Context-Aware_Intelligence_in_Resource-Constrained_IoT_Nodes_Opportunities_and_Challenges
Context-Aware_Intelligence_in_Resource-Constrained_IoT_Nodes_Opportunities_and_Challenges
Intelligence in Resource-
Constrained IoT Nodes:
Opportunities and
Challenges
Baibhab Chatterjee Shreyas Sen
Purdue University Purdue University
March/April 2019 Copublished by the IEEE CEDA, IEEE CASS, IEEE SSCS, and TTTC 2168-2356/19©2019 IEEE
7
Authorized licensed use limited to: Tampere University. Downloaded on December 30,2022 at 23:15:54 UTC from IEEE Xplore. Restrictions apply.
SI: Survey
8 IEEE Design&Test
Authorized licensed use limited to: Tampere University. Downloaded on December 30,2022 at 23:15:54 UTC from IEEE Xplore. Restrictions apply.
3) Security: IoT systems envision automatic dis-
covery and support for a new target device without
human intervention [6], [7], which immediately
raises concerns on the security and privacy aspects of
the network. With the limited resources and latency
constraints, proper authentication and/or authoriza-
tion mechanisms become all the more challenging,
as the devices with fewer resources often tend to sac-
rifice security for lower energy consumption.
4) Context and context-based adaptability: To
optimize the performance of the individual nodes,
specific contexts/modes need to be defined as dis-
cussed in the previous section, with a proper switch- Figure 2. IoT ecosystem and its specific
ing arrangement between modes for adaptability. challenges [4].
The definition of context, as will be discussed later,
is highly application dependent, and therefore the International Telecommunication Union, IoT is
implementation of context-based adaptability would a vision that ensures “from anytime, anyplace
be different for every application and either needs to connectivity for anyone—we will now have connec-
be decided beforehand by the designer or learned tivity for anything.”
on the fly by the system. 2) Machine intelligence: Machine intelligence
5) Scalability and reconfigurability: In addition, is usually associated with Machine learning (ML),
the IoT ecosystem should be capable of handling a which is defined in [11] as “the adoption of com
variable number of nodes due to the mobility and putational methods for improving machine perfor-
dynamic properties of the devices, and the hardware mance by detecting and describing consistencies
and software implementations should be scalable and patterns in training data.” In view of the resource-
to a large population of devices. It is important to constrained IoT (RC-IoT) nodes, however, intelligence
note that the previously described challenges also or edge intelligence refers to the process of context
create asymmetry among the nodes in the network, discovery and assessment, which is imperative in the
as there could be a need for communication b etween realization of context-aware, adaptive techniques and
two devices with unequal resources and capabili- strategies (hardware/algorithmic/learning-based) for
ties. Indeed, IoT has a communication bottleneck in sensing, computing, and communication in the con-
the uplink, as typical IoT applications (smart sens- strained environment.
ing, wearable devices, healthcare, etc.) involve up- 3) Resource: Adopting the generic, all-encom-
loading the collected data from multiple sensors to a passing definition [12], a resource is defined as “any
single base station [5]. This asymmetry can be object which can be allocated within a system.”
optimally leveraged with a high-level goal to reduce For IoT systems, the most important resources are
the energy consumption of the overall system, as will memory (for storage), energy (for battery lifetime),
be explained in the following sections. compute c apability (for computation), and network
bandwidth (for communication). Depending on the
Common terminologies used throughout available memory, RC-IoT devices are categorized
the article into Class-0, Class-1, and Class-2 devices as shown
1) IoT: Small-scale developments of internet- in Table 1 [13], with Class-0 devices having the most
connected devices were materialized as early as stringent constraints.
1982, when researchers at Carnegie Mellon Universi- 4) Context and context awareness: The notion of
ty deployed a Coke vending machine with an online context-aware computing was first introduced by Schilit
inventory [8]. Mark Weiser’s famous 1991 paper on and Theimer [14]. Although many definitions exist for
ubiquitous computing [9] envisioned the concept of context and context awareness, the one provided by
a large scale implementation, and the term Internet Abowd et al. [15] is widely accepted as a concrete
of Things was coined by Ashton in a presentation at definition of context based on the five Ws (who,
Proctor and Gamble in 1999 [10]. According to the what, where, when, and why). As has been argued
March/April 2019
9
Authorized licensed use limited to: Tampere University. Downloaded on December 30,2022 at 23:15:54 UTC from IEEE Xplore. Restrictions apply.
SI: Survey
Intelligent sensing
Compressed-domain signal acquisition
Compressed-domain sensing/compressive sens-
ing (CS) [22], [23] is a mathematical tool in sig-
nal processing that defies the Shannon–Nyquist
sampling theorem by sampling a sparse signal at
a rate lower than the Nyquist paradigm and still
being able to reconstruct the signal with negligi-
ble errorrate (Figure 3). Since its inception, CS
has found m ultiple applications including image
processing [24], m edical imaging [25], RADAR
technology [26], in-sensor analytics [27], gesture
recognition [28], [29], and healthcare [30]. CS
algorithms assume that the signal to be sampled
has a sparse representation, and it was shown that
sparse signals with randomly [from independent
and identically distributed (i.i.d) Gaussian dis-
tribution] undersampled data can be recovered
with a low error by formulating it as an optimi-
Figure 3. Nyquist rate sampling/sensing versus zation problem. Hence, the advantage of CS is
compressive sensing. twofold: 1) CS allows a lower sampling rate that
10 IEEE Design&Test
Authorized licensed use limited to: Tampere University. Downloaded on December 30,2022 at 23:15:54 UTC from IEEE Xplore. Restrictions apply.
reduces the power consumption in the analog-to-
digital converter (ADC) and clock generation
circuitry, and 2) compression creates a smaller
amount of data with rich information-content that
reduces the burden on the subsequent processing
and communication modules. Since many of the
naturally occurring signals such as sound, visual
image, or seismic data can be represented in the
sparse form [31], it is possible to leverage the supe-
rior energy efficiency of CS in an IoT scenario. Two
comprehensive reviews on CS can be found in [31]
and [32].
To mathematically represent CS more clearly,
let us assume that the orthogonal basis {ψ i} n span
i=1
the n-dimensional real space ℝn. Then, any signal
x ∈ R ncan be represented by matrix multiplication
of the matrix ψ with the elements of a sparse vector
n
S = [S1, S2, S3, ..., Sn]T ∈ Rn such that x = ∑ i=1 ψ i Si . If
the vector S has only k ≪ n nonzero entries, then the
signal x is said to be k-sparse, and ψ is called the spar- Figure 4. CS: creation of an m × 1 meas-
sifying/representation matrix for x. For CS, the n × 1 urement vector from an n × 1 signal of
input signal x is pre-multiplied by an m × n sensing interest (m < n).
matrix Φ to get an m × 1 compressed signal y, where
m < n and the ratio (n /m) is termed as the com- Amaravati et al. [33] exploit CD data processing,
pression factor. This is represented by the following which allows trigger detection with significantly
equation and is shown in Figure 4 lower power and computational requirements. This
y = Φx = Φ ψ S.
(1)
__
If the coherence (correlation) μ(Φ,ψ) = √n max
|Φ j , ψ i| (where 1 ≤ i ≤ n and 1 ≤ j ≤ m with Φ
j being
the jth row of Φ) is low, it can be proved that fewer
samples are required to reconstruct the signal [23].
March/April 2019
11
Authorized licensed use limited to: Tampere University. Downloaded on December 30,2022 at 23:15:54 UTC from IEEE Xplore. Restrictions apply.
SI: Survey
12 IEEE Design&Test
Authorized licensed use limited to: Tampere University. Downloaded on December 30,2022 at 23:15:54 UTC from IEEE Xplore. Restrictions apply.
and vibration. Most of the energy content in these
signals is contained within extremely low frequen-
cies. The resolution and dynamic range (DR)
requirements for these applications, however, can
be small (e.g, temperature and humidity), large (e.g,
vibration), or variable based on environment (e.g,
radiation). Voltage-mode and current-mode ADC
designs in these scenarios become limited by the
ambient noise, supply rails, and power consump-
tion. Time-based ADCs, on the other hand, can uti-
lize the availability of time (since signals are of very
low frequency) in an energy-resolution scalable
manner as shown in [40]. For high-resolution require-
ments, the signal to be sensed is converted into an
equivalent frequency (using a resistive sensor and
a ring oscillator-based resistance to frequency con-
verter) and is simply observed (using a counter) for
a longer amount of time for a change in the aver-
age frequency. For low-resolution requirements, the Figure 8. Working principle of time-based ADC:
frequency is observed for a shorter amount of and higher resolution with more integration time and
then can be turned off (through duty cycling) for frequency/energy-resolution scalability as
saving energy. Figure 8 shows the working principle compared to traditional ADCs [40].
for the time-based ADC for detecting the difference
between a frequency f and its slightly modified ver-
sion f 2. The minimum amount of time for which we
need to observe/count the frequencies to detect the
difference is 1 ⁄ |f 1 − f 2| . Hence, for a smaller |f 1 − f 2|
(high-resolution requirement), the time to enable
the counter needs to be higher.
Even though this method ensures energy-
resolution scalability within a range, the resolution
cannot be made infinitely high by waiting for a
longer time. The ambient noise statistics, process,
voltage, and temperature (PVT) variation, and jitter
accumulation in the ring oscillator would limit the
achievable resolution, out of which jitter accumu-
lation is shown to be the dominant factor in [40]
in a controlled environment for radiation measure-
ment. This is demonstrated in Figure 9, where it is
shown that the scaled quantization error in measur-
ing a fixed frequency within a p redefined amount
of time goes down with the time of measurement.
However, the accumulated jitter from the ring oscil-
lator goes up with the total time of measurement.
If the slope of the linear plot of accumulated jitter Figure 9. Application of time-based ADC in radiation
versus m easurement time is k, then the achievable sensing [40] using a resistive floating gate sensor, a
resolution is shown to be limited to log2 (1/k) bits. three-stage differential ring oscillator, and counters.
The system in [40] achieves 18-bit resolution 18-bit resolution is achieved with 861-nW power,
with 861-nW power consumption (one reading per utilizing the tradeoffs among measurement time, bit
second) and 12-bit resolution with 9.04-nW power resolution, and accumulated jitter.
March/April 2019
13
Authorized licensed use limited to: Tampere University. Downloaded on December 30,2022 at 23:15:54 UTC from IEEE Xplore. Restrictions apply.
SI: Survey
consumption (one reading per second). The resolution analysis. However, even if a fictitious technology
can be improved by phase noise reduction techniques could potentially offer zero capacitances, a zero-
for the ring oscillator at the cost of a higher power. power receiver (Rx), and 100% efficiency for the trans-
mitter (Tx), (Ecomm/bit) would still be limited by the
Collaborative sensing free-space path loss (PLFS) of the physical channel,
Collaborative wireless sensor networks [41]–[43] which is given by Frii’s equation [48], [49] and shown
can sense an analog signal over a large-area test bed in the following:
14 IEEE Design&Test
Authorized licensed use limited to: Tampere University. Downloaded on December 30,2022 at 23:15:54 UTC from IEEE Xplore. Restrictions apply.
available at the RC-IoT device, partial or complete
processing of the sensor data (e.g., anomaly detection
and data compression for sensor readout, and object
localization and segmentation for video surveillance)
can take place in the leaf node itself. In this section,
we discuss the two most common ISA techniques for
RC-IoT devices, namely, anomaly/outlier detection
and data compression. The anomaly detection meth-
ods can enable selective (and immediate) data trans-
mission when an anomaly occurs in an otherwise nor-
mal sensor readout. As a healthcare example, selective
ECG data transmission with arrhythmia (anomaly) Figure 10. Comparison of communication and
detection would ensure immediate notification with computation energies (both theoretical and from
minimum communication cost. Data compression, standard implementations [52]) that show that
communication energy is ≈104 times more than
on the other hand, would ensure that the maximum
computation energy (with same number of bits).
amount of information between transmissions can be
Leakage power is ignored in the analysis.
stored in a small amount of on-sensor memory.
1) Anomaly/Outlier Detection: According to
the RC-IoT device itself for optimum computation-
Barnett and Lewis [69], “an outlier is an observation
communication tradeoff.
(or subset of observations) which appears to be in-
2) Data Compression: As shown in the “Intelligent
consistent with the remainder of that set of data.”
Computing Platforms” section, compressive-sensing
Figure 11 shows an example of anomaly in a sensor
techniques can result in significant energy savings
readout and explains the three classes of anomaly
in the ADC, on-sensor processor, and communica-
that are common in IoT devices and wireless sen-
tion modules. It must be noted that CS-ADC is still
sor networks [70]. It is to be noted that the p rimary an emerging technology and has not yet become an
difference between outlier detection and event
integral part of commercially available embedded
detection is the fact that an outlier is detected by frameworks. In-sensor data compression techniques
comparing the readings from the sensor with each on the IoT processor, however, have also shown
other and without any prior semantics that define the energy benefits by bringing down the communica-
trigger conditions of an anomaly. On the other hand, tion power. Some of the earliest reported works on the
trigger conditions for event detection are usually tradeoff between the raw data communication and
defined a priori, and the sensor readouts are com- the compressed data communication are from MIT’s
pared with that trigger condition to detect an event. Computer Science and Artificial Intelligence Labora-
Outlier detection algorithms utilize spatio- tory [72] and from CMU’s Odyssey Project [73]. Ref-
temporal correlations among the data points from the erence [73] used application-aware adaptation that
same node and/or neighboring nodes to distinguish trades off data quality with resource consumption
between normal operation and anomalies [70].
Table 2 shows some of the most common anomaly
detection techniques for wireless sensor networks
and IoT. These methods include both learning
(supervised and unsupervised)-based techniques
and algorithmic (statistics-based) techniques and
offer various orders of resource requirements and
accuracy. Some of the most recent works include a
hybrid statistical method from Twitter [71], which
has low latency and high accuracy but needs more
computational resources. Simplistic techniques such
as mean- and average-based statistical analysis [53], Figure 11. Example of anomaly in sensor
on the other hand, can be implemented easily on readout.
March/April 2019
15
Authorized licensed use limited to: Tampere University. Downloaded on December 30,2022 at 23:15:54 UTC from IEEE Xplore. Restrictions apply.
SI: Survey
Statistics-based 1) Gaussian Parametric 1) Spatiotemporal correlation for Gaussian Simplistic and can suffer
Estimation [53], 2) Non-Gaussian nonanomalous data, fixed thresholds from low accuracy
Parametric Estimation [54], 3) Kernel for anomaly detection, 2) anomalies
Density Estimation (non-parametric) are treated as SaS-distributed impulsive
[55], [56], and 4) histogram-based events, 3) no a priori PDF is assumed.
method (nonparametric) [57] Kernel density functions approximate
the PDF, and 4) works on histograms and
not on raw data (inherent compression—
reduced communication cost)
Nearest-Neighbor-based Euclidean distance [58] and dynam- Simple implementations for both Resource-extensive for
ic time warping methods [59] univariate and multivariate data multivariate data
Clustering-based Creates clusters based on raw data Can be employed to take care of incre- Resource-extensive for
and detects outliers that do not fall mental processing multivariate data, suffer
into any cluster [60] from the choice of an
appropriate cluster width
Classification-based 1) SVM approach [61], [62], 1) Maximally separated classes (one/two Computationally
2) Bayesian Network approach [63], class approach to reduce complexity, 2) intensive
[64], 3) long short term memory uses Bayesian Intuitions to predict anom-
(LSTM) [65]/hierarchical temporal alies, and 3) uses LSTM/HTM for time-
memory (HTM) [66] approach series data pattern of unknown length
with the help of an embedded OS. Reference [72] IoT devices include 1) principal component analy-
experimentally showed that the ratio of energy re- sis (PCA) ([75]–[77], which use lightweight PCA for
quired to transmit 1 bit is ≈480–1270 times higher than dimensionality reduction and data compression),
that of a 32-bit addition under varying channel condi- 2) coding by ordering ([78], where the data from one
tions. This means that a compression algorithm that node is shown to be encoded by the order at which
is able to remove more than 1 bit from a string of data other nodes in the same hierarchy communicate
would have energy benefits if the algorithm is equiv- with the parent node), 3) burst mode/pipelined tech-
alent to (or less than) 480 addition instructions. The niques ([79], where data are stored, packetized, and
standard compression algorithms explored in [72] transmitted in burst mode to remove redundancies
[such as bzip2/Burrows–Wheeler transform (BWT), and number of transmitter switch on/off), 4) frame
Lempel–Ziv–Welch (LZW), Lempel–Ziv–Oberhumer difference-based compression ([33] and [80] that
(LZO), and prediction by partial matching (PPMd)] store differences in consecutive frames for video
are much smaller than 480 additions, which means compression), and 5) distributed data compression
that any of these algorithms would be beneficial. [81] using conditional entropy encoding with corre-
However, the key limitation in an IoT implementa- lated data between two nodes that perform spatial
tion comes from the runtime memory requirement data compression through short-range communi-
for these algorithms, which is in tens of kilobytes for cation between the sensor nodes. For optimum re-
LZO to hundreds of kilobytes for BWT. This readily source utilization, this short-range communication
makes these algorithms infeasible for C0, C1, and can be a low-power communication scheme, such
C2 RC-IoT devices (referring to Table 1). More light- as MedRadio or HBC (for body area networks within
weight compression techniques, such as miniLZO a few meters), which consumes hundreds of micro-
and sensor LZW with mini cache (S-LZW-MC) [74], watts, or ANT/BTLE, which consumes a few milliwatts
require only 8.192 and 3.250 Kbytes memory, respec- to ≈10 mW when on, as will be shown in the next sec-
tively, and can be used in C2 and some C1 devices. tion. After spatial compression is done, we envision
Other important techniques for data compression in that the node with the highest amount of battery life
16 IEEE Design&Test
Authorized licensed use limited to: Tampere University. Downloaded on December 30,2022 at 23:15:54 UTC from IEEE Xplore. Restrictions apply.
Table 3. Comparison of state-of-the-art wireless techniques for IoT nodes [82].
Proximity HBC [84], NFC ZigBee BT/BTLE ANT WiFi LoRa WAN
comm. [83] [85]
Data rate 8–32 G 10’s of M 20–400 k 20–200 k 0.8–2.1 M 60 k 300 M (802.11 g), 200 k
(bps) 7 G (802.11ac/11d)
(or the node that is closest to the Rx) would take the [2]. The concept of Intra-PHY and Inter-PHY communi-
responsibility of sending the compressed data to larg- cation is presented in Figure 12a, where the switching
er distances, possibly through a high-power commu- of PHY is shown to occur based on communication
nication protocol such as LoRa WAN. distance (as an example of context), while the adap-
tation within a PHY is performed for optimum energy
Intelligent communication efficiency based on the operating conditions.
Continuous device scaling over the last few dec-
ades have resulted in cheap computation through Intra-PHY channel-adaptive radios
Moore’s law, and the ability to support higher data For Intra-PHY adaptation, the energy-performance
bandwidths has created cheap wireless commu- tunability knobs are dynamically optimized without
nication paradigms through Shannon’s law. How- changing the PHY. Traditional techniques of scal-
ever, the progress in battery technology has been ing the energy consumption over varying channels
relatively slower, making the available energy one involve adaptive modulation and coding [87], which
of the most sought after resources in modern IoT sys- increases the order of modulation (from QPSK to
tems, thereby motivating the research needs toward 16-QAM to 64-QAM) as the channel quality becomes
low-energy sensing, computation, and communica- better and corresponding error vectors become
tion. As supported by the analysis presented in [86] more and more manageable. Although this increases
and in the “Intelligent Computing Platforms” section, the spectral efficiency of overall transmission, the
the energy cost per bit for communication is 103–104 power consumption of the radio frequency (RF) FE
times higher than the energy cost of computation effectively remains constant. As shown in [88], 70%–
for raw data bits. In the vision of the truly intelligent 90% of the overall power in a low-power transceiver
IoT nodes presented in this article, most optimum (Tx+Rx) system is consumed in the Rx FE/Tx power
energy efficiencies are expected from the commu- amplifier (PA) and LO generation subsystems, and,
nication subsystems based on the specific operating hence, significantly more energy efficiencies can be
conditions/context (such as communication dis- obtained by dynamically scaling the FE power and
tance, channel conditions, latency, quality of ser- performance according to the application. Most of
vice requirements, data rate, battery conditions, and the research efforts in building channel-adaptive
process variation) when turned on. Table 3 shows designs are concentrated toward the Tx PA and
the state-of-the-art communication modalities avail- employ techniques such as digital predistortion, Tx
able for IoT devices, which range from 4-pJ/b prox- power control, envelope tracking, polar implemen-
imity communication for ≈1-mm distance to 1-µJ/b tation, and dynamic companding with PA bias con-
long-range (LoRaWAN) communication to ≈1 km. trol [89], [90]. Rx circuit-level adaptation techniques
We readily notice the possibility of optimizing the include automatic gain control and field-program-
communication framework within a modality and mable low-noise amplifiers (LNA) with power-linear-
among different modalities, hereinafter called Intra- ity tradeoff [91]. Some of the recent advancements
PHY and Inter-PHY communication as explained in include an adaptive DR and BW Rx [92] that use a
March/April 2019
17
Authorized licensed use limited to: Tampere University. Downloaded on December 30,2022 at 23:15:54 UTC from IEEE Xplore. Restrictions apply.
SI: Survey
Figure 12. Vision for adaptive communication in IoT [2]. (a) Context-aware communication PHY,
which can adapt to its surroundings to perform more efficiently with experience by self-learning
the optimum operating points. Adaptation can be intra-PHY or inter-PHY based on context, indi-
cating the need for incorporating incorporating multiple adaptive PHYs per device. (b) Today’s
worst case design philosophy. Circuits/systems are generally designed to handle the worst case
conditions plus a guard band. This leads to significant loss in energy efficiency. (c) Dynamically
channel-adaptive radio (ViZOR). (d) Process-variation tolerant ViZOR (Pro-ViZOR). (e) Self-learning
energy-scalable wireless systems.
programmable gain amplifier (PGA) and an adaptive FE to dynamically optimize power and performance.
intermediate-frequency filter. Discrete-time spectrum If the tuning knobs are designed in an orthogonal
sensing was utilized in [93] to modify the modes of an manner (i.e., operation of one knob will modify only
Rx filter to achieve adaptive interference rejection. one specification out of linearity, gain, and NF of the
An interference-aware adaptive ADC was shown to FE), the controller was shown to achieve ≈3× better
adapt itself to a low-power mode in absence of any energy savings for best-case channel conditions [98],
blocker using a simple built-in spectrum analyzer [99] and can be optimized for either maximum data-
[94]. A channel adaptive ADC and a successive- rate (data-priority) or minimum energy (energy-pri-
approximation-register-based time-to-digital con- ority) for any channel [100], [101]. However, it was
verter (TDC) was shown for a 28-Gbps wireline sys- also reported that the adaptation control law, which
tem in [95]. These implementations have shown was fixed during design time, cannot work optimally
benefits in the standalone adaptive subsystems under manufacturing process variations. References
(such as the LNA, PGA, or TDC). However, it must [90] and [102] solve this problem by detecting the
be noted that, unlike a Tx where most of the power process corner of the device under consideration
is consumed in the PA, the Rx power consumption is using built-in process sensors and updating the
more distributed among different blocks; hence, the control law accordingly during postmanufacturing
entire Rx should be considered as a unit for power- tuning. This technique (i.e., Pro-ViZOR) is shown in
performance tradeoff analysis. It was shown in [96] Figure 12d and requires high design-time effort
and [97] that the best-case energy-savings in an Rx to cover the entire process-corner space for the
FE can be obtained by distributing the instantane- power-performance adaptation [103].
ous performance-slack optimally across different
building blocks in the Rx. A precharacterized con- Intra-PHY adaptation: Self-learning radios
trol law (defined during design) was employed to The high design-time complexity of Pro-ViZOR
achieve multidimensional adaptation of multiple Rx was significantly reduced by employing self-learning
components with virtually zero-margin (ViZOR) Rx wireless systems (Figure 12e) that gradually learn
operation. Figure 12c shows the operation of ViZOR the adaptation control law when the device is in idle
using design-time tuning knobs and sensors in the Rx condition [104]. Figure 13 shows how the learning
18 IEEE Design&Test
Authorized licensed use limited to: Tampere University. Downloaded on December 30,2022 at 23:15:54 UTC from IEEE Xplore. Restrictions apply.
algorithm populates the power-performance channel
space during an intermediate time instant and at
the final time instant when learning is complete.
Figure 14 presents the average power consumption
of such a self-learning channel-adaptive wireless sys-
tem over multiple days to include various channel
conditions. The initial overhead is due to the need
for controlled on-line experiments during real-time
operation that gathers useful data points for learn-
ing the control law. It is shown that this system
becomes increasingly energy-efficient with experi-
ence [105]–[107]. When the power consumption
saturates with the learning, the overhead of con-
trolled experiments is removed (day 29 in Figure 14).
March/April 2019
19
Authorized licensed use limited to: Tampere University. Downloaded on December 30,2022 at 23:15:54 UTC from IEEE Xplore. Restrictions apply.
SI: Survey
Figure 15. Emerging PHY example 1. (a) mm-scale proximity communication [83].
(b)–(c) Specific challenges (SRF of the interface and crosstalk). (d)–(e) Their solutions
[integrating dual data-rate (DDR) Rx that creates a notch at the SRF to mitigate ringing
and alternating rectangular differential couplers to mitigate crosstalk]. (f) Measurement
results showing BER of <10−12.
Figure 16. Emerging PHY example 2. (a) Broadband HBC is affected by interference from the envi-
ronment. (b) IR-HBC using time-domain signal-interference separation [84], enabled by 1) capacitive
termination (offers larger frequency range for broadband application) and 2) integrating DDR Rx for
interference rejection using signal-interference separation and duty-cycle adaptation. In comparison
with state-of-the-art HBC transceivers, broadband IR-HBC achieved 18× better energy efficiency
(6.3 pJ/b), which is ≈100× better than traditional WBAN.
20 IEEE Design&Test
Authorized licensed use limited to: Tampere University. Downloaded on December 30,2022 at 23:15:54 UTC from IEEE Xplore. Restrictions apply.
nature. An integrating receiver (Rx) with a tunable
notch placed at the SRF can solve this problem as
illustrated in [83]. The other key challenge in this
technique is the crosstalk between parallel chan-
nels, which is solved using alternating rectangular
differential couplers that employ inherent passive
crosstalk cancelation. As shown in Figure 15e, the
crosstalk from 1+ and 1− to 2− is equal and opposite,
and hence, cancels each other, while the crosstalk
from 1− to 3+ and 3− are equal and therefore can-
cel each other differentially. Using these two tech- Figure 17. Vision for context-aware adaptive PHY. The
niques, Thakkar et al. [83] successfully demonstrate IoT node needs to store minimal information on near-
32-Gbps data transfer with bit error rate (BER) <10 −12 by devices (last transmit time, mode information, and
using four parallel channels up to 0.8-mm distance battery life) along with its own remaining battery life.
and 4-pJ/b energy efficiency (which is ≈100× lower In case of an event/anomaly detection, if the sensor
than contemporary mm-wave gigabits-per-second storage is full (even with data compression) or there
implementations [109], [110]). is a transmit timeout, the node would then asses the
2) Interference-Robust Human Body Communica- context and turn the corresponding transmit subsys-
tion (IR HBC): Many future healthcare [111], human– tem on. If a change in context requires change in Tx
computer interaction [112], [113], and n euroscience modality, it will be taken care of by the context dis-
applications rely on the Internet of Body (IoB), to covery/assessment block, which can employ a struc-
connect wearable and implantable devices on, in, tured algorithm/learning framework.
and around the human body, which are typically in-
terconnected though WBAN, c onsuming upward of 1 efficiencies, channel loss, data rates, and distance
nJ/b. Using the human body itself as a low-loss broad- support are incorporated in the same transceiver.
band communication medium [114]–[116], e nergy Figure 17 presents the vision for a context-aware
efficiencies [84], [117] similar to the proximity com- adaptive PHY that involves the following:
munication, or wireline input–output (IO) [118]–[120]
achieve high physical security [85]. Capacitive ter- • assessment of the need for communication
mination along with voltage-mode signaling allows based on event/anomaly detection (in-sensor
broadband communication in which low loss and ab- analytics), memory (storage) buffer information,
sence of upconversion and downconversion give rise and channel quality information,
to the extreme energy efficiencies. The key challenge • context discovery and assessment based on
in broadband HBC comes from the antenna effect in battery life of current and nearby devices (helps
the human body that picks up unwanted interferenc- to understand which device has the most
es that corrupt the signal. An interference detection resources for long-range high-power communica-
and rejection loop using an adaptive notch [121], tion, if required),
[122] at the integrating Rx has enabled the lowest en- • last transmit time and modality of current and
ergy (6.3 pJ/b for 30-Mbps data transfer through the nearby devices (helps to understand the spatial
body, which is ≈100× lower than traditional WBAN), statistics of the data and the sensors), Rx distance
as well as the most interference robust (can tolerate and location (e.g., whether both the Tx and Rx
−30-dB signal-to-interference ratio) HBC transceiver devices are on the human body),
built to date [84], as shown in Figure 16. • the possiblity of spatial data compression based
on the information from nearby devices (if suc-
Inter-PHY adaptation: Communication with cessful, this will require long-range data commu-
context switching nication for only one node among a cluster of
Like humans, a truly intelligent RC-IoT node sensors), along with any other information from
needs knowledge (context-awareness) and adapta- the cloud.
tion according to the situation (reconfigurability).
Inter-PHY context-aware adaptation is most effective Equipped with all the knowledge, the RC-IoT device
when multiple PHYs with different orders of energy can now adapt itself to the context and transmit
March/April 2019
21
Authorized licensed use limited to: Tampere University. Downloaded on December 30,2022 at 23:15:54 UTC from IEEE Xplore. Restrictions apply.
SI: Survey
22 IEEE Design&Test
Authorized licensed use limited to: Tampere University. Downloaded on December 30,2022 at 23:15:54 UTC from IEEE Xplore. Restrictions apply.
condition, the digital controller’s power also scales,
leading to an improved current efficiency (Figure 19c).
The overall design achieves >80% peak-current
efficiency over 0.45–1.14 V, with 0.1–4.60-mA load
current range.
Energy management for intermittently Figure 19. (a) Digital LDO with autonomous
powered devices adaptation of sampling CLK that offers a wide DR
Since an IoT device can employ intermittent [124]. (b) Chip micrograph. (c) Current efficiencies
sensing, computation, and communication, which with and without adaptation.
is supported from small-energy sources (or from
harvested energy in extremely resource-constrained dynamically and intelligently chosen depending
scenarios), energy management considerations for on information content, accuracy targets, and wire-
intermittent operation become extremely important, less channel conditions. The computing platform,
and lightweight software procedures for control flow,
optimal checkpointing, concurrence, and data con-
sistency [127], [128] need to be developed. This along
with improved techniques of high-dynamic-range,
adaptive PDNs is believed to be one of the major
research directions for context-aware RC-IoT devices.
Intelligent cross-layer
adaptive systems
System-level IoT designs can incorporate more
than one approach discussed previously to optimally
enhance machine intelligence and achieve perfor-
mance improvement/energy reduction, as shown in
[129] and [130].
Cao et al. [129] proposed a camera-based wireless
sensor node with a self-optimizing end-to-end com-
putation and communication design, targeted for Figure 20. (a) Hybrid LDO with SMC for wide DR
surveillance applications. The demonstrated system [126]. (b) Chip micrograph. (c) Current efficiencies
supports multiple feature-extraction and classifi- with and without adaptation of sampling frequency
cation algorithms, tunable processing depth (PD), (Fs). SMC(R) is an SMC mode with reset for faster
and PA gain. Minimum-energy operating point is droop recovery.
March/April 2019
23
Authorized licensed use limited to: Tampere University. Downloaded on December 30,2022 at 23:15:54 UTC from IEEE Xplore. Restrictions apply.
SI: Survey
24 IEEE Design&Test
Authorized licensed use limited to: Tampere University. Downloaded on December 30,2022 at 23:15:54 UTC from IEEE Xplore. Restrictions apply.
the occupancy of a particular region in a building
is dependent on its neighboring regions. For exam-
ple, consider a typical floor-plan of a building with
three rooms, A, B, and C. The occupancy of room A is
dependent on room B if a door between A and B is
available and people can walk from B to A, as shown
in Figure 24a and vice versa. This motivates the pro-
posed dynamic HVAC control strategy, targeting mini-
mized latency of occupancy detection based on a col-
laborative scheme among neighboring HVAC sections.
Consider a network of sensors deployed as shown
in Figure 24a. The sensor node at B estimates the Figure 23. Demonstration of the algorithm
presence of an occupant. If an occupant is detected, presented in [130].
then it further tracks the occupant via difference of
in between the network layer and application layer,
frames and estimation of the d irection of motion.
which is dedicated toward security features and
The direction of motion is sent to the backend,
performs authentication using preshared secrets,
which resolves the potential adjoining HVAC areas
keys, and passwords. However, this layer can also suf-
that can be subsequently occupied. In this example,
fer from DoS attacks and malicious insider attack, as
an occupant moving from B toward A will allow the
illustrated in [137], [155], and [156]. Moreover, the big-
backend to send an alert to the sensor node at A.
data problem in IoT (network exhaustion due to inun-
Now, this sensor node increases its sampling rate to
dation of data) has resulted in modem IoT architects
reduce the latency of detection. The effective sam- to move to a five-layer architecture with added secu-
pling interval, Teff, is reduced as shown in Figure 24b. rity and data-processing capabilities [3], [157]–[163].
References [129] and [130] aim at adaptively CISCO currently defines a seven-layer IoT structure
minimizing energy expenditure of IoT devices in as shown in [135]. In this discussion, we shall limit
a time-varying environment (wireless condition, ourselves to only the perception layer, and hence, a
object moving direction, etc.) while maintaining detailed description of the advanced layer models
decent performance (accuracy, BER, detection (4, 5, and 7 layers) is out of the scope of this article.
latency, etc.) through distributed control on the fly
or centralized control at the backend.
Traditional techniques against
perception layer attacks
Security considerations for A large number of security breaches in RC-IoT
RC-IoT devices occur in the perception layer which is most vul-
From an implementation point of view, the IoT nerable to privacy attacks due to its resource
architecture is usually divided into 3, 4, 5 or 7 layers constraints. The most common security measures
as shown in [131]–[135]. References [132]–[134] against attacks on the perception layer are listed in
demonstrated the three-layer architecture as shown
in Figure 25. The details of the three layers and
their security concerns are presented in Table 4.
These security concerns involve data confidential-
ity, integrity, and availability (commonly known as
the CIA triad [136]), which are related to privacy,
correctness, and authentication, respectively. Con-
strained IoT devices (most notably, CO devices such
as small biosensors) have limited resources and can,
hence, support only a subset of the intended secu-
rity features. This makes these devices extremely
prone to privacy attacks [136]–[138]. Figure 24. Illustrative representation of (a) simple
In addition to these three layers, today’s IoT sensor network with interdependence and
devices employ a fourth layer called support layer, (b) demonstration of event-driven sampling [130].
March/April 2019
25
Authorized licensed use limited to: Tampere University. Downloaded on December 30,2022 at 23:15:54 UTC from IEEE Xplore. Restrictions apply.
SI: Survey
26 IEEE Design&Test
Authorized licensed use limited to: Tampere University. Downloaded on December 30,2022 at 23:15:54 UTC from IEEE Xplore. Restrictions apply.
Table 4. Details and security considerations of the three-layer IoT architecture [137].
Perception/sensor Collecting information from sensors/ Eavesdropping [137], Node Most attacks are on
devices Capture [139], Add Malicious Node [137], data confidentiality and
Replay Attack [140], Timing Attack [141] integrity [137], [138]
Network/transmission Connects devices to each Denial of Service (DoS) [137], Most attacks are on data
other and to higher layer through Man-in-the-Middle Attack [142], Storage integrity [137]
wired/wireless media Attack [137], Exploit Attack [137]
Application Has the responsibility to Cross-site Scripting [137], Malicious Code Most attacks are on data
extend sensor-specific services to Attack [137] availability [137]
applications/clients
HMAC [143], [144] Hash Functions along with Encryp- Employed to maintain data Key-hacking is possible through invasive/
tion Algorithms (SHA, MD5, CBC etc) integrity semi-invasive/software/side-channel
are used attacks
Public Key Base station communicates with the More secure than passwords —Ma- 1) Key hacking: The private key needs to
Infrastructure (PKI) devices to get the public key while licious user needs both the secret be protected and 2) not very scalable
protocols [145], [146] the private keys are stored separately private key and a passphrase to
pose any threat
Open Authentication Client-server-based system where Access is granted in a secure way 1) Vulnerable to cross-cite-recovery-
(OAuth/OAuth 2.0) server has the list of authorized forgery (CSRF) and
[147]–[149] clients. Everyone can request for ac- 2) implementation becomes cumbersome
cess, but server grants access tokens as the network grows since the user needs
only to authorized clients to authenticate each device
Mutual authentication Client-server-based system where Both client and server certificates Requires a PKI with high cost of initial
[150], [151] Client creates a request and an are verified deployment
HMAC-SHA signature, and sends
both the request and signature
to server. The server retrieves the
HMAC-SHA signature using a secret
access key and verifies the signature
with client’s signature
Lightweight cryptogra- Cryptographic Keys are used to Plain text to cipher text by using Hard to implement for Class-0 devices with
phy [131], [152] convert messages symmetric, asymmetric keys and stringent resource constraints
hash functions
Embedded security Provides secure secondary storage, Provides a complete security Extremely resource-intensive
framework [153], [154] runtime environment and secure package
memory management
March/April 2019
27
Authorized licensed use limited to: Tampere University. Downloaded on December 30,2022 at 23:15:54 UTC from IEEE Xplore. Restrictions apply.
SI: Survey
28 IEEE Design&Test
Authorized licensed use limited to: Tampere University. Downloaded on December 30,2022 at 23:15:54 UTC from IEEE Xplore. Restrictions apply.
utilized as an extremely useful security feature for RC-
IoT devices for a small-to-medium-scale smart system.
March/April 2019
29
Authorized licensed use limited to: Tampere University. Downloaded on December 30,2022 at 23:15:54 UTC from IEEE Xplore. Restrictions apply.
SI: Survey
30 IEEE Design&Test
Authorized licensed use limited to: Tampere University. Downloaded on December 30,2022 at 23:15:54 UTC from IEEE Xplore. Restrictions apply.
tremendous potential for future. Online/incremental
learning is of paramount importance because of the
variations in the manufacturing process and oper-
ating conditions. By fully utilizing the capabilities of
devices, hardware, and algorithms together, the path
toward more efficient context-aware systems needs to
be paved.
March/April 2019
31
Authorized licensed use limited to: Tampere University. Downloaded on December 30,2022 at 23:15:54 UTC from IEEE Xplore. Restrictions apply.
SI: Survey
is possible, only one node in an RC-IoT cluster in the IoT environment, it is necessary to model the
would take the responsibility to communicate heterogeneity, resource constraints, and distribution
the compressed data to the upper level gateway/ of the IoT devices within the architecture in a struc-
cloud (possibly using a higher power modal- tured manner. CHT is an emerging tool to provide
ity like LoRa for long-range communication). such a modeling framework using behavioral game
Again, processing all the above information theory, and is based on bounded rationalities [5],
would require sophisticated learning algorithms [201], [202]. The theory of bounded rationalities
to be implemented in different hierarchical lev- ensures that each node in the network tries to find its
els of the IoT architecture which, by itself, is an best strategy, bounded by information from the lower
involved optimization problem. level nodes in the hierarchy, its own computational
• Energy management: As shown in the “Intelligent capacity, and time/resource available. CHT model
Energy Management” section, high-dynamic- (Figure 34) inherently takes care of the device het-
range and high-power conversion LDOs with low erogeneity in IoT as it considers the resources availa-
voltage droop/droop recovery time are one of the ble for each device separately. References [201] and
major requirements in a dynamic IoT scenario. [202] present further details of the CHT techniques,
High DR adaptation techniques such as sampling while [5] demonstrates an example of the CHT theory
frequency based reconfigurable LDOs [124] and in determining the type of learning algorithm (ML, SL,
SMC LDOs [126] have been explored. However, and RL) to be implemented on a particular IoT device
challenges due to checkpointing and data con- based on its resource constraints. It must be noted
sistency need to be looked into. Recent check- that though CHT would define a structure in the het-
pointing schemes such as the one shown in [128] erogeneous IoT hierarchy, such an algorithm cannot
have demonstrated improved latencies in a medi-
be implemented in C0 and possibly C1 devices. How-
um-to-high-resource device—though similar and
ever, the output of the algorithm can be passed on
more lightweight techniques need to be devel-
to the RC-IoT devices from higher level nodes which
oped for highly resource-constrained devices.
have higher computational power.
• Adaptive security: The RF-PUF [187] framework
shown in the “Learning Frameworks for RC-IoT IoT networks are different from traditional net-
Devices” section, along with low-level metal rout- works in view of their specific challenges in device
ing for the encryption core [174] for EM-SCA heterogeneity, resource constraints, context-variability,
resistance can be utilized as a baseline security and security, thereby necessitating adaptive solutions
feature at no additional power/area overhead in for resource-aware operation. In this article, we have
extremely resource-constrained C0 devices. Light- presented a broad review of the different areas that
weight implementation of ASNI/IVR [168], [170] need to be looked into for holistic, system-level
with minimal overhead should be placed as well resource optimization for RC-IoT devices in a network.
in C0 devices, while nodes with more relaxed con- Various techniques in sensing (compressed-domain
straints can benefit from implementations with sensing/energy-resolution scalable frequency-domain
better signature attenuation (consum-
ing higher power). These techniques
should also be augmented with one or
multiple traditional security features
such as hash-based message authen-
tication (HMAC) and mutual authen-
tication/OAuth based on the context
(application, importance of collected
data) and resources available, and can
be adaptive in nature.
32 IEEE Design&Test
Authorized licensed use limited to: Tampere University. Downloaded on December 30,2022 at 23:15:54 UTC from IEEE Xplore. Restrictions apply.
sensing), computation (in-sensor/edge analytics in the [7] C. Perera et al., “A survey on Internet of Things from
form of outlier detection and data compression), com- industrial market perspective,” IEEE Access, vol. 2,
munication (intra-PHY and inter-PHY adaptation with pp. 1660–1679, 2014.
low and high-power modalities), power management [8] The ‘Only’ Coke Machine on the Internet.
and security were analyzed, and the vision for a secure, Accessed: December 9, 2018 [Online]. Available:
context-aware, adaptive, resource-constrained but https://www.cs.cmu.edu/~coke/history_long.txt
intelligent IoT device was presented. However, numer- [9] M. Weiser, “The computer for the 21st century,”
ous challenges (in the form of system-level controller Scientific American, Sep. 1991.
design for adaptive architectures, reliability, security, [10] K. Ashton, That ‘Internet of Things’ Thing. Accessed:
latency limitations, intermittent powering/checkpoint- December 9, 2018. [Online]. Available: https://www.
ing and real-time/online learning) still exist in realizing rfidjournal.com/articles/view?4986
a full implementation of the concepts demonstrated, [11] P. Langley and H. A. Simon, “Applications of machine
indicating future research directions toward building learning and rule induction,” Commun. ACM, vol. 38,
smarter and more adaptive systems. In that context, pp. 54–64, Nov. 1995.
the goal in this article has been to identify the current [12] A. S. Tanenbaum and A. S. Woodhull, Operating Syst.
trends, foundations and components of the envisioned Design and Implementation, Upper Saddle River,
RC-IoT devices to enable the design of more efficient NJ: Prentice-Hall, 2005, 3rd ed.
connected intelligent systems in the future. [13] C. Bormann, M. Ersue, and A. Keranen, Terminology
for Constrained-node Netw., RFC 7228. Accessed:
Acknowledgments January 21, 2019. [Online]. Available: https://www.rfc-
This work was supported in part by the Semicon- editor.org/info/rfc7228
ductor Research Corporation (SRC) under Grant [14] B. N. Schilit and M. M. Theimer, “Disseminating active
2720.001 and in part by the National Science Foun- map information to mobile hosts,” IEEE Netw., vol. 8,
dation (NSF) CRII Award under Grant CNS 1657455. pp. 22–32, Sep. 1994.
[15] G. D. Abowd et al., “Toward a better understanding
References of context and context-awareness,” in Proc. 1st Int.
[1] R. Lloyd, Mobile Traffic From Wearables Explodes Symp. Handheld Ubiquitous Comput.’99, London, UK:
as the Internet of Everything Accelerates. Accessed: Springer-Verlag, 1999, pp. 304–307.
December 5, 2018. [Online]. Available: http://blogs. [16] A. K. Dey, G. D. Abowd, and D. Salber, “A conceptual
cisco.com/news/mobile-traffic-from-wearables- framework and a toolkit for supporting the rapid
explodes-as-the-internet-of-everything-accelerates prototyping of context-aware applications,” Hum.-
[2] S. Sen, “Invited: Context-aware energy-efficient Comput. Interact., vol. 16, pp. 97–166, Dec. 2001.
communication for IoT sensor nodes,” in Proc. 2016 [17] P. J. Brown, “The STICK-e document: A framework for
53nd ACM/EDAC/IEEE Design Autom. Conf., creating context-aware applications,” in Electron. Pub.,
Jun. 2016, pp. 1–6. pp. 259–272, 1996.
[3] J. Gubbi et al., “Internet of Things (IoT): A vision, [18] D. Franklin and J. Flachsbart, All Gadget and No
architectural elements, and future directions,” Future Representation Makes Jack a Dull Environment, 1998.
Gener. Comput. Syst., vol. 29, no. 7, pp. 1645–1660, [19] T. Rodden et al., “Exploiting context in HCI design for
2013. mobile systems,” in Proc. Workshop Hum. Comput.
[4] F. Delicato, P. Pires, and T. Batista, “Resource Interact. Mobile Dev., 1998.
management for Internet of Things,” in The Resource [20] R. Hull, P. Neaves, and J. Bedford-Roberts, “Toward
Management Challenge in IoT, Cham, Switzerland: situated computing,” in Proc. Digest Papers First Int.
Springer, 2017. Symp. Wearable Comp., Oct. 1997, pp. 146–153.
[5] T. Park, N. Abuzainab, and W. Saad, “Learning how [21] K. Henricksen and J. Indulska, “Developing context-
to communicate in the Internet of Things: Finite aware pervasive computing applications: Models and
resources and heterogeneity,” IEEE Access, vol. 4, approach,” Pervasive Mob. Comput., vol. 2, pp. 37–64,
pp. 7063–7073, 2016. Feb. 2006.
[6] C. Perera et al., “Context aware computing for the [22] E. J. Candes and T. Tao, “Decoding by linear
Internet of Things: A survey,” IEEE Commun. Surveys programming,” IEEE Trans. Inf. Theory, vol. 51,
Tuts., vol. 16, pp. 414–454, First 2014. pp. 4203–4215, Dec. 2005.
March/April 2019
33
Authorized licensed use limited to: Tampere University. Downloaded on December 30,2022 at 23:15:54 UTC from IEEE Xplore. Restrictions apply.
SI: Survey
[23] D. L. Donoho, “Compressed sensing,” IEEE Trans. Inf. [37] J. D. Roose et al., “Flexible and self-adaptive sense-
Theory, vol. 52, pp. 1289–1306, Apr. 2006. and-compress for submicrowatt always-on sensory
[24] M. F. Duarte et al., “Single-pixel imaging via recording,” in ESSCIRC 2018—IEEE 44th Euro. Solid
compressive sampling,” IEEE Signal Process. Mag., State Circ. Conf., pp. 282–285, Sep. 2018.
vol. 25, pp. 83–91, Mar. 2008. [38] M. Trakimas and S. R. Sonkusale, “An adaptive
[25] M. Lustig, D. Donoho, and J. M. Pauly, “Sparse MRI: resolution asynchronous ADC architecture for
The application of compressed sensing for rapid MR data compression in energy constrained sensing
imaging,” Magn. Reson. Med., vol. 58, no. 6, applications,” IEEE Trans. Circ. Syst. I, vol. 58,
pp. 1182–1195, 2007. pp. 921–934, May 2011.
[26] R. Baraniuk and P. Steeghs, “Compressive radar [39] C. Ieong et al., “A 0.45 V 147-375 nW ECG
imaging,” in Proc. 2007 IEEE Radar Conf., Apr. 2007, compression processor with wavelet shrinkage and
pp. 128–133. adaptive temporal decimation architectures,” IEEE
[27] A. Amaravati et al., “A 130nm 165nJ/frame Trans. Very Large Scale Integr. Syst., vol. 25,
signal classifier for “In-sensor” analytics in smart [40] B. Chatterjee et al., “A wearable real-time CMOS
dosimeter with integrated zero-bias floating-gate
cameras,” Trans. Circ. Syst. II, no. 9, 2017.
sensor and an 861nW 18–bit energy-resolution
[28] A. Anvesha et al., “A light-powered, always-on, smart
scalable time-based radiation to digital converter,” in
camera with compressed domain gesture detection,”
2019 IEEE Custom Integr. Circ. Conf., Apr. 2019.
in Proc. 2016 Int. Symp. Low Power Electron. Design,
[41] W. Li, J. Bao, and W. Shen, “Collaborative wireless
2016, pp. 118–123.
sensor networks: A survey,” in 2011 IEEE Int. Conf.
[29] S. Xu et al., “Appearance-based gesture recognition
Syst. Man Cybern., pp. 2614–2619, Oct. 2011.
in the compressed domain,” in 2017 IEEE Int. Conf.
[42] M. Singh and V. K. Prasanna, “A hierarchical model
Acoust., Speech Signal Process., pp. 1722–1726,
for distributed collaborative computation in wireless
Mar. 2017.
sensor networks,” in Proc. Int. Parallel Distrib.
[30] A. Anvesha et al., “A 65nm compressive-sensing
Process. Symp., Apr. 2003, p. 166.2.
time-based ADC with embedded classification and
[43] R. M. Buehrer, H. Wymeersch, and R. M. Vaghefi,
INL-aware training for arrhythmia detection,” in 2017
“Collaborative sensor network localization: Algorithms
IEEE Biomedical Circ. and Syst. Conf., pp. 1–4,
and practical issues,” in Proc. IEEE, vol. 106,
Oct. 2017.
Jun. 2018, pp. 1089–1114.
[31] S. Qaisar et al., “Compressive sensing: From theory to
[44] N. Cao et al., “In-sensor analytics and energy-aware
applications, a survey,” J. Commun. Netw., vol. 15,
self-optimization in a wireless sensor node,” in Proc.
pp. 443–456, Oct, 2013.
2017 IEEE MTT-S Int. Microw. Symp., pp. 200–203,
[32] H. Djelouat, A. Amira, and F. Bensaali, “Compressive
Jun. 2017.
sensing-based IoT applications: A review,” J. Sensor
[45] B. Chatterjee et al., “Exploiting inherent error-
Actuator Netw., vol. 7, no. 4, 2018. resiliency of deep neural networks to achieve extreme
[33] A. Amaravati et al., “A light-powered smart camera energy-efficiency through mixed-signal neurons,”
with compressed domain gesture detection,” IEEE ArXiv:1806.05141 (CS), vol. abs/1806.05141, 2018.
Trans. Circ. and Syst. for Video Technology, vol. 28, [46] B. Chatterjee et al., “An energy-efficient mixed-signal
pp. 3077–3085, Oct. 2018. neuron for inherently error-resilient neuromorphic
[34] J. Zhang, Z. Wang, and N. Verma, “18.4 A matrix- systems,” in Proc. 2017 IEEE Int. Conf. Reboot.
multiplying ADC implementing a machine-learning Comput., 2017, pp. 1–2.
classifier directly with data conversion,” in Proc. ISSCC [47] C. H. Bennett, “Notes on Landauer’s principle, reversible
2015, Feb. 2015, pp. 1–3. computation, and Maxwell’s Demon,” Studies Hist. Phil.
[35] S. S. Rautaray and A. Agrawal, “Vision based hand Modern Phys., vol. 34, no. 3, pp. 501–510, 2003.
gesture recognition for human computer interaction: A [48] H. T. Friis, “A note on a simple transmission formula,” in
survey,” Artifi. Intell. Rev., vol. 43, no. 1, pp. 1–54, 2015. Proc. IRE, vol. 34, May 1946, pp. 254–256.
[36] V. I. Pavlovic, R. Sharma, and T. S. Huang, “Visual [49] A. J. Johansson, “Performance of a radio link between
interpretation of hand gestures for human-computer a base station and a medical implant utilising the
interaction: A review,” IEEE Trans. Pattern Anal. Mach. MICS standard,” in 26th Ann. Int. Conf. IEEE Eng.
Intell., vol. 19, no. 7, pp. 677–695, 1997. Med. Biol. Soci., vol. 1, pp. 2113–2116, Sep. 2004.
34 IEEE Design&Test
Authorized licensed use limited to: Tampere University. Downloaded on December 30,2022 at 23:15:54 UTC from IEEE Xplore. Restrictions apply.
[50] C. Salazar et al., “A 2.4 GHz interferer-resilient [65] P. Malhotra et al., “Long short term memory networks
wake-up receiver using a dual-IF MultiStage N-path for anomaly detection in time series,” in ESANN, 2015.
architecture,” IEEE J. Solid-State Circ., vol. 51, [66] S. Ahmad et al., “Unsupervised realtime anomaly
pp. 2091–2105, Sep. 2016. detection for streaming data,” Neurocomputing,
[51] B. Razavi, RF Microelectronics. Upper Saddle River, vol. 262, pp. 134–147, 2017.
NJ: Prentice Hall, 2011, 2nd ed.. [67] V. Chatzigiannakis et al., “Hierarchical anomaly detection
[52] A. Ebrazeh and P. Mohseni, “30 pJ/b, 67 Mbps, in distributed large-scale sensor networks,” in 11th IEEE
centimeter-to-meter range data telemetry with an Symp. Comput. Commun.’06, pp. 761–767, Jun. 2006.
IR-UWB wireless link,” IEEE Trans. Biomed. Circ. [68] Y. Lee, Y. Yeh, and Y. F. Wang, “Anomaly detection via
Syst., vol. 9, pp. 362–369, Jun. 2015. online oversampling principal component analysis,” IEEE
[53] W. Wu et al., “Localized outlying and boundary data Trans. Knowl. Data Eng., vol. 25, pp. 14601470, Jul. 2013.
detection in sensor networks,” IEEE Trans. Knowl. [69] V. Barnett and T. Lewis, Outliers in Statistical Data.
Data Eng., vol. 19, pp. 1145–1157, Aug. 2007. John Wiley & Sons Ltd., 1994, 2nd ed.
[54] C.-C. J. K. Minwook et al., “Distributed spatiotemporal [70] Y. Zhang, N. Meratnia, and P. Havinga, “Outlier
outlier detection in sensor networks,” in Proc. SPIE, detection techniques for wireless sensor networks:
vol. 5819, 2005, pp. 5819–5819–12. A survey,” IEEE Commun. Surveys Tuts., vol. 12,
[55] T. Palpanas et al., “Distributed deviation detection in pp. 159–170, Second 2010.
sensor networks,” SIGMOD Rec., vol. 32, pp. 77–82, [71] J. Hochenbaum, O. S. Vallis, and A. Kejariwal,
Dec. 2003. “Automatic anomaly detection in the cloud via
[56] S. Papadimitriou et al., “LOCI: Fast outlier detection statistical learning,” ArXiv. 1704.07706, 2017.
using the local correlation integral,” in Proc. 19th Int. [72] K. C. Barr and K. Asanovic, “Energy-aware lossless
Conf. Data Eng., Mar. 2003, pp. 315–326. data compression,” ACM Trans. Comput. Syst.,
[57] B. Sheng, Q. Li, W. Mao, and W. Jin, “Outlier detection vol. 24, pp. 250–291, Aug. 2006.
in sensor networks,” in Proc. 8th ACM Int. Symp. [73] D. Garlan et al., “Project Aura: Toward distraction-free
Mobile Ad Hoc Netw. Comput. MobiHoc ’07, New York, pervasive computing,” IEEE Pervasive Comput., vol. 1,
NY, 2007, pp. 219–228. pp. 22–31, Apr. 2002.
[58] J. Branch et al., “In-network outlier detection in [74] C. Sadler and M. Martonosi, “Data compression
wireless sensor networks,” in 26th IEEE Int. Conf. algorithms for energy-constrained devices in delay
Distrib. Comput. Syst. ’06, pp. 51–51, Jul. 2006. tolerant networks,” in Proc. ACM Conf. Embedded
[59] Y. Zhuang and L. Chen, “In-network outlier cleaning Netw. Sensor Syst., 2006, pp. 265–278.
for data collection in sensor networks,” in In CleanDB [75] A. Rooshenas et al., “Reducing the data transmission in
Workshop VLDB 2006, pp. 41–48, 2006. wireless sensor networks using the principal component
[60] S. Rajasegarar et al., “Distributed anomaly detection in analysis,” in Proc. 2010 Sixth Int. Conf. Intell. Sensors
wireless sensor networks,” in 2006 10th IEEE Singapore Sensor Netw. Inf. Process., Dec. 2010, pp. 133–138.
Int. Conf. Commun. Syst., pp. 1–5, Oct. 2006. [76] A. Morell et al., “Data aggregation and principal
[61] S. Rajasegarar et al., “Quarter sphere based distributed component analysis in WSNs,” IEEE Trans. Wireless
anomaly detection in wireless sensor networks,” in 2007 Commun., vol. 15, pp. 39083919, Jun. 2016.
IEEE Int. Conf. Commun., pp. 3864–3869, Jun. 2007. [77] S. V. Macua, P. Belanovic, and S. Zazo, “Consensus-
[62] N. Shahid, I. H. Naqvi, and S. B. Qaisar, “One-class based distributed principal component analysis
support vector machines: Analysis of outlier detection in wireless sensor networks,” in Proc. 2010 IEEE
for wireless sensor networks in harsh environments,” 11th Int. Workshop Signal Process. Adv. Wireless
Artif. Intell. Rev., vol. 43, pp. 515–563, Apr. 2015. Commun., Jun. 2010, pp. 1–5.
[63] D. Janakiram, V. A. Reddy, and A. V. U. P. Kumar, [78] D. Petrovic et al., “Data funneling: Routing with
“Outlier detection in wireless sensor networks using aggregation and compression for wireless sensor
bayesian belief networks,” in 2006 1st Int. Conf. networks,” in Proc. First IEEE Int. Workshop Sensor
Commun. Syst. Softw. Middlew., pp. 1–6, Jan. 2006. Netw. Protocols Appl., May 2003, pp. 156–162.
[64] E. Elnahrawy and B. Nath, “Context-aware sensors,” in [79] T. Arici et al., “PINCO: A pipelined in-network
Wireless Sensor Netw., EWSN 2004. Lecture Notes in compression scheme for data collection in wireless
Computer Science, Berlin, Heidelberg: Springer, Jan. sensor networks,” in Proc. 12th Int. Conf. Comput.
2004, vol. 2920. Commun. Netw., Oct. 2003, pp. 539–544.
March/April 2019
35
Authorized licensed use limited to: Tampere University. Downloaded on December 30,2022 at 23:15:54 UTC from IEEE Xplore. Restrictions apply.
SI: Survey
[80] E. Magli, M. Mancin, and L. Merello, “Low-complexity [94] P. Malla et al., “A 28mW spectrum-sensing
video compression for wireless sensor networks,” in reconfigurable 20MHz 72dB-SNR 70dB-SNDR DT
Proc. 2003 Int. Conf. Multimedia Expo ’03, vol. 3, AY ADC for 802.11n/WiMAX receivers,” in Proc. 2008
Jul. 2003, pp. III-585. IEEE Int. Solid-State Circ. Conf.—Digest Tech. Pap.,
[81] S. S. Pradhan, J. Kusuma, and K. Ramchandran, Feb. 2008, pp. 496–631.
“Distributed compression in a dense microsensor [95] Aurangozeb et al., “Channel-adaptive ADC and TDC
network,” IEEE Signal Process. Mag., vol. 19, for 28 Gb/s PAM-4 digital receiver,” IEEE J. Solid-
pp. 51–60, Mar. 2002. State Circ., vol. 53, pp. 772788, Mar. 2018.
[82] S. Sen, J. Koo, and S. Bagchi, “TRIFECTA: Security, [96] R. Senguttuvan, S. Sen, and A. Chatterjee, “VIZOR:
energy efficiency, and communication capacity Virtually zero margin adaptive RF for ultralow power
comparison for wireless IoT devices,” IEEE Internet wireless communication,” in Proc. 2007 25th Int.
Comput., vol. 22, pp. 74–81, Jan. 2018. Conf. Comput. Design, Oct. 2007, pp. 580–586.
[83] C. Thakkar et al., “A 32 Gb/s bidirectional 4-channel [97] R. Senguttuvan, S. Sen, and A. Chatterjee,
4 pJ/b capacitively coupled link in 14 nm CMOS for “Multidimensional adaptive power management for
proximity communication,” IEEE J. Solid-State Circ., low-power operation of wireless devices,” IEEE Trans.
vol. 51, pp. 3231–3245, Dec. 2016. Circ. and Syst. 11, vol. 55, pp. 867–871, Sep. 2008.
[84] S. Maity et al., “A 6.3pJ/b 30Mbps -30dB SIR- [98] S. Sen, M. Verhelst, and A. Chatterjee, “Orthogonally
tolerant broadband interference-robust human body tunable inductorless RF LNA for adaptive wireless
communication transceiver using time domain signal- systems,” in 2011 IEEE Int. Symp. Circ. and Syst.,
interference separation,” in Proc. 2018 IEEE Custom pp. 285–288, May 2011.
Integr. Circ. Conf., Apr. 2018, pp. 1–4. [99] S. Sen et al., “A power-scalable channel-adaptive
[85] D. Das et al., “Enabling covert body area network wireless receiver based on built-in orthogonally
using electro-quasistatic human body communication,” tunable LNA,” IEEE Trans. Circ. and Syst. I, vol. 59,
in Sci. Rep., Jan. 2019. pp. 946–957, May 2012.
[86] I. Akyildiz et al., “Wireless sensor networks: A survey,” [100] D. Banerjee et al., “Realtime use-aware adaptive
Comput. Netw., vol. 38, no. 4, pp. 393–422, 2002. MIMO RF receiver systems for energy efficiency
[87] A. J. Goldsmith and S. Chua, “Adaptive coded under BER constraints,” in Proc. 2013 50th ACM/
modulation for fading channels,” IEEE Trans. EDAC/IEEE Design Autom. Conf., May 2013, pp. 17.
Commun., vol. 46, pp. 595–602, May 1998. [101] D. Banerjee et al., “Real-time use-aware adaptive
[88] A. Srivastava et al., “Bio-WiTel: A low-power integrated RF transceiver systems for energy efficiency under
wireless telemetry system for healthcare applications BER constraints,” IEEE Trans. Comput.-Aided Design
in 401–406 MHz band of MedRadio spectrum,” IEEE J. Integr. Circ. Syst., vol. 34, pp. 1209–1222, Aug. 2015.
Biomed. Health Inf., vol. 22, pp. 483–494, Mar. 2018. [102] S. Sen et al., “ProVIZOR: Process tunable virtually
[89] S. Sen, R. Senguttuvan, and A. Chatterjee, zero margin low power adaptive RF for wireless
“Environment-adaptive concurrent companding and systems,” in Proc. 2008 45th ACM/IEEE Design
bias control for efficient power-amplifier operation,” IEEE Autom. Conf., Jun. 2008, pp. 492–497.
Trans. Circ. Syst. I, vol. 58, pp. 607–618, Mar. 2011. [103] S. Sen, “Channel-adaptive zero-margin and process-
[90] S. Sen et al., “Process-variation tolerant channel-adaptive adaptive self-healing communication circuits/
virtually zero-margin low-power wireless receiver systems: Special session paper,” in Proc. 2014 IEEE/
systems,” IEEE Trans. Comput.-Aided Design Integr. ACM Int. Conf. Comput.-Aided Design, Nov. 2014,
Circ. and Syst., vol. 33, pp. 1764–1777, Dec. 2014. pp. 80–85.
[91] J. Zhu, H. Krishnaswamy, and P. R. Kinget, “Field- [104] D. Banerjee et al., “Self-learning MIMO-RF receiver
programmable LNAs with interferer-reflecting loop for systems: Process resilient real-time adaptation to
input linearity enhancement,” IEEE J. Solid-State Circ., channel conditions for low power operation,” in Proc.
vol. 50, pp. 556–572, Feb. 2015. 2014 IEEE/ACM Int. Conf. Comput.-Aided Design,
[92] F. Behbahani et al., “Adaptive analog IF signal processor Nov. 2014, pp. 710–717.
for a wide-band CMOS wireless receiver,” IEEE J. Solid- [105] D. Banerjee, S. Sen, and A. Chatterjee, “Self learning
State Circ., vol. 36, pp. 1205–1217, Aug. 2001. analog/mixed-signal/RF systems: Dynamic adaptation
[93] D. T. Lin et al., “A low-power adaptive receiver utilizing to workload and environmental uncertainties,” in Proc.
discrete-time spectrum-sensing,” IEEE Trans. Microw. the IEEE/ACM Int. Conf. Comput.-Aided Design ’15,
Theory Techn., vol. 61, pp. 1338–1346, Mar. 2013. Piscataway, NJ, 2015, pp. 59–64.
36 IEEE Design&Test
Authorized licensed use limited to: Tampere University. Downloaded on December 30,2022 at 23:15:54 UTC from IEEE Xplore. Restrictions apply.
[106] D. Banerjee et al., “Self-learning RF receiver systems: [119] J. Jaussi et al., “26.2 a 205mw 32gb/s 3-tap ffe/6-tap
Process aware real-time adaptation to channel dfe bidirectional serial link in 22nm CMOS,” in Proc.
conditions for low power operation,” IEEE Trans. Circ. 2014 IEEE Int. Solid-State Circ. Conf. Digest Techn.
and Syst. 1, vol. 64, pp. 195–207, Jan. 2017. Pap., 2014, pp. 440–441.
[107] S. Sen, “Channel-adaptive zero-margin & process- [120] T.-C. Hsueh et al., “26.4 a 25.6 gb/s differential and
adaptive selfhealing communication circuits/systems: ddr4/gddr5 dual-mode transmitter with digital clock
Special session paper,” in Proc. 2014 IEEE/ACM Int. calibration in 22nm CMOS,” in Proc. 2014 IEEE Int.
Conf. Comput.-Aided Design, 2014, pp. 80–85. Solid-State Circ. Conf. Digest Techn. Pap., 2014,
[108] C. Thakkar et al., “23.2 a 32gb/s bidirectional pp. 444–445.
4-channel 4pj/b capacitively coupled link in 14nm [121] S. Maity, D. Das, and S. Sen, “Adaptive interference
cmos for proximity communication,” in Solid-State rejection in human body communication using
Circ. Conference (ISSCC), 2016 IEEE Int., variable duty cycle integrating DDR receiver,” in Proc.
pp. 400–401, 2016. 2017 Design Autom. Test Euro. Conf. Exhibition,
[109] T. Tsukizawa et al., “A fully integrated 60GHz CMOS 2017, pp. 1763–1768.
transceiver chipset based on WiGig/IEEE802.11ad [122] S. Maity, P. Mehrotra, and S. Sen, “An improved
with built-in self calibration for mobile applications,” in update rate baud rate CDR for integrating human
Proc. ISSCC 2013, Feb. 2013, pp. 230–231.
body communication receiver,” in Proc. 2018 IEEE
[110] M. He et al., “A 40nm dual-band 3-stream 802.11a/b/
Biomedical Circ. and Syst. Conf., 2018, pp. 1–4.
g/n/ac mimo WLAN SoC with 1.1gb/s over-the-air
[123] S. Gangopadhyay, S. B. Nasir, and A. Raychowdhury,
throughput,” in Proc. ISSCC 2014, Feb. 2014,
“Integrated power management in IoT devices
pp. 350–351.
under wide dynamic ranges of operation,” in Proc.
[111] S. Maity, D. Das, and S. Sen, “Wearable health
2015 52nd ACM/EDAC/IEEE Design Autom. Conf.,
monitoring using capacitive voltage-mode human
Jun. 2015, pp. 1–6.
body communication,” in Proc. 2017 39th Ann. Int.
[124] S. B. Nasir, S. Gangopadhyay, and A. Raychowdhury,
Conf. IEEE Eng. Med. Biol. Soc., 2017.
“A 0.13µm fully digital low-dropout regulator with
[112] S. Maity et al., “Secure human-internet using dynamic
adaptive control and reduced dynamic stability for
human body communication,” in Proc. 2017 IEEE/ACM
ultra-wide dynamic range,” in Proc. ISSCC 2015,
Int. Symp. Low Power Electron. Design, 2017, pp. 1–6.
Feb. 2015, pp. 1–3.
[113] S. Maity et al., “Characterization and classification
[125] S. B. Nasir, S. Gangopadhyay, and A. Raychowdhury,
of human body channel as a function of excitation
“All-digital low-dropout regulator with adaptive control
and termination modalities,” arXiv preprint
and reduced dynamic stability for digital load circuits,”
arXiv:1805.02492, 2018.
IEEE Trans. Power Electron., vol. 31, pp. 8293–8302,
[114] S. Sen, “Socialhbc: Social networking and secure
Dec. 2016.
authentication using interference-robust human body
[126] S. B. Nasir, S. Sen, and A. Raychowdhury, “Switched-
communication,” in Proc. 2016 Int. Symp. Low Power
mode-control based hybrid LDO for fine-grain power
Electron. Design, 2016, pp. 34–39.
[115] S. Maity et al., “BioPhysical modeling, management of digital load circuits,” IEEE J. Solid-
characterization and optimization of electro- State Circ., vol. 53, pp. 569–581, Feb. 2018.
quasistatic human body communication,” IEEE Trans. [127] A. Keshavarzi, “Embedded systems and innovative
Biomed. Eng., pp. 1–1, 2018. technologies for IoT applications,” in Proc. Tutorial
[116] S. Maity, K. Mojabe, and S. Sen, “Characterization 62nd Int. ELectron Dev. Meeting, 2016.
of human body forward path loss and variability [128] Z. Ghodsi, S. Garg, and R. Karri, “Optimal
effects in voltage-mode HBC,” IEEE Microw. Wireless checkpointing for secure intermittently-powered
Compon. Lett., vol. 28, no. 3, pp. 266–268, 2018. IoT devices,” in Proc. 2017 IEEE/ACM Int. Conf.
[117] S. Maity et al., “A sub-nw wake-up receiver for human Comput.-Aided Design, Nov. 2017, pp. 376–383.
body communication,” in Proc. 2018 IEEE Biomedical [129] N. Cao et al., “Self-optimizing IoT wireless video
Circ. Syst. Conf., 2018, pp. 1–4. sensor node with in situ data analytics and context-
[118] T. Musah et al., “A 4-32 Gb/s bidirectional link with driven energy-aware real-time adaptation,” IEEE Trans.
3-tap ffe/6-tap dfe and collaborative cdr in 22 nm Circ. and Syst. I, vol. 64, pp. 2470–2480, Sep. 2017.
cmos,” IEEE J. Solid-State Circ., vol. 49, no. 12, [130] N. Cao et al., “Smart sensing for HVAC control:
pp. 3079–3090, 2014. Collaborative intelligence in optical and IR cameras,”
March/April 2019
37
Authorized licensed use limited to: Tampere University. Downloaded on December 30,2022 at 23:15:54 UTC from IEEE Xplore. Restrictions apply.
SI: Survey
IEEE Trans. Ind. Electron., vol. 65, pp. 9785–9794, Internet of Things,” IEEE Sensors J., vol. 13,
Dec. 2018. pp. 3677–3684, Oct. 2013.
[131] J. King and A. I. Awad, “A distributed security [146] Z. Li et al., “Research on PKI-like protocol for the Internet
mechanism for resource-constrained IoT devices,” of Things,” in Proc. 2013 Fifth Int. Conf. Meas. Technol.
Informatica 40, vol. 40, pp. 133–143, 2016. Mechatron. Autom., Jan. 2013, pp. 915–918.
[132] L. Atzori, A. Iera, and G. Morabito, “The Internet of [147] E. Hammer-Lahav, The OAuth 1.0 Protocol.
Things: A survey,” Comput. Netw., vol. 54, Accessed: December 12, 2018. [Online]. Available:
pp. 2787–2805, Oct. 2010. https://tools.ietf.org/html/rfc5849
[133] O. Saeed, “Towards Internet of Things: Survey and [148] OAuth 2.0. [Online]. Accessed: December 8, 2018.
future vision,” Int. J. Comput. Netw., 2013. Available: https://oauth.net/2/
[134] M. Yun and B. Yuxin, “Research on the architecture [149] S. Cirani, G. Ferrari, and L. Veltri, “Enforcing security
and key technology of Internet of Things (IoT) applied mechanisms in the IP-based Internet of Things: An
on smart grid,” in Proc. 2010 Int. Conf. Adv. Energy algorithmic overview,” Algorithms, vol. 6, no. 2,
Eng., Jun. 2010, pp. 69–72. pp. 197–226, 2013.
[135] CISCO, The Internet of Things Reference Model. [150] L. Kulseng et al., “Lightweight mutual authentication
Accessed: December 5, 2018. [Online]. Available: and ownership transfer for RFID systems,” in Proc.
https://www.cisco.com/c/dam/global/en_ph/assets/ IEEE INFOCOM, Mar. 2010, pp. 1–5.
ciscoconnect/pdf/bigdata/jim_green_cisco_connect.pdf. [151] G. Zhao et al., “A novel mutual authentication
[136] A. Mosenia and N. K. Jha, “A comprehensive study of scheme for Internet of Things,” in Proc. Int. Conf.
security of Internet-of-Things,” IEEE Trans. Emerg. Modeling, Identif. Contr., Jun. 2011, pp. 563–566.
Topics Comput., vol. 5, pp. 586–602, Oct. 2017. [152] T. Eisenbarth et al., “A survey of lightweight-
[137] M. Burhan et al., “IoT elements, layered architectures cryptography implementations,” IEEE Des. Test,
and security issues: A comprehensive survey,” vol. 24, pp. 522–533, Nov. 2007.
Sensors, vol. 18, no. 9, 2018. [153] S. Ravi et al., “Security in embedded systems: Design
[138] H. Suo, J. Wan, C. Zou, and J. Liu, “Security in the challenges,” ACM Trans. Embed. Comput. Syst.,
Internet of Things: A review,” in Proc. 2012 Int. Conf. vol. 3, pp. 461–491, Aug. 2004.
Comput. Sci. Electron. Eng., vol. 3, pp. 648–651, [154] S. Babar et al., “Proposed embedded security
Mar. 2012. framework for Internet of Things (IoT),” in Proc. 2011
[139] M. V. Bharathi et al., “Node capture attack in wireless 2nd Int. Conf. Wireless VITAE, Feb. 2011, pp. 1–5.
sensor network: A survey,” in Proc. 2012 IEEE Int. [155] A. Sanzgiri and D. Dasgupta, “Classification of insider
Conf. Comput. Intell. Comput. Res., Dec. 2012, threat detection techniques,” in Proc. 11th Ann. Cyber
pp. 1–3. Inf. Security Res. Conf. ’16, New York, NY, 2016,
[140] D. Puthal et al., “Threats to networking cloud and pp. 25:1–25:4.
edge datacenters in the Internet of Things,” IEEE [156] J. R. C. Nurse et al., “Smart insiders: Exploring the
Cloud Comput., vol. 3, pp. 64–71, May 2016. threat from insiders using the Internet-of-Things,” in
[141] D. Brumley and D. Boneh, “Remote timing attacks Proc. 2015 Int. Workshop Secure Internet of Things,
are practical,” in Proc. 12th Conf. USENIX Security Sep. 2015, pp. 5–14.
Symp. ’03, Berkeley, CA, USENIX Association, 2003, [157] S. Madakam, R. Ramaswamy, and S. K. Tripathi,
vol. 12, pp. 1–1. “Internet of Things (IoT): A literature review,”
[142] M. Conti, N. Dragoni, and V. Lesyk, “A survey of man J. Comput. Commun., 2015.
in the middle attacks,” IEEE Commun. Surveys Tuts., [158] R. Khan et al., “Future internet: The Internet of
vol. 18, pp. 2027–2051, Thirdquarter 2016. Things architecture, possible applications and key
[143] R. H. Weber, “Internet of Things—new security and challenges,” in Proc. 2012 10th Int. Conf. Front. Inf.
privacy challenges,” Comput. Law Security Rev., Technol., Dec. 2012, pp. 257–260.
vol. 26, no. 1, pp. 23–30, 2010. [159] P. Sethi and S. R. Sarangi, “Internet of Things:
[144] B. V. Sundaram et al., “Encryption and hash based Architectures, protocols, and applications,” J. Electr.
security in Internet of Things,” in Proc. 2015 3rd Int. Conf. Comput. Eng., 2017.
Signal Process. Commun. Netw., Mar. 2015, pp. 1–6. [160] Q. M. Ashraf and M. H. Habaebi, “Autonomic
[145] F. Li and P. Xiong, “Practical secure communication schemes for threat mitigation in Internet of Things,”
for integrating wireless sensor networks into the J. Netw. Comput. Appl., vol. 49, pp. 112–127, 2015.
38 IEEE Design&Test
Authorized licensed use limited to: Tampere University. Downloaded on December 30,2022 at 23:15:54 UTC from IEEE Xplore. Restrictions apply.
[161] R. Canzanese, M. Kam, and S. Mancoridis, “Toward [174] D. Das et al., “STELLAR: A generic EM side-channel
an automatic, online behavioral malware classification attack protection through ground-up root-cause
system,” in Proc. 2013 IEEE 7th Int. Conf. Self-Adaptive analysis,” in Proc. 2019 IEEE Int. Symp. Hardw.
Self-Organizing Syst., Sep. 2013, pp. 111–120. Oriented Security Trust, May 2019.
[162] L. Bilge and T. Dumitra, “Before we knew it: An [175] D. Das et al., “X-DeepSCA: Cross-device deep
empirical study of zero-day attacks in the real learning side channel attack,” in Proc. 2019 ACM/
world,” in Proc. 2012 ACM Conf. Comput. Commun. IEEE Design Autom. Conf., 2019.
Security’12, New York, NY, 2012, pp. 833–844. [176] C. Herder et al., “Physical unclonable functions and
[163] R. Kaur and M. Singh, “A survey on zero-day polymorphic applications: A tutorial,” Proc. IEEE, Aug. 2014,
worm detection techniques,” IEEE Commun. Surveys vol. 102, pp. 1126–1141.
Tuts., vol. 16, pp. 1520–1549, Third 2014. [177] U. Ruhrmair and M. van Dijk, “PUFs in security
[164] A. Bar-On et al., “Improved key recovery attacks on protocols: Attack models and security evaluations,” in
reduced-round AES with practical data and memory Proc. 2013 IEEE Symp. Security Privacy, May 2013,
complexities.” Cryptology ePrint Archive, Report pp. 286–300.
2018/527, 2018. [178] B. Chatterjee, D. Das, and S. Sen, “RF-PUF: IoT
[165] A. Biryukov et al., “Key recovery attacks of practical security enhancement through authentication of
complexity on AES-256 variants with up to 10 wireless nodes using in situ machine learning,” in
rounds,” in Proc. 29th Ann. Int. Conf. Theory Appl. Proc. 2018 IEEE Int. Symp. Hardw. Oriented Security
Cryptogr. Techn. ’10, Berlin, Heidelberg, Springer- Trust, Apr. 2018, pp. 205–208.
Verlag, 2010, pp. 299–319. [179] G. E. Suh and S. Devadas, “Physical unclonable
[166] I. Thomson, AES-256 Keys Sniffed in Seconds functions for device authentication and secret key
Using e200 Kit a Few Inches Away. Accessed: generation,” in Proc. 2007 44th ACM/IEEE Design
November 11, 2018. [Online]. Available: Autom. Conf., Jun. 2007, pp. 9–14.
https://www.theregister.co.uk/2017/06/23/aes_256_ [180] Z. Paral and S. Devadas, “Reliable and efficient PUF-
cracked_50_seconds_200_kit/ based key generation using pattern matching,” in
[167] C. C. E. Brier and F. Olivier, “Correlation power Proc. 2011 IEEE Int. Symp. Hardw.-Oriented Security
analysis with a leakage model,” Cryptogr. Hardw. Trust, Jun. 2011, pp. 128–133.
Embedded Syst., pp. 16–29, 2004. [181] D. E. Holcomb, W. P. Burleson, and K. Fu, “Power-Up
[168] D. Das et al., “ASNI: Attenuated signature noise SRAM state as an identifying fingerprint and source
injection for low-overhead power side-channel attack of true random numbers,” IEEE Trans. Comput.,
immunity,” IEEE Trans. Circ. Syst. I, vol. 65, vol. 58, pp. 11981210, Sep. 2009.
pp. 3300–3311, Oct. 2018. [182] D. E. Holcomb, W. P. Burleson, and K. Fu, “Initial
[169] D. Das et al., “High efficiency power side-channel SRAM state as a fingerprint and source of true
attack immunity using noise injection in attenuated random numbers for RFID tags,” in Proc. Conf. RFID
signature domain,” in Proc. 2017 IEEE Int. Symp. Security, 2007.
Hardw. Oriented Security Trust, 2017, pp. 62–67. [183] Y. Su, J. Holleman, and B. P. Otis, “A Digital 1.6 pJ/
[170] M. Kar et al., “Reducing power side-channel bit chip identification circuit using process variations,”
information leakage of AES engines using fully IEEE J. Solid-State Circ., vol. 43, pp. 69–77, Jan. 2008.
integrated inductive voltage regulator,” IEEE J. Solid- [184] S. Sutar et al., “D-PUF: An intrinsically reconfigurable
State Circ., vol. 53, pp. 2399–2414, Aug. 2018. DRAM PUF for device authentication and
[171] A. Singh et al., “Improved power/EM side-channel random number generation,” ACM Trans. Embed.
attack resistance of 128-bit AES engines with Comput. Syst., vol. 17, pp. 17:1–17:31, Dec. 2017.
random fast voltage dithering,” IEEE J. Solid-State [185] U. Ruhrmair et al., “Modeling attacks on physical
Circ., vol. 54, pp. 569–583, Feb. 2019. unclonable functions,” in Proc. 17th ACM Conf.
[172] T. D. Cnudde, M. Ender, and A. Moradi, “Hardware Comput. Commun. Security ’10, New York, NY, 2010,
masking, revisited,” Trans. Cryptogr. Hardw. pp. 237–249.
Embedded Syst., vol. 2018, pp. 123–148, 2018. [186] C. Zhou, K. K. Parhi, and C. H. Kim, “Secure and
[173] T.-H. Le et al., “A proposition for correlation power reliable XOR Arbiter PUF design: An experimental
analysis enhancement,” in Proc. 8th Int. Conf. study based on 1 trillion challenge response pair
Cryptogr. Hardw. Embedded Syst. ’06, Berlin, measurements,” in Proc. 54th Ann. Design Autom.
Heidelberg, Springer-Verlag, 2006, pp. 174–186. Conf. ’17, New York, NY, 2017, pp. 10:1–10:6.
March/April 2019
39
Authorized licensed use limited to: Tampere University. Downloaded on December 30,2022 at 23:15:54 UTC from IEEE Xplore. Restrictions apply.
SI: Survey
[187] B. Chatterjee et al., “RF-PUF: Enhancing IoT security [201] C. F. Camerer, T.-H. Ho, and J.-K. Chong, “A cognitive
through authentication of wireless nodes using in situ hierarchy model of games*,” Quart. J. Econ., vol. 119,
machine learning,” IEEE Internet of Things J., 2018. pp. 861–898, Aug. 2004.
[188] M. A. Alsheikh et al., “Machine learning in wireless [202] B. W. Rogers, T. R. Palfrey, and C. F. Camerer,
sensor networks: Algorithms, strategies, and “Heterogeneous quantal response equilibrium and
applications,” IEEE Commun. Surveys Tuts., vol. 16, cognitive hierarchies,” J. Econ. Theory, vol. 144,
pp. 1996–2018, Fourthquarter 2014. no. 4, pp. 1440–1467, 2009.
[189] R. Masiero et al., “Data acquisition through joint
compressive sensing and principal component Baibhab Chatterjee is currently pursuing a PhD
analysis,” in Proc. GLOBECOM 2009—2009 IEEE degree with the School of Electrical Engineering, Pur-
Global Telecommun. Conf., Nov. 2009, pp. 1–6. due University, West Lafayette, IN. His research inter-
[190] T. M. Cover, “Hypothesis testing with finite statistics,” ests include low-power analog, RF, and mixed-signal
Ann. Math. Statist., vol. 40, pp. 828–835, Jun. 1969.
circuit design for secure biomedical/IoT applications.
Chatterjee has a BTech in electronics and communi-
[191] T. Park and W. Saad, “Learning with finite memory for
cation engineering from National Institute of Technol-
machine type communication,” ArXiv. 1610.01723,
ogy Durgapur, Durgapur, India (2011), an MTech in
vol. abs/1610.01723, 2016.
electrical engineering from the IIT Bombay, Mumbai,
[192] K. Drakopoulos, A. E. Ozdaglar, and J. N. Tsitsiklis, India (2015). He is a Student Member of the IEEE.
“On learning with finite memory,” ArXiv. 1209.1122,
vol. abs/1209.1122, 2012. Ningyuan Cao is currently pursuing a PhD degree
[193] R. S. Sutton and A. G. Barto, Introduction to in electrical engineering with the Georgia Institute
Reinforcement Learning. Cambridge, MA: MIT Press, of Technology, Atlanta, GA. His research interests
1998, 1st ed. include low-power machine-learning ASIC design,
[194] L. P. Kaelbling, M. L. Littma, and A. W. Moore, wireless sensor design and power management,
“Reinforcement learning: A survey,” J. Artif. Intell. and energy harvesting circuit design. Cao has a BS
Res., vol. 4, 1996. in electrical engineering from Shanghai Jiaotong
[195] D. Athukoralage et al., “Regret based learning for UAV University, Shanghai, China (2013), an MS in electrical
assisted LTE-U/WiFi public safety networks,” in Proc.
engineering from Columbia University, New York, NY
(2015). He is a Student Member of the IEEE.
2016 IEEE Global Commun. Conf., Dec. 2016, pp. 1–7.
[196] Z. Liu and I. Elhanany, “RL-MAC: A QoS-aware
reinforcement learning based MAC protocol for
Arijit Raychowdhury is an Associate Professor
with the School of Electrical and Computer Engineer-
wireless sensor networks,” in Proc. 2006 IEEE Int.
ing, Georgia Institute of Technology, Atlanta, GA.
Conf. Netw. Sensing Contr., Apr. 2006,
His research interests include low-power digital and
pp. 768–773.
mixed-signal circuit design, device–circuit interac-
[197] A. Amravati et al., “A 55nm time-domain mixed- tions, and novel computing models and hardware
signal neuromorphic accelerator with stochastic realizations. Raychowdhury has a PhD in electrical
synapses and embedded reinforcement learning for and computer engineering from Purdue University,
autonomous micro-robots,” in Proc. 2018 IEEE Int. West Lafayette, IN (2007). He is a Senior Member of
Solid-State Circ. Conf., Feb. 2018, pp. 124–126. the IEEE.
[198] M. Camelo and J. F. a. S. Latre, “A scalable parallel
Q-learning algorithm for resource constrained Shreyas Sen is an Assistant Professor with the
decentralized computing environments,” in Proc. School of Electrical and Computer Engineering,
Purdue University, West Lafayette, IN. His research
2016 2nd Workshop Machine Learn. HPC Environ,
interests include mixed-signal circuits/systems for
Nov. 2016, pp. 27–35.
Human Body Communication, IoT, Biomedical, and
[199] A. M. Printista, M. L. Errecalde, and C. I. Montoya,
Hardware Security. Sen has a PhD in electrical and
“A parallel implementation of Q-learning based
computer engineering from Georgia Tech, Atlanta,
on communication with cache,” in J. Comput. Sci. GA (2011). He is a Senior Member of the IEEE.
Techn., 2002.
[200] R. M. Kretchmar, “Reinforcement learning algorithms Direct questions and comments about this article
for homogenous multi-agent systems,” in Workshop to Baibhab Chatterjee, Purdue University, West
Agent Swarm Program., 2003. Lafayette, IN 47907, USA; [email protected].
40 IEEE Design&Test
Authorized licensed use limited to: Tampere University. Downloaded on December 30,2022 at 23:15:54 UTC from IEEE Xplore. Restrictions apply.