Context-Aware Intelligence in Resource-Constrained IoT Nodes: Opportunities and Challenges

Editor’s note: This article provides an academic perspective of the problem, starting with a survey of recent advances in intelligent sensing, computation, communication, and energy management for resource-constrained IoT sensor nodes and leading to a future outlook and needs. —Shreyas Sen, Purdue University

[1]  Li Li,et al.  A Low-Power Adaptive Receiver Utilizing Discrete-Time Spectrum-Sensing , 2013, IEEE Transactions on Microwave Theory and Techniques.

[2]  Arijit Raychowdhury,et al.  All-Digital Low-Dropout Regulator With Adaptive Control and Reduced Dynamic Stability for Digital Load Circuits , 2016, IEEE Transactions on Power Electronics.

[3]  Amir Moradi,et al.  Hardware Masking, Revisited , 2018, IACR Trans. Cryptogr. Hardw. Embed. Syst..

[4]  Jinjun Chen,et al.  Threats to Networking Cloud and Edge Datacenters in the Internet of Things , 2016, IEEE Cloud Computing.

[5]  Shreyas Sen Channel-adaptive zero-margin & process-adaptive self-healing communication circuits/systems: Special session paper , 2014, 2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).

[6]  Arijit Raychowdhury,et al.  Switched-Mode-Control Based Hybrid LDO for Fine-Grain Power Management of Digital Load Circuits , 2018, IEEE Journal of Solid-State Circuits.

[7]  Srinivas Devadas,et al.  Reliable and efficient PUF-based key generation using pattern matching , 2011, 2011 IEEE International Symposium on Hardware-Oriented Security and Trust.

[8]  Jadwiga Indulska,et al.  Developing context-aware pervasive computing applications: Models and approach , 2006, Pervasive Mob. Comput..

[9]  Debayan Das,et al.  RF-PUF: Enhancing IoT Security Through Authentication of Wireless Nodes Using In-Situ Machine Learning , 2018, IEEE Internet of Things Journal.

[10]  Colin Camerer,et al.  A Cognitive Hierarchy Model of Games , 2004 .

[11]  O. Saeed,et al.  Towards Internet of Things: Survey and Future Vision , 2013 .

[12]  Shreyas Sen,et al.  High efficiency power side-channel attack immunity using noise injection in attenuated signature domain , 2017, 2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).

[13]  Margaret Martonosi,et al.  Data compression algorithms for energy-constrained devices in delay tolerant networks , 2006, SenSys '06.

[14]  Andrew W. Moore,et al.  Reinforcement Learning: A Survey , 1996, J. Artif. Intell. Res..

[15]  Arnab Raha,et al.  D-PUF , 2017, ACM Trans. Embed. Comput. Syst..

[16]  Zhenzhen Liu,et al.  RL-MAC: A QoS-Aware Reinforcement Learning based MAC Protocol for Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Networking, Sensing and Control.

[17]  Debayan Das,et al.  Enabling Covert Body Area Network using Electro-Quasistatic Human Body Communication , 2019, Scientific Reports.

[18]  Arkady B. Zaslavsky,et al.  Context Aware Computing for The Internet of Things: A Survey , 2013, IEEE Communications Surveys & Tutorials.

[19]  Anupam Agrawal,et al.  Vision based hand gesture recognition for human computer interaction: a survey , 2012, Artificial Intelligence Review.

[20]  Weiming Shen,et al.  Collaborative wireless sensor networks: A survey , 2011, 2011 IEEE International Conference on Systems, Man, and Cybernetics.

[21]  Lei Chen,et al.  In-network Outlier Cleaning for Data Collection in Sensor Networks , 2006, CleanDB.

[22]  Ramjee Prasad,et al.  Proposed embedded security framework for Internet of Things (IoT) , 2011, 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE).

[23]  Lin Li,et al.  Research on PKI-like Protocol for the Internet of Things , 2013, 2013 Fifth International Conference on Measuring Technology and Mechatronics Automation.

[24]  Joseph Kennedy,et al.  26.4 A 25.6Gb/s differential and DDR4/GDDR5 dual-mode transmitter with digital clock calibration in 22nm CMOS , 2014, 2014 IEEE International Solid-State Circuits Conference Digest of Technical Papers (ISSCC).

[25]  Dimitrios Gunopulos,et al.  Distributed deviation detection in sensor networks , 2003, SGMD.

[26]  Asad A. Abidi,et al.  Adaptive analog IF signal processor for a wide-band CMOS wireless receiver , 2001 .

[27]  James H. Aylor,et al.  Computer for the 21st Century , 1999, Computer.

[28]  Aurangozeb,et al.  Channel adaptive ADC and TDC for 28 Gb/s PAM-4 digital receiver , 2017, 2017 IEEE Custom Integrated Circuits Conference (CICC).

[29]  Shreyas Sen,et al.  Secure Human-Internet using dynamic Human Body Communication , 2017, 2017 IEEE/ACM International Symposium on Low Power Electronics and Design (ISLPED).

[30]  Daniel E. Holcomb,et al.  Initial SRAM State as a Fingerprint and Source of True Random Numbers for RFID Tags , 2007 .

[31]  Sameer R. Sonkusale,et al.  An Adaptive Resolution Asynchronous ADC Architecture for Data Compression in Energy Constrained Sensing Applications , 2011, IEEE Transactions on Circuits and Systems I: Regular Papers.

[32]  John N. Tsitsiklis,et al.  On Learning With Finite Memory , 2012, IEEE Transactions on Information Theory.

[33]  Enrico Magli,et al.  Low-complexity video compression for wireless sensor networks , 2003, 2003 International Conference on Multimedia and Expo. ICME '03. Proceedings (Cat. No.03TH8698).

[34]  Saurabh Bagchi,et al.  TRIFECTA: Security, Energy Efficiency, and Communication Capacity Comparison for Wireless IoT Devices , 2017, IEEE Internet Computing.

[35]  Abhijit Chatterjee,et al.  A Power-Scalable Channel-Adaptive Wireless Receiver Based on Built-In Orthogonally Tunable LNA , 2012, IEEE Transactions on Circuits and Systems I: Regular Papers.

[36]  Arijit Raychowdhury,et al.  5.6 A 0.13μm fully digital low-dropout regulator with adaptive control and reduced dynamic stability for ultra-wide dynamic range , 2015, 2015 IEEE International Solid-State Circuits Conference - (ISSCC) Digest of Technical Papers.

[37]  Christos Faloutsos,et al.  LOCI: fast outlier detection using the local correlation integral , 2003, Proceedings 19th International Conference on Data Engineering (Cat. No.03CH37405).

[38]  G. Edward Suh,et al.  Physical Unclonable Functions for Device Authentication and Secret Key Generation , 2007, 2007 44th ACM/IEEE Design Automation Conference.

[39]  Mitali Singh,et al.  A Hierarchical Model For Distributed Collaborative Computation In Wireless Sensor Networks , 2004, Int. J. Found. Comput. Sci..

[40]  Min Chen,et al.  A Survey on Internet of Things From Industrial Market Perspective , 2015, IEEE Access.

[41]  M. Prasanth,et al.  Encryption and hash based security in Internet of Things , 2015, 2015 3rd International Conference on Signal Processing, Communication and Networking (ICSCN).

[42]  Moshe Kam,et al.  Toward an Automatic, Online Behavioral Malware Classification System , 2013, 2013 IEEE 7th International Conference on Self-Adaptive and Self-Organizing Systems.

[43]  Yuh-Jye Lee,et al.  Anomaly Detection via Online Oversampling Principal Component Analysis , 2013, IEEE Transactions on Knowledge and Data Engineering.

[44]  Niraj K. Jha,et al.  A Comprehensive Study of Security of Internet-of-Things , 2017, IEEE Transactions on Emerging Topics in Computing.

[45]  Abhijit Chatterjee,et al.  Multidimensional Adaptive Power Management for Low-Power Operation of Wireless Devices , 2008, IEEE Transactions on Circuits and Systems II: Express Briefs.

[46]  Jörg Widmer,et al.  Data Acquisition through Joint Compressive Sensing and Principal Component Analysis , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[47]  Jiafu Wan,et al.  Security in the Internet of Things: A Review , 2012, 2012 International Conference on Computer Science and Electronics Engineering.

[48]  Fagen Li,et al.  Practical Secure Communication for Integrating Wireless Sensor Networks Into the Internet of Things , 2013, IEEE Sensors Journal.

[49]  Sarmad Ullah Khan,et al.  Future Internet: The Internet of Things Architecture, Possible Applications and Key Challenges , 2012, 2012 10th International Conference on Frontiers of Information Technology.

[50]  R. Matthew Kretchmar,et al.  Reinforcement Learning Algorithms for Homogenous Multi-Agent Systems , 2003 .

[51]  Monodeep Kar,et al.  Reducing Power Side-Channel Information Leakage of AES Engines Using Fully Integrated Inductive Voltage Regulator , 2018, IEEE Journal of Solid-State Circuits.

[52]  Walid Saad,et al.  Learning with finite memory for machine type communication , 2016, 2016 Annual Conference on Information Science and Systems (CISS).

[53]  Dipankar Dasgupta,et al.  Classification of Insider Threat Detection Techniques , 2016, CISRC.

[54]  Shreyas Sen,et al.  Invited: Context-aware energy-efficient communication for IoT sensor nodes , 2016, 2016 53nd ACM/EDAC/IEEE Design Automation Conference (DAC).

[55]  Nirvana Meratnia,et al.  Outlier Detection Techniques for Wireless Sensor Networks: A Survey , 2008, IEEE Communications Surveys & Tutorials.

[56]  Koichiro Tanaka,et al.  A fully integrated 60GHz CMOS transceiver chipset based on WiGig/IEEE802.11ad with built-in self calibration for mobile applications , 2013, 2013 IEEE International Solid-State Circuits Conference Digest of Technical Papers.

[57]  R. Michael Buehrer,et al.  Collaborative Sensor Network Localization: Algorithms and Practical Issues , 2018, Proceedings of the IEEE.

[58]  Monodeep Kar,et al.  Improved Power/EM Side-Channel Attack Resistance of 128-Bit AES Engines With Random Fast Voltage Dithering , 2019, IEEE Journal of Solid-State Circuits.

[59]  Smruti R. Sarangi,et al.  Internet of Things: Architectures, Protocols, and Applications , 2017, J. Electr. Comput. Eng..

[60]  Shreyas Sen,et al.  Self-Optimizing IoT Wireless Video Sensor Node With In-Situ Data Analytics and Context-Driven Energy-Aware Real-Time Adaptation , 2017, IEEE Transactions on Circuits and Systems I: Regular Papers.

[61]  M. Palaniswami,et al.  Distributed Anomaly Detection in Wireless Sensor Networks , 2006, 2006 10th IEEE Singapore International Conference on Communication Systems.

[62]  Arijit Raychowdhury,et al.  A 65nm compressive-sensing time-based ADC with embedded classification and INL-aware training for arrhythmia detection , 2017, 2017 IEEE Biomedical Circuits and Systems Conference (BioCAS).

[63]  Richard S. Sutton,et al.  Introduction to Reinforcement Learning , 1998 .

[64]  Jan M. Rabaey,et al.  Data funneling: routing with aggregation and compression for wireless sensor networks , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[65]  Shreyas Sen,et al.  A 6.3pJ/b 30Mbps −30dB SIR-tolerant broadband interference-robust human body communication transceiver using time domain signal-interference separation , 2018, 2018 IEEE Custom Integrated Circuits Conference (CICC).

[66]  Peter R. Kinget,et al.  Field-Programmable LNAs With Interferer-Reflecting Loop for Input Linearity Enhancement , 2015, IEEE Journal of Solid-State Circuits.

[67]  Arijit Raychowdhury,et al.  In-sensor analytics and energy-aware self-optimization in a wireless sensor node , 2017, 2017 IEEE MTT-S International Microwave Symposium (IMS).

[68]  Naveen Verma,et al.  18.4 A matrix-multiplying ADC implementing a machine-learning classifier directly with data conversion , 2015, 2015 IEEE International Solid-State Circuits Conference - (ISSCC) Digest of Technical Papers.

[69]  Krste Asanovic,et al.  Energy Aware Lossless Data Compression , 2003, MobiSys.

[70]  R. Baraniuk,et al.  Compressive Radar Imaging , 2007, 2007 IEEE Radar Conference.

[71]  Adi Shamir,et al.  Improved Key Recovery Attacks on Reduced-Round AES with Practical Data and Memory Complexities , 2019, Journal of Cryptology.

[72]  Abhijit Chatterjee,et al.  Process-Variation Tolerant Channel-Adaptive Virtually Zero-Margin Low-Power Wireless Receiver Systems , 2014, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.

[73]  Li Lin,et al.  20.5 A 40nm dual-band 3-stream 802.11a/b/g/n/ac MIMO WLAN SoC with 1.1Gb/s over-the-air throughput , 2014, 2014 IEEE International Solid-State Circuits Conference Digest of Technical Papers (ISSCC).

[74]  Gregory D. Abowd,et al.  A Conceptual Framework and a Toolkit for Supporting the Rapid Prototyping of Context-Aware Applications , 2001, Hum. Comput. Interact..

[75]  Maninder Singh,et al.  A Survey on Zero-Day Polymorphic Worm Detection Techniques , 2014, IEEE Communications Surveys & Tutorials.

[76]  Andrea J. Goldsmith,et al.  Adaptive coded modulation for fading channels , 1998, IEEE Trans. Commun..

[77]  Rolf H. Weber,et al.  Internet of Things - New security and privacy challenges , 2010, Comput. Law Secur. Rev..

[78]  Arijit Raychowdhury,et al.  A Light-powered, "Always-On", Smart Camera with Compressed Domain Gesture Detection , 2016, ISLPED.

[79]  Abhijit Chatterjee,et al.  Orthogonally tunable inductorless RF LNA for adaptive wireless systems , 2011, 2011 IEEE International Symposium of Circuits and Systems (ISCAS).

[80]  Kevin Ashton,et al.  That ‘Internet of Things’ Thing , 1999 .

[81]  Arijit Raychowdhury,et al.  A Light-Powered Smart Camera With Compressed Domain Gesture Detection , 2018, IEEE Transactions on Circuits and Systems for Video Technology.

[82]  Saad B. Qaisar,et al.  One-class support vector machines: analysis of outlier detection for wireless sensor networks in harsh environments , 2013, Artificial Intelligence Review.

[83]  Ramesh Karri,et al.  Optimal checkpointing for secure intermittently-powered IoT devices , 2017, 2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).

[84]  Bill N. Schilit,et al.  Disseminating active map information to mobile hosts , 1994, IEEE Network.

[85]  Alex Biryukov,et al.  Key Recovery Attacks of Practical Complexity on AES Variants With Up To 10 Rounds , 2010, IACR Cryptol. ePrint Arch..

[86]  Walid Saad,et al.  Regret Based Learning for UAV Assisted LTE-U/WiFi Public Safety Networks , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).

[87]  Emmanuel J. Candès,et al.  Decoding by linear programming , 2005, IEEE Transactions on Information Theory.

[88]  Marcelo Luis Errecalde,et al.  A parallel implementation of Q-learning based on communication with cache , 2002 .

[89]  Ying Su,et al.  A Digital 1.6 pJ/bit Chip Identification Circuit Using Process Variations , 2008, IEEE Journal of Solid-State Circuits.

[90]  Peter J. Brown,et al.  The Stick-e Document: a Framework for Creating Context-aware Applications , 1996 .

[91]  José López Vicario,et al.  Data Aggregation and Principal Component Analysis in WSNs , 2016, IEEE Transactions on Wireless Communications.

[92]  Charles H. Bennett,et al.  Notes on Landauer's Principle, Reversible Computation, and Maxwell's Demon , 2002, physics/0210005.

[93]  Ulrich Rührmair,et al.  PUFs in Security Protocols: Attack Models and Security Evaluations , 2013, 2013 IEEE Symposium on Security and Privacy.

[94]  Qazi Mamoon Ashraf,et al.  Autonomic schemes for threat mitigation in Internet of Things , 2015, J. Netw. Comput. Appl..

[95]  Xiuzhen Cheng,et al.  Localized Outlying and Boundary Data Detection in Sensor Networks , 2007 .

[96]  Yong Guan,et al.  Lightweight Mutual Authentication and Ownership Transfer for RFID Systems , 2010, 2010 Proceedings IEEE INFOCOM.

[97]  A.J. Johansson Performance of a radio link between a base station and a medical implant utilising the MICS standard , 2004, The 26th Annual International Conference of the IEEE Engineering in Medicine and Biology Society.

[98]  Abhijit Chatterjee,et al.  Self-learning MIMO-RF receiver systems: Process resilient real-time adaptation to channel conditions for low power operation , 2014, 2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).

[99]  Kannan Ramchandran,et al.  Distributed compression in a dense microsensor network , 2002, IEEE Signal Process. Mag..

[100]  Mauro Conti,et al.  A Survey of Man In The Middle Attacks , 2016, IEEE Communications Surveys & Tutorials.

[101]  Vic Barnett,et al.  Outliers in Statistical Data , 1980 .

[102]  Abhijit Chatterjee,et al.  Pro-VIZOR: Process tunable virtually zero margin low power adaptive RF for wireless systems , 2008, 2008 45th ACM/IEEE Design Automation Conference.

[103]  S.Iswarya,et al.  Biophysical Modeling, Characterization and Optimization of Electro-Quasistatic Human Body Communication , 2019 .

[104]  Shreyas Sen,et al.  Characterization and Classification of Human Body Channel as a function of Excitation and Termination Modalities , 2018, 2018 40th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC).

[105]  D. Janakiram,et al.  Outlier Detection in Wireless Sensor Networks using Bayesian Belief Networks , 2006, 2006 1st International Conference on Communication Systems Software & Middleware.

[106]  Abhijit Chatterjee,et al.  Environment-Adaptive Concurrent Companding and Bias Control for Efficient Power-Amplifier Operation , 2011, IEEE Transactions on Circuits and Systems I: Regular Papers.

[107]  Shreyas Sen,et al.  STELLAR: A Generic EM Side-Channel Attack Protection through Ground-Up Root-cause Analysis , 2019, 2019 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).

[108]  Miao Yun,et al.  Research on the architecture and key technology of Internet of Things (IoT) applied on smart grid , 2010, 2010 International Conference on Advances in Energy Engineering.

[109]  Abhijit Chatterjee,et al.  Self-Learning RF Receiver Systems: Process Aware Real-Time Adaptation to Channel Conditions for Low Power Operation , 2017, IEEE Transactions on Circuits and Systems I: Regular Papers.

[110]  Daniel E. Holcomb,et al.  Power-Up SRAM State as an Identifying Fingerprint and Source of True Random Numbers , 2009, IEEE Transactions on Computers.

[111]  Shreyas Sen,et al.  SocialHBC: Social Networking and Secure Authentication using Interference-Robust Human Body Communication , 2016, ISLPED.

[112]  I. Akyildiz WIRELESS MULTIMEDIA SENSOR NETWORKS : A SURVEY The uthors discusse , .

[113]  David Garlan,et al.  Project Aura: Toward Distraction-Free Pervasive Computing , 2002, IEEE Pervasive Comput..

[114]  Sadie Creese,et al.  Smart Insiders: Exploring the Threat from Insiders Using the Internet-of-Things , 2015, 2015 International Workshop on Secure Internet of Things (SIoT).

[115]  Ting Sun,et al.  Single-pixel imaging via compressive sampling , 2008, IEEE Signal Process. Mag..

[116]  Byung-Seo Kim,et al.  IoT Elements, Layered Architectures and Security Issues: A Comprehensive Survey , 2018, Sensors.

[117]  Arijit Raychowdhury,et al.  Integrated power management in IoT devices under wide dynamic ranges of operation , 2015, 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC).

[118]  Symeon Papavassiliou,et al.  Hierarchical Anomaly Detection in Distributed Large-Scale Sensor Networks , 2006, 11th IEEE Symposium on Computers and Communications (ISCC'06).

[119]  Gregory D. Abowd,et al.  Towards a Better Understanding of Context and Context-Awareness , 1999, HUC.

[120]  Man-Kay Law,et al.  A 0.45 V 147–375 nW ECG Compression Processor With Wavelet Shrinkage and Adaptive Temporal Decimation Architectures , 2017, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.

[121]  Hamid R. Rabiee,et al.  Reducing the data transmission in Wireless Sensor Networks using the Principal Component Analysis , 2010, 2010 Sixth International Conference on Intelligent Sensors, Sensor Networks and Information Processing.

[122]  Abhijit Chatterjee,et al.  Real-time use-aware adaptive MIMO RF receiver systems for energy efficiency under BER constraints , 2013, 2013 50th ACM/EDAC/IEEE Design Automation Conference (DAC).

[123]  Kaushik Roy,et al.  Exploiting Inherent Error Resiliency of Deep Neural Networks to Achieve Extreme Energy Efficiency Through Mixed-Signal Neurons , 2019, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.

[124]  David Brumley,et al.  Remote timing attacks are practical , 2003, Comput. Networks.

[125]  Joseph Kennedy,et al.  26.2 A 205mW 32Gb/s 3-Tap FFE/6-tap DFE bidirectional serial link in 22nm CMOS , 2014, 2014 IEEE International Solid-State Circuits Conference Digest of Technical Papers (ISSCC).

[126]  Arijit Raychowdhury,et al.  Smart Sensing for HVAC Control: Collaborative Intelligence in Optical and IR Cameras , 2018, IEEE Transactions on Industrial Electronics.

[127]  Srinivas Devadas,et al.  Modeling attacks on physical unclonable functions , 2010, CCS '10.

[128]  Jingcheng Wang,et al.  A novel mutual authentication scheme for Internet of Things , 2011, Proceedings of 2011 International Conference on Modelling, Identification and Control.

[129]  Ran Wolff,et al.  In-Network Outlier Detection in Wireless Sensor Networks , 2006, ICDCS.

[130]  Krishnamurthy Soumyanath,et al.  A 28mW Spectrum-Sensing Reconfigurable 20MHz 72dB-SNR 70dB-SNDR DT ΔΣ ADC for 802.11n/WiMAX Receivers , 2008, 2008 IEEE International Solid-State Circuits Conference - Digest of Technical Papers.

[131]  Marimuthu Palaniswami,et al.  Quarter Sphere Based Distributed Anomaly Detection in Wireless Sensor Networks , 2007, 2007 IEEE International Conference on Communications.

[132]  David L Donoho,et al.  Compressed sensing , 2006, IEEE Transactions on Information Theory.

[133]  Herbert A. Simon,et al.  Applications of machine learning and rule induction , 1995, CACM.

[134]  Srivaths Ravi,et al.  Security in embedded systems: Design challenges , 2004, TECS.

[135]  Abhishek Srivastava,et al.  Bio-WiTel: A Low Power Integrated Wireless Telemetry System for Healthcare Applications in 401-406 MHz Band of MedRadio Spectrum. , 2016, IEEE journal of biomedical and health informatics.

[136]  H.T. Friis,et al.  A Note on a Simple Transmission Formula , 1946, Proceedings of the IRE.

[137]  Abhijit Chatterjee,et al.  Real-Time Use-Aware Adaptive RF Transceiver Systems for Energy Efficiency Under BER Constraints , 2015, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.

[138]  Arijit Raychowdhury,et al.  A 55nm time-domain mixed-signal neuromorphic accelerator with stochastic synapses and embedded reinforcement learning for autonomous micro-robots , 2018, 2018 IEEE International Solid - State Circuits Conference - (ISSCC).

[139]  Marian Verhelst,et al.  Flexible and Self-Adaptive Sense-and-Compress for Sub-MicroWatt Always-on Sensory Recording , 2018, ESSCIRC 2018 - IEEE 44th European Solid State Circuits Conference (ESSCIRC).

[140]  Lovekesh Vig,et al.  Long Short Term Memory Networks for Anomaly Detection in Time Series , 2015, ESANN.

[141]  Ali Ismail Awad,et al.  A Distributed Security Mechanism for Resource-Constrained IoT Devices , 2016, Informatica.

[142]  W. Marsden I and J , 2012 .

[143]  Hwee Pink Tan,et al.  Machine Learning in Wireless Sensor Networks: Algorithms, Strategies, and Applications , 2014, IEEE Communications Surveys & Tutorials.

[144]  Abhijit Chatterjee,et al.  VIZOR: Virtually zero margin adaptive RF for ultra low power wireless communication , 2007, 2007 25th International Conference on Computer Design.

[145]  Arijit Raychowdhury,et al.  A 130 nm 165 nJ/frame Compressed-Domain Smashed-Filter-Based Mixed-Signal Classifier for “In-Sensor” Analytics in Smart Cameras , 2018, IEEE Transactions on Circuits and Systems II: Express Briefs.

[146]  Yücel Altunbasak,et al.  PINCO: a pipelined in-network compression scheme for data collection in wireless sensor networks , 2003, Proceedings. 12th International Conference on Computer Communications and Networks (IEEE Cat. No.03EX712).

[147]  Sungyoung Lee,et al.  Compressive sensing: From theory to applications, a survey , 2013, Journal of Communications and Networks.

[148]  Jean-Louis Lacoume,et al.  A Proposition for Correlation Power Analysis Enhancement , 2006, CHES.

[149]  Shreyas Sen,et al.  A 32 Gb/s Bidirectional 4-channel 4 pJ/b Capacitively Coupled Link in 14 nm CMOS for Proximity Communication , 2016, IEEE Journal of Solid-State Circuits.

[150]  Pedram Mohseni,et al.  30 pJ/b, 67 Mbps, Centimeter-to-Meter Range Data Telemetry With an IR-UWB Wireless Link , 2015, IEEE Transactions on Biomedical Circuits and Systems.

[151]  Antonio Iera,et al.  The Internet of Things: A survey , 2010, Comput. Networks.

[152]  Shreyas Sen,et al.  RF-PUF: IoT security enhancement through authentication of wireless nodes using in-situ machine learning , 2018, 2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).

[153]  Christophe Clavier,et al.  Correlation Power Analysis with a Leakage Model , 2004, CHES.

[154]  Leyla Bilge,et al.  Before we knew it: an empirical study of zero-day attacks in the real world , 2012, CCS.

[155]  Eran Hammer-Lahav,et al.  The OAuth 1.0 Protocol , 2010, RFC.

[156]  Tom Rodden,et al.  Exploiting Context in HCI Design for Mobile Systems , 1998 .

[157]  T. Cover Hypothesis Testing with Finite Statistics , 1969 .

[158]  C. Jayakumar,et al.  Node capture attack in Wireless Sensor Network: A survey , 2012, 2012 IEEE International Conference on Computational Intelligence and Computing Research.

[159]  Santosh Ghosh,et al.  ASNI: Attenuated Signature Noise Injection for Low-Overhead Power Side-Channel Attack Immunity , 2018, IEEE Transactions on Circuits and Systems I: Regular Papers.

[160]  Marimuthu Palaniswami,et al.  Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..

[161]  Shreyas Sen,et al.  A sub-nW Wake-up Receiver for Human Body Communication , 2018, 2018 IEEE Biomedical Circuits and Systems Conference (BioCAS).

[162]  Jan M. Rabaey,et al.  A 2.4 GHz Interferer-Resilient Wake-Up Receiver Using A Dual-IF Multi-Stage N-Path Architecture , 2016, IEEE Journal of Solid-State Circuits.

[163]  Shreyas Sen,et al.  X-DeepSCA: Cross-Device Deep Learning Side Channel Attack* , 2019, 2019 56th ACM/IEEE Design Automation Conference (DAC).

[164]  Kaushik Roy,et al.  An Energy-Efficient Mixed-Signal Neuron for Inherently Error-Resilient Neuromorphic Systems , 2017, 2017 IEEE International Conference on Rebooting Computing (ICRC).

[165]  Arijit Raychowdhury,et al.  Appearance-based gesture recognition in the compressed domain , 2017, 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[166]  Dimitrios Peroulis,et al.  A Wearable Real-time CMOS Dosimeter with Integrated Zero-bias Floating-Gate Sensor and an 861nW 18-bit Energy-Resolution Scalable Time-based Radiation to Digital Converter , 2019, 2019 IEEE Custom Integrated Circuits Conference (CICC).

[167]  Srinivas Devadas,et al.  Physical Unclonable Functions and Applications: A Tutorial , 2014, Proceedings of the IEEE.