Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article
Public Access

Fundamental Challenges Toward Making the IoT a Reachable Reality: A Model-Centric Investigation

Published: 21 April 2017 Publication History

Abstract

Constantly advancing integration capability is paving the way for the construction of the extremely large scale continuum of the Internet where entities or things from vastly varied domains are uniquely addressable and interacting seamlessly to form a giant networked system of systems known as the Internet-of-Things (IoT). In contrast to this visionary networked system paradigm, prior research efforts on the IoT are still very fragmented and confined to disjoint explorations of different applications, architecture, security, services, protocol, and economical domains, thus preventing design exploration and optimization from a unified and global perspective. In this context, this survey article first proposes a mathematical modeling framework that is rich in expressivity to capture IoT characteristics from a global perspective. It also sets forward a set of fundamental challenges in sensing, decentralized computation, robustness, energy efficiency, and hardware security based on the proposed modeling framework. Possible solutions are discussed to shed light on future development of the IoT system paradigm.

References

[1]
B. Abinaya and S. Sophia. 2015. An event based CMOS quad bilateral combination with asynchronous SRAM architecture based neural network using low power. In Proceedings of the 2015 2nd International Conference on Electronics and Communication Systems (ICECS’15). IEEE, Los Alamitos, CA, 995--999.
[2]
Charu C. Aggarwal, Naveen Ashish, and Amit P. Sheth. 2013. The Internet of Things: A survey from the data-centric perspective. In Managing and Mining Sensor Data. Springer, 383--428.
[3]
Pandarasamy Arjunan, Nipun Batra, Haksoo Choi, Amarjeet Singh, Pushpendra Singh, and Mani B. Srivastava. 2012. SensorAct: A privacy and security aware federated middleware for building management. In Proceedings of the 4th ACM Workshop on Embedded Sensing Systems for Energy-Efficiency in Buildings. ACM, New York, NY, 80--87.
[4]
Manish Arora, Srilatha Manne, Yasuko Eckert, Indrani Paul, Nuwan Jayasena, and Dean Tullsen. 2014. A comparison of core power gating strategies implemented in modern hardware. In Proceedings of the 2014 ACM International Conference on Measurement and Modeling of Computer Systems. ACM, New York, NY, 559--560.
[5]
Hamed Babazadeh, Babak Asghari, and Ritu Sharma. 2014. A new control scheme in a multi-battery management system for expanding microgrids. In Proceedings of the 2014 IEEE PES Innovative Smart Grid Technologies Conference (ISGT’14). IEEE, Los Alamitos, CA, 1--5.
[6]
Emmanuel Baccelli, Christian Mehlis, Oliver Hahm, Thomas C. Schmidt, and Matthias Wählisch. 2014. Information centric networking in the IoT: Experiments with NDN in the wild. arXiv:1406.6608.
[7]
Alessandro Bardine, Manuel Comparetti, Pierfrancesco Foglia, and Cosimo Antonio Prete. 2014. Evaluation of leakage reduction alternatives for deep submicron dynamic nonuniform cache architecture caches. IEEE Transactions on Very Large Scale Integration (VLSI) Systems 22, 1, 185--190.
[8]
Luigi Battista, Laura Mecozzi, Sara Coppola, Veronica Vespini, Simonetta Grilli, and Pietro Ferraro. 2014. Graphene and carbon black nano-composite polymer absorbers for a pyro-electric solar energy harvesting device based on LiNbO 3 crystals. Applied Energy 136, 357--362.
[9]
Paul Bogdan. 2015. A cyber-physical systems approach to personalized medicine: Challenges and opportunities for NOC-based multicore platforms. In Proceedings of the 2015 Design, Automation, and Test in Europe Conference and Exhibition. 253--258.
[10]
Paul Bogdan and Yuankun Xue. 2015. Cyber-physical systems for personalized and precise medicine. In Proceedings of the 2015 IEEE 58th International Midwest Symposium on Circuits and Systems (MWSCAS’15). IEEE, Los Alamitos, CA, 1--4.
[11]
Flavio Bonomi, Rodolfo Milito, Jiang Zhu, and Sateesh Addepalli. 2012. Fog computing and its role in the Internet of Things. In Proceedings of the 1st Edition of the MCC Workshop on Mobile Cloud Computing. ACM, New York, NY, 13--16.
[12]
Benjamin A. Braun, Suman Jana, and Dan Boneh. 2015. Robust and efficient elimination of cache and timing side channels. arXiv:1506.00189.
[13]
B. Brunekreef, R. M. J. Beelen, G. Hoek, L. J. Schouten, S. Bausch-Goldbohm, P. Fischer, B. Armstrong, et al. 2009. Effects of long-term exposure to traffic-related air pollution on respiratory and cardiovascular mortality in the Netherlands: The NLCS-AIR study. Research Report (Health Effects Institute) 139139, 5--71.
[14]
H. G. Canepa and D. Lee. 2010. A virtual cloud computing provider for mobile devices. In Proceedings of the 1st ACM Workshop on Mobile Cloud Computing and Services: Social Networks and Beyond (MSC’10). Article No. 6.
[15]
Aranya Chakrabortty and Marija D. Ilic. 2012. Control and Optimization Methods for Electric Smart Grids. Springer.
[16]
Meng-Fan Chang, Chien-Fu Chen, Ting-Hao Chang, Chi-Chang Shuai, Yen-Yao Wang, and Hiroyuki Yamauchi. 2015. 17.3: A 28nm 256kb 6T-SRAM with 280mV improvement in VMIN using a dual-split-control assist scheme. In Proceedings of the 2015 IEEE International Solid-State Circuits Conference (ISSCC’15). IEEE, Los Alamitos, CA, 1--3.
[17]
Naehyuck Chang, Donkyu Baek, and Jeongmin Hong. 2014. Power consumption characterization, modeling and estimation of electric vehicles. In Proceedings of the 2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD’14). IEEE, Los Alamitos, CA, 175--182.
[18]
Heng-Tze Cheng, Feng-Tso Sun, Senaka Buthpitiya, and Martin Griss. 2010. SensOrchestra: Collaborative sensing for symbolic location recognition. In Mobile Computing, Applications, and Services. Springer, 195--210.
[19]
Haksoo Choi, Supriyo Chakraborty, and Mani B. Srivastava. 2012. Design and evaluation of SensorSafe: A framework for achieving behavioral privacy in sharing personal sensory information. In Proceedings of the 2012 IEEE 11th International Conference on Trust, Security, and Privacy in Computing and Communications (TrustCom’12). IEEE, Los Alamitos, CA, 1004--1011.
[20]
Richard Cimler, Jan Matyska, and Vladimir Sobeslav. 2014. Cloud based solution for mobile healthcare application. In Proceedings of the 18th International Database Engineering and Applications Symposium. ACM, New York, NY, 298--301.
[21]
Andrew Clark, Basel Alomair, Linda Bushnell, and Radha Poovendran. 2016. Submodularity in Dynamics and Control of Networked Systems. Springer.
[22]
Ronald P. Cocchi, James P. Baukus, Lap Wai Chow, and B. Jiangyun Wang. 2014. Circuit camouflage integration for hardware IP protection. In Proceedings of the 2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC’14). IEEE, Los Alamitos, CA, 1--5.
[23]
Cisco. 2015. Build a Secure, Manageable Network for Tomorrow, Today. Retrieved January 28, 2017, from http://www.cisco.com/web/solutions/trends/iot/security.html.
[24]
Soumya Kanti Datta, Christian Bonnet, and Navid Nikaein. 2014. An IoT gateway centric architecture to provide novel M2M services. In Proceedings of the 2014 IEEE World Forum on Internet of Things (WF-IoT’14). IEEE, Los Alamitos, CA, 514--519.
[25]
Jeroen Delvaux and Ingrid Verbauwhede. 2014. Fault injection modeling attacks on 65 nm arbiter and RO sum PUFs via environmental changes. IEEE Transactions on Circuits and Systems I: Regular Papers 61, 6, 1701--1713.
[26]
John Demme, Robert Martin, Adam Waksman, and Simha Sethumadhavan. 2012. Side-channel vulnerability factor: A metric for measuring information leakage. ACM SIGARCH Computer Architecture News 40, 106--117.
[27]
Caiwen Ding, Soroush Heidari, Yanzhi Wang, Yongpan Liu, and Jingtong Hu. 2016. Multi-source in-door energy harvesting for non-volatile processors. In Proceedings of the 2016 IEEE International Symposium on Circuits and Systems (ISCAS’16). IEEE, Los Alamitos, CA, 173--176.
[28]
Mohamed El Massad, Siddharth Garg, and Mahesh V. Tripunitara. 2015. Integrated circuit (IC) decamouflaging: Reverse engineering camouflaged ICs within minutes. In Proceedings of the 2015 Network and Distributed System Security Symposium (NDSS’15).
[29]
Nazar Fadhil, Dleer Saber, Paris Cox, Kripa Vanashi, and Prabir Patra. 2014. Energy Harvesting Using Nano-Fibers PVDF\Graphene Composite for Medical Implanted Devices. Available at https://scholarworks. bridgeport.edu/xmlui/handle/123456789/644.
[30]
Junfeng Fan, Hua Xie, and Yiwei Zhang. 2014. On the use of scan chain to improve physical attacks. In Proceedings of the 2014 IEEE 23rd Asian Test Symposium (ATS’14). IEEE, Los Alamitos, CA, 354--357.
[31]
Xin Fang, Pei Luo, Yunsi Fei, and Miriam Leeser. 2015. Balance power leakage to fight against side-channel analysis at gate level in FPGAs. In Proceedings of the 2015 IEEE 26th International Conference on Application-Specific Systems, Architectures, and Processors (ASAP’15). IEEE, Los Alamitos, CA, 154--155.
[32]
Hamza Fawzi, Paulo Tabuada, and Suhas Diggavi. 2014. Secure estimation and control for cyber-physical systems under adversarial attacks. IEEE Transactions on Automatic Control 59, 6, 1454--1467.
[33]
Jonathan Frey and Qiaoyan Yu. 2015. Exploiting state obfuscation to detect hardware trojans in NoC network interfaces. In Proceedings of the 2015 IEEE 58th International Midwest Symposium on Circuits and Systems (MWSCAS’15). IEEE, Los Alamitos, CA, 1--4.
[34]
C. Gentry. 2009. A Fully Homomorphic Encryption Scheme. Ph.D. Dissertation. Stanford University, Stanford, CA.
[35]
Mahboobeh Ghorbani and Paul Bogdan. 2013. A cyber-physical system approach to artificial pancreas design. In Proceedings of the 9th IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis. IEEE, Los Alamitos, CA, 17.
[36]
Romeo Giuliano, Franco Mazzenga, Alessandro Neri, and Anna Maria Vegni. 2014. Security access protocols in IoT networks with heterogenous non-IP terminals. In Proceedings of the 2014 IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS’14). IEEE, Los Alamitos, CA, 257--262.
[37]
Pietro Gonizzi, Gianluigi Ferrari, Vincent Gay, and Jérémie Leguay. 2015. Data dissemination scheme for distributed storage for IoT observation systems at large scale. Information Fusion 22, 16--25.
[38]
Ragib Hasan, Md Mahmud Hossain, and Rasib Khan. 2015. Aura: An IoT based cloud infrastructure for localized mobile computation outsourcing. In Proceedings of the 2015 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud’15). IEEE, Los Alamitos, CA, 183--188.
[39]
Soroush Heidari, Caiwen Ding, Yongpan Liu, Yanzhi Wang, and Jingtong Hu. 2015. Multi-source energy harvesting management and optimization for non-volatile processors. In Proceedings of the 2015 6th International Green Computing Conference and Sustainable Computing Conference (IGSC’15). IEEE, Los Alamitos, CA, 1--2.
[40]
R. Herring, A. Hofleitner, S. Amin, T. Nasr, A. Khalek, P. Abbeel, and A. Bayen. 2010. Using mobile phones to forecast arterial traffic through statistical learning. In Proceedings of the 89th Transporation Research Board Annual Meeting.
[41]
G. Hills, M. Shulaker, H. Wei, H.-Y. Chen, H.-S. Philip Wong, and S. Mitra. 2014. Robust design and experimental demonstrations of carbon nanotube digital circuits. In Proceedings of the 2014 IEEE Custom Integrated Circuits Conference (CICC’14). IEEE, Los Alamitos, CA, 1--4.
[42]
Doan B. Hoang and Lingfeng Chen. 2010. Mobile cloud for assistive healthcare (MoCAsH). In Proceedings of the 2010 IEEE Asia-Pacific Services Computing Conference (APSCC’10). IEEE, Los Alamitos, CA, 325--332.
[43]
Daniel E. Holcomb and Kevin Fu. 2014. Bitline PUF: Building native challenge-response PUF capability into any SRAM. In Cryptographic Hardware and Embedded Systems—CHES 2014. Lecture Notes in Computer Science, Vol. 8731. Springer, 510--526.
[44]
Infineon. 2015. The Right Security for the Internet of Things (IoT). Retrieved January 28, 2017, from http://www.infineon.com/cms/en/applications/chip-card-security/internet-of-things-security.
[45]
Rudolf Emil Kalman. 1963. Mathematical description of linear dynamical systems. Journal of the Society for Industrial and Applied Mathematics, Series A: Control 1, 2, 152--192.
[46]
Ramesh Karri, Farinaz Koushanfar, Ozgur Sinanoglu, Yiorgos Makris, Ken Mai, Ahmad Reza Sadeghi, and Swarup Bhunia. 2015. Guest editorial special section on hardware security and trust. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 34, 6, 873--874.
[47]
Youhei Kawahara, Ryouhei Nakao, Akihiko Kudo, Akihiko Emori, and Kei Sakabe. 2014. Battery control circuit for reducing power consumption. US Patent 8,736,229.
[48]
Sungwook Kim. 2015. Nested game-based computation offloading scheme for mobile cloud IoT systems. EURASIP Journal on Wireless Communications and Networking 2015, 1, 1--11.
[49]
Christian Kison, Jürgen Frinken, and Christof Paar. 2015. Finding the AES bits in the haystack: Reverse engineering and SCA using voltage contrast. In Cryptographic Hardware and Embedded Systems—CHES 2015. Lecture Notes in Computer Science, Vol. 9293. Springer, 641--660.
[50]
Bill Kleyman. 2013. Welcome to Fog Computing: Extending the Cloud to the Edge. Retrieved January 28, 2017, from http://www.datacenterknowledge.com/archives/2013/08/23/welcome-to-the-fog-a-new-type-of-distributed-computing.
[51]
Alicia Klinefelter, Nathan E. Roberts, Yousef Shakhsheer, Patricia Gonzalez, Aatmesh Shrivastava, Abhishek Roy, Kyle Craig, et al. 2015. 21.3: A 6.45μW self-powered IoT SoC with integrated energy-harvesting power management and ULP asymmetric radios. In Proceedings of the 2015 IEEE International Solid-State Circuits Conference (ISSCC’15). IEEE, Los Alamitos, CA, 1--3.
[52]
Jakub Korczyc and Andrzej Krasniewski. 2012. Evaluation of susceptibility of FPGA-based circuits to fault injection attacks based on clock glitching. In Proceedings of the 2012 IEEE 15th International Symposium on Design and Diagnostics of Electronic Circuits and Systems (DDECS’15). IEEE, Los Alamitos, CA, 171--174.
[53]
Andreas Krause and Carlos E. Guestrin. 2012. Near-optimal nonmyopic value of information in graphical models. arXiv:1207.1394.
[54]
Karthik Kumar and Yung-Hsiang Lu. 2010. Cloud computing for mobile users: Can offloading computation save energy? Computer 44, 51--56.
[55]
Santosh Kumar, Wendy Nilsen, Misha Pavel, and Mani Srivastava. 2013. Mobile health: Revolutionizing healthcare through transdisciplinary research. Computer 11, 28--35.
[56]
Tung-Wei Kuo, Kate Ching-Ju Lin, and Ming-Jer Tsai. 2015. Maximizing submodular set function with connectivity constraint: Theory and application to networks. IEEE/ACM Transactions on Networking 23, 2, 533--546.
[57]
Nicholas D. Lane, Emiliano Miluzzo, Hong Lu, Daniel Peebles, Tanzeem Choudhury, and Andrew T. Campbell. 2010. A survey of mobile phone sensing. IEEE Communications Magazine 48, 9, 140--150.
[58]
Timo Lanki, Regina Hampel, Pekka Tiittanen, Silke Andrich, Rob Beelen, Bert Brunekreef, Julia Dratva, et al. 2015. Air pollution from road traffic and systemic inflammation in adults: A cross-sectional analysis in the European ESCAPE project. Environmental Health Perspectives 123, 8, 785--791.
[59]
Hyung Gyu Lee and Naehyuck Chang. 2015. Powering the IoT: Storage-less and converter-less energy harvesting. In Proceedings of the 20th Asia and South Pacific Design Automation Conference. IEEE, Los Alamitos, CA, 124--129.
[60]
Liran Lerman, Gianluca Bontempi, and Olivier Markowitch. 2014. Power analysis attack: An approach based on machine learning. International Journal of Applied Cryptography 3, 2, 97--115.
[61]
Philip Levis. 2015. Securing the Internet of Things. Retrieved January 28, 2017, from http://iot.stanford. edu/seminar/sitp-w15-levis.pdf.
[62]
Ji Li, Yanzhi Wang, Xue Lin, Shahin Nazarian, and Massoud Pedram. 2015b. Negotiation-based task scheduling and storage control algorithm to minimize user’s electric bills under dynamic prices. In Proceedings of the 2015 20th Asia and South Pacific Design Automation Conference (ASP-DAC’15). IEEE, Los Alamitos, CA, 261--266.
[63]
Ji Li, Yanzhi Wang, Xue Lin, Shahin Nazarian, and Massoud Pedram. 2016. Negotiation-based resource provisioning and task scheduling algorithm for cloud systems. In Proceedings of the 2016 17th International Symposium on Quality Electronic Design (ISQED’16). IEEE, Los Alamitos, CA, 338--343.
[64]
Ji Li, Qing Xie, Yanzhi Wang, Shahin Nazarian, and Massoud Pedram. 2015. Leakage power reduction for deeply-scaled FinFET circuits operating in multiple voltage regimes using fine-grained gate-length biasing technique. In Proceedings of the 2015 Design, Automation, and Test in Europe Conference and Exhibition. 1579--1582.
[65]
Shancang Li, Li Da Xu, and Xinheng Wang. 2013. Compressed sensing signal and data acquisition in wireless sensor networks and Internet of Things. IEEE Transactions on Industrial Informatics 9, 4, 2177--2186.
[66]
Wenzhong Li, Yuefei Hu, Xiaoming Fu, Sanglu Lu, and Daoxu Chen. 2015a. Cooperative positioning and tracking in disruption tolerant networks. IEEE Transactions on Parallel and Distributed Systems 26, 2, 382--391.
[67]
Xiaofei Liu, Sergio Pequito, Soummya Kar, Bruno Sinopoli, and A. Pedro Aguiar. 2015. Minimum sensor placement for robust observability of structured complex networks. arXiv:1507.07205.
[68]
Xiaowei Liu, Honglin Xu, Liang Yin, Zhiqiang Gao, and Mingyuan Ren. 2014. A low noise sigma-delta microaccelerometer interface circuit. IEICE Electronics Express 11, 12, 1--6.
[69]
Yang-Yu Liu, Jean-Jacques Slotine, and Albert-László Barabási. 2013a. Observability of complex systems. Proceedings of the National Academy of Sciences 110, 7, 2460--2465.
[70]
Lucia Marucci, David A. W. Barton, Irene Cantone, Maria Aurelia Ricci, Maria Pia Cosma, Stefania Santini, Diego di Bernardo, and Mario di Bernardo. 2009. How to turn a genetic circuit into a synthetic tunable oscillator, or a bistable switch. PLoS One 4, 12, e8083.
[71]
Daniel H. Morris, Uygar E. Avci, and Ian A. Young. 2015. Variation-tolerant dense TFET memory with low V MIN matching low-voltage TFET logic. In Proceedings of the 2015 Symposium on VLSI Technology (VLSI Technology’15). IEEE, Los Alamitos, CA, T24--T25.
[72]
David E. Noel and M. Lisa Miller. 2012. A risk assessment technique: For predicting the magnitude of satellite programming theft. Ethics and Critical Thinking Journal 2012, 1, 28--37.
[73]
Job Noorman, Pieter Agten, Wilfried Daniels, Raoul Strackx, Anthony Van Herrewege, Christophe Huygens, Bart Preneel, Ingrid Verbauwhede, and Frank Piessens. 2013. Sancus: Low-cost trustworthy extensible networked devices with a zero-software trusted computing base. In Proceedings of the 22nd USENIX Security Symposium (USENIX Security’13). 479--498.
[74]
David Oswald, Daehyun Strobel, Falk Schellenberg, Timo Kasper, and Christof Paar. 2014. When reverse-engineering meets side-channel analysis--digital lockpicking in practice. In Selected Areas in Cryptography—SAC 2013. Lecture Notes in Computer Science, Vol. 8282. Springer, 571--588.
[75]
Masaru Oya, Yuta Atobe, Youhua Shi, Masao Yanagisawa, and Nozomu Togawa. 2014. Secure scan design using improved random order and its evaluations. In Proceedings of the 2014 IEEE Asia Pacific Conference on Circuits and Systems (APCCAS’14). IEEE, Los Alamitos, CA, 555--558.
[76]
Hewlett Packard. 2015. Internet of Things Research Study. Retrieved January 28, 2017, from https://www. hpe.com/h20195/v2/GetPDF.aspx/4AA5-4759ENN.pdf.
[77]
Miroslav Pajic, Paulo Tabuada, Insup Lee, and George J. Pappas. 2015. Attack-resilient state estimation in the presence of noise. In Proceedings of the 2015 54th IEEE Conference on Decision and Control (CDC’15). IEEE, Los Alamitos, CA, 5827--5832.
[78]
Sergio Pequito, Paul Bogdan, and George J. Pappas. 2015. Minimum number of probes for brain dynamics observability. In Proceedings of the 2015 54th IEEE Conference on Decision and Control (CDC’15). IEEE, Los Alamitos, CA, 306--311.
[79]
Sergio Pequito, Soummya Kar, and A. Pedro Aguiar. 2014. Minimum number of information gatherers to ensure full observability of a dynamic social network: A structural systems approach. In Proceedings of the 2014 IEEE Global Conference on Signal and Information Processing (GlobalSIP’14). IEEE, Los Alamitos, CA, 750--753.
[80]
Hauke Petersen, Emmanuel Baccelli, Matthias Wählisch, Thomas C. Schmidt, and Jochen Schiller. 2014. The role of IoT in network resilience. arXiv:1406.6614.
[81]
Nathaniel Pinckney, Lucian Shifren, Brian Cline, Saurabh Sinha, Supreet Jeloka, Ronald G. Dreslinski, Trevor Mudge, Dennis Sylvester, and David Blaauw. 2016. Near-threshold computing in FinFET technologies: Opportunities for improved voltage scalability. In Proceedings of the 53rd Annual Design Automation Conference. ACM, New York, NY, 76.
[82]
Henrich C. Pohls, Vangelis Angelakis, Santiago Suppan, Kai Fischer, George Oikonomou, Elias Z. Tragos, Rodrigo Diaz Rodriguez, and Theodoros Mouroutis. 2014. RERUM: Building a reliable IoT upon privacy-and security-enabled smart objects. In Proceedings of the 2014 IEEE Wireless Communications and Networking Conference Workshops (WCNCW’14).IEEE, Los Alamitos, CA, 122--127.
[83]
Owen Poindexter. 2014. The Internet of Things Will Thrive on Energy Efficiency. Retrieved January 28, 2017, from http://www.govtech.com/fs/news/The-Internet-of-Things-Will-Thrive-On-Energy-Efficiency-.html.
[84]
Indika Rajapakse, Mark Groudine, and Mehran Mesbahi. 2012. What can systems theory of networks offer to biology? PLoS Computational Biology 8, 6, e1002543.
[85]
Craig Rawlings. 2008. Raising the bar for hardware security: Physical layer security in standard CMOS. In Proceedings of the 2008 IEEE Conference on Technologies for Homeland Security. IEEE, Los Alamitos, CA, 263--268.
[86]
Mohamad Rostami, Farinaz Koushanfar, and Ramesh Karri. 2014. A primer on hardware security: Models, methods, and metrics. Proceedings of the IEEE 102, 8, 1283--1295.
[87]
Ulrich Rührmair, Ulf Schlichtmann, and Wayne Burleson. 2014. Special session: How secure are PUFs really? On the reach and limits of recent PUF attacks. In Proceedings of the Conference on Design, Automation, and Test in Europe. 346.
[88]
Somia Sahraoui and Azeddine Bilami. 2014. Compressed and distributed host identity protocol for end-to-end security in the IoT. In Proceedings of the 2014 5th International Conference on Next Generation Networks and Services (NGNS’14). IEEE, Los Alamitos, CA, 295--301.
[89]
I. Sengupta and A. Das Barman. 2015. Investigation of inter-channel crosstalk mitigation by assist light in a TOAD switch by using electrical equivalent circuit model of SOA. Optical and Quantum Electronics 47, 2, 331--350.
[90]
Hossein Shafagh, Anwar Hithnawi, Andreas Dröscher, Simon Duquennoy, and Wen Hu. 2015. Poster: Towards encrypted query processing for the Internet of Things. In Proceedings of the 21st Annual International Conference on Mobile Computing and Networking. ACM, New York, NY, 251--253.
[91]
Mitsuru Shiozaki, Takaya Kubota, Tsunato Nakai, Akihiro Takeuchi, Takashi Nishimura, and Takeshi Fujino. 2015. Tamper-resistant authentication system with side-channel attack resistant AES and PUF using MDR-ROM. In Proceedings of the 2015 IEEE International Symposium on Circuits and Systems (ISCAS’15). IEEE, Los Alamitos, CA, 1462--1465.
[92]
Sergei Skorobogatov. 2014. Tamper resistance and hardware security. Guest lecture in the Part II Security course.
[93]
Yuning Song, Huadong Ma, and Liang Liu. 2013. Content-centric internetworking for resource-constrained devices in the Internet of Things. In Proceedings of the 2013 IEEE International Conference on Communications (ICC’13). IEEE, Los Alamitos, CA, 1742--1747.
[94]
John A. Stankovic. 2014. Research directions for the Internet of Things. IEEE Internet of Things Journal 1, 1, 3--9.
[95]
An Steegen. 2015. Technology innovation in an IoT era. In Proceedings of the 2015 Symposium on VLSI Technology (VLSI Technology’15). IEEE, Los Alamitos, CA, C170--C171.
[96]
Franco Stellari, Peilin Song, and Herschel Ainspan. 2014. Functional block extraction for hardware security detection using time-integrated and time-resolved emission measurements. In Proceedings of the 2014 IEEE 32nd VLSI Test Symposium (VTS’14). IEEE, Los Alamitos, CA, 1--6.
[97]
G. Edward Suh and Srinivas Devadas. 2007. Physical unclonable functions for device authentication and secret key generation. In Proceedings of the 44th Annual Design Automation Conference. ACM, New York, NY, 9--14.
[98]
Arvind Thiagarajan, Lenin Ravindranath, Katrina LaCurts, Samuel Madden, Hari Balakrishnan, Sivan Toledo, and Jakob Eriksson. 2009. VTrack: Accurate, energy-aware road traffic delay estimation using mobile phones. In Proceedings of the 7th ACM Conference on Embedded Networked Sensor Systems. ACM, New York, NY, 85--98.
[99]
Narseo Vallina-Rodriguez and Jon Crowcroft. 2011. ErdOS: Achieving energy savings in mobile OS. In Proceedings of the 6th International Workshop on MobiArch (MobiArch’11). ACM, New York, NY, 37--42.
[100]
Hong Sheng Wang, Dao Gang Ji, Yang Zhang, Kai Yan Chen, and Kai Song. 2014. Optical fault injection attacks against cipher chip. In Advanced Materials Research, Vol. 1044. Trans Tech Publications, 1498--1502.
[101]
David J. Watson, James Bielman, Phillip L. Barrett, and Nicole A. Hamilton. 2013. System and method for automatically creating a media archive from content on a recording medium. US Patent 8,582,954.
[102]
Sheng Wei, James B. Wendt, Ani Nahapetian, and Miodrag Potkonjak. 2014. Reverse engineering and prevention techniques for physical unclonable functions using side channels. In Proceedings of the 51st Annual Design Automation Conference. ACM, New York, NY, 1--6.
[103]
James B. Wendt and Miodrag Potkonjak. 2014. Hardware obfuscation using PUF-based logic. In Proceedings of the 2014 IEEE/ACM International Conference on Computer-Aided Design. IEEE, Los Alamitos, CA, 270--277.
[104]
Chia-Ming Wu, Ruay-Shiung Chang, and Hsin-Yu Chan. 2014. A green energy-efficient scheduling algorithm using the DVFS technique for cloud datacenters. Future Generation Computer Systems 37, 141--147.
[105]
Huaming Wu, Qiushi Wang, and Katinka Wolter. 2013. Mobile healthcare systems with multi-cloud offloading. In Proceedings of the 2013 IEEE 14th International Conference on Mobile Data Management (MDM’13), Vol. 2. IEEE, Los Alamitos, CA, 188--193.
[106]
Kai-Chiang Wu and Diana Marculescu. 2014. Power-planning-aware soft error hardening via selective voltage assignment. IEEE Transactions on Very Large Scale Integration (VLSI) Systems 22, 1, 136--145.
[107]
Sheng Xiao, Weibo Gong, and Don Towsley. 2014. Dynamic key management in a smart grid. In Dynamic Secrets in Communication Security. Springer, 55--68.
[108]
Teng Xu, James B. Wendt, and Miodrag Potkonjak. 2014. Security of IoT systems: Design challenges and opportunities. In Proceedings of the 2014 IEEE/ACM International Conference on Computer-Aided Design. IEEE, Los Alamitos, CA, 417--423.
[109]
Yuankun Xue, Sergio Pequito, Joana R. Coelho, Paul Bogdan, and George J. Pappas. 2016a. Minimum number of sensors to ensure observability of physiological systems: A case study. In Proceedings of the 2016 54th Annual Allerton Conference on Communication, Control, and Computing (Allerton). IEEE, Los Alamitos, CA.
[110]
Yuankun Xue, Saul Rodriguez, and Paul Bogdan. 2016b. A spatio-temporal fractal model for a CPS approach to brain-machine-body interfaces. In Proceedings of the 2016 Design, Automation, and Test in Europe Conference and Exhibition (DATE’16). IEEE, Los Alamitos, CA, 642--647.
[111]
Farah B. Yahya, Harsh N. Patel, Vikas Chandra, and Benton H. Calhoun. 2015. Combined SRAM read/write assist techniques for near/sub-threshold voltage operation. In Proceedings of the 2015 6th Asia Symposium on Quality Electronic Design (ASQED’15). IEEE, Los Alamitos, CA, 1--6.
[112]
Yatao Yang, Shuang Zhang, Junming Yang, Jia Li, and Zichen Li. 2014. Targeted fully homomorphic encryption based on a double decryption algorithm for polynomials. Tsinghua Science and Technology 19, 5, 478--485.
[113]
Andrea Zanella, Nicola Bui, Angelo Castellani, Lorenzo Vangelista, and Michele Zorzi. 2014. Internet of Things for smart cities. IEEE Internet of Things Journal 1, 1, 22--32.
[114]
Jiliang Zhang. 2015. A practical logic obfuscation technique for hardware security. IEEE Transactions on Very Large Scale Integration (VLSI) Systems 24, 3, 1193--1197.
[115]
Zhi-Kai Zhang, Michael Cheng Yi Cho, Chia-Wei Wang, Chia-Wei Hsu, Chong-Kuan Chen, and Shiuhpyng Shieh. 2014. IoT security: Ongoing challenges and research opportunities. In Proceedings of the 2014 IEEE 7th International Conference on Service-Oriented Computing and Applications (SOCA’14). IEEE, Los Alamitos, CA, 230--234.
[116]
Jizhong Zhu. 2015. Optimization of Power System Operation. Vol. 47. John Wiley 8 Sons.
[117]
Yi Zhuang, Nan Jiang, Zhiang Wu, Qing Li, Dickson K. W. Chiu, and Hua Hu. 2014. Efficient and robust large medical image retrieval in mobile cloud computing environment. Information Sciences 263, 60--86.

Cited By

View all
  • (2023)AIoTML: A Unified Modeling Language for AIoT-Based Cyber–Physical SystemsIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems10.1109/TCAD.2023.326478642:11(3545-3558)Online publication date: Nov-2023
  • (2023)A Review of Energy Aware Cyber-Physical SystemsCyber-Physical Systems10.1080/23335777.2022.216329810:1(1-42)Online publication date: 7-Jan-2023
  • (2023)Internet of things: Conceptual network structure, main challenges and future directionsDigital Communications and Networks10.1016/j.dcan.2022.04.0279:3(677-687)Online publication date: Jun-2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Design Automation of Electronic Systems
ACM Transactions on Design Automation of Electronic Systems  Volume 22, Issue 3
July 2017
440 pages
ISSN:1084-4309
EISSN:1557-7309
DOI:10.1145/3062395
  • Editor:
  • Naehyuck Chang
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Journal Family

Publication History

Published: 21 April 2017
Accepted: 01 September 2016
Revised: 01 September 2016
Received: 01 June 2016
Published in TODAES Volume 22, Issue 3

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Internet of Things
  2. challenges
  3. mathematical modeling
  4. optimization

Qualifiers

  • Research-article
  • Research
  • Refereed

Funding Sources

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)112
  • Downloads (Last 6 weeks)13
Reflects downloads up to 10 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2023)AIoTML: A Unified Modeling Language for AIoT-Based Cyber–Physical SystemsIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems10.1109/TCAD.2023.326478642:11(3545-3558)Online publication date: Nov-2023
  • (2023)A Review of Energy Aware Cyber-Physical SystemsCyber-Physical Systems10.1080/23335777.2022.216329810:1(1-42)Online publication date: 7-Jan-2023
  • (2023)Internet of things: Conceptual network structure, main challenges and future directionsDigital Communications and Networks10.1016/j.dcan.2022.04.0279:3(677-687)Online publication date: Jun-2023
  • (2023)Real-Time AI in Social EdgeSocial Edge Computing10.1007/978-3-031-26936-3_5(71-96)Online publication date: 20-Feb-2023
  • (2022)Road Network Energy Optimization Using IoT and Deep LearningHybrid Intelligent Approaches for Smart Energy10.1002/9781119821878.ch7(129-145)Online publication date: 28-Sep-2022
  • (2021)A Trust-Based Framework to Reduce Message Dissemination Latency Using CFC Model for Internet of VehicleSoft Computing for Problem Solving10.1007/978-981-16-2712-5_38(461-479)Online publication date: 14-Oct-2021
  • (2020)A Holistic Systems Security Approach Featuring Thin Secure Elements for Resilient IoT DeploymentsSensors10.3390/s2018525220:18(5252)Online publication date: 14-Sep-2020
  • (2020)Scheduling Optimization of Time-Triggered Cyber-Physical Systems Based on Fuzzy-Controlled QPSO and SMT SolverEnergies10.3390/en1303066813:3(668)Online publication date: 4-Feb-2020
  • (2020) S 4 oC: A Self-Optimizing, Self-Adapting Secure System-on-Chip Design Framework to Tackle Unknown Threats — A Network Theoretic, Learning Approach 2020 IEEE International Symposium on Circuits and Systems (ISCAS)10.1109/ISCAS45731.2020.9180687(1-8)Online publication date: Oct-2020
  • (2020)Green Internet of Things (GIoT): Vision, applications and research challengesSustainable Computing: Informatics and Systems10.1016/j.suscom.2020.100448(100448)Online publication date: Sep-2020
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Get Access

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media