatif, Z. Tari, and X. Yi, “Secure Data Analytics for Cloud-Integrated Internet of Things Applications,” IEEE Cloud Computing, vol. 3, no. 2, pp. 46-56, Mar 2016.

    [3] R. Khan, S. U. Khan, R. Zaheer, and S. Khan, “Future Internet: The Internet of Things Architecture, Possible Applications and Key Challenges,” in 2012 10th International Conference on Frontiers of Information Technology, Dec. 2012, pp. 257-260.

    [4] Z. K. Zhang, M. C. Y. Cho, C. W. Wang, C. W. Hsu, C. K. Chen, and S. Shieh, “IoT Security: Ongoing Challenges and Research Opportunities,” in 2014 IEEE 7th International Conference on Service-Oriented Computing and Applications, Nov. 2014, pp. 230-234.

    [5] D. Dinu, Y. Le Corre, D. Khovratovich, L. Perrin, J. Grossscha¨dl, and A. Biryukov, “Triathlon of Lightweight Block Ciphers for the Internet of Things.” IACR Cryptology ePrint Archive, vol. 2015, p. 209, 2015.

    [6] A. Krizhevsky, I. Sutskever, and G. E. Hinton, “ImageNet Classification with Deep Convolutional Neural Networks,” in Advances in Neural Information Processing Systems 25, F. Pereira, C. J. C. Burges, L. Bottou, and K. Q. Weinberger, Eds. Curran Associates, Inc., 2012, pp. 1097- 1105.

    [7] L. Cavigelli, M. Magno, and L. Benini, “Accelerating Real-time Embedded Scene Labeling with Convolutional Networks,” in Proceedings of the 52Nd Annual Design Automation Conference, ser. DAC '15. New York, NY, USA: ACM, 2015, pp. 108:1-108:6.

    [8] R. Girshick, J. Donahue, T. Darrell, J. Malik, and U. C. Berkeley, “Rich Feature Hierarchies for Accurate Object Detection and Semantic Segmentation,” in Proceedings of 2014 IEEE Conference on Computer Vision and Pattern Recognition, 2014, pp. 580-587.

    [9] G. E. Dahl, D. Yu, L. Deng, and A. Acero, “Context-Dependent PreTrained Deep Neural Networks for Large-Vocabulary Speech Recognition,” IEEE Transactions on Audio, Speech, and Language Processing, vol. 20, no. 1, pp. 30-42, 2012.

    [10] K. He, X. Zhang, S. Ren, and J. Sun, “Deep Residual Learning for Image Recognition,” arXiv:1512.03385 [cs], Dec. 2015.

  • Similar Research Results (1)
  • Related Organizations (1)
  • Metrics
Share - Bookmark