enter search term and/or author name
Editorial: Cyber Security, IoT, Block Chains—Risks and Opportunities
Sandeep K. Shukla
Article No.: 62
Guest Editorial: Special Issue on Embedded Computing for IoT
Marilyn Wolf, Jason Xue
Article No.: 63
This work is motivated by a general question: can micro-scale energy-harvesting techniques be exploited to support low-cost standard security solutions on resource-constrained devices? We focus on guaranteeing integrity and authentication...
Energy-Aware Memory Mapping for Hybrid FRAM-SRAM MCUs in Intermittently-Powered IoT Devices
Hrishikesh Jayakumar, Arnab Raha, Jacob R. Stevens, Vijay Raghunathan
Article No.: 65
Forecasts project that by 2020, there will be around 50 billion devices connected to the Internet of Things (IoT), most of which will operate untethered and unplugged. While environmental energy harvesting is a promising solution to power these...
This article presents Axiom, a DTLS-based approach to efficiently secure multicast group communication among IoT-constrained devices. Axiom provides an adaptation of the DTLS record layer, relies on key material commonly shared among the group...
Security features are of paramount importance for the Internet of Things (IoT), and implementations are challenging given the resource-constrained IoT setup. We have developed a lightweight identity-based cryptosystem suitable for IoT to enable...
A Semi Random Circle routing for mobile Sink joint Ray Routing for data (SRCRR) scheme is proposed for preserving sink-location privacy with a delay guaranteed. In the SRCRR scheme, the data are directionally routed along ray paths and stored at...
Data-Driven Synchronization for Internet-of-Things Systems
Terrell R. Bennett, Nicholas Gans, Roozbeh Jafari
Article No.: 69
The Internet of Things (IoT) is fueled by the growth of sensors, actuators, and services that collect and process raw sensor data. Wearable and environmental sensors will be a major component of the IoT and provide context about people and...
We propose a cyber-physical system of unmanned quadcopters to locate air pollution sources in a timely manner. The system consists of a physical part and a cyber part. The physical part includes unmanned quadcopters equipped with multiple sensors....
Seamless Vision-assisted Placement Calibration for Wearable Inertial Sensors
Jian Wu, Roozbeh Jafari
Article No.: 71
Wearable inertial devices are being widely used in the applications of activity tracking, health care, and professional sports, and their usage is on a rapid rise. Signal processing algorithms for these devices are often designed to work with a...
Guest Editorial for ACM TECS Special Issue on Effective Divide-and-Conquer, Incremental, or Distributed Mechanisms of Embedded Designs for Extremely Big Data in Large-Scale Devices
Bo-Wei Chen, Wen Ji, Zhu Li
Article No.: 72
Distributed Multi-Representative Re-Fusion Approach for Heterogeneous Sensing Data Collection
Anfeng Liu, Xiao Liu, Tianyi Wei, Laurence T. Yang, Seungmin (Charlie) Rho, Anand Paul
Article No.: 73
A multi-representative re-fusion (MRRF) approximate data collection approach is proposed in which multiple nodes with similar readings form a data coverage set (DCS). The reading value of the DCS is represented by an R-node. The set near the Sink...
Scaling up kernel support vector machine (SVM) training has been an important topic in recent years. Despite its theoretical elegance, training kernel SVM is impractical when facing millions of data. The divide-and-conquer (DC) strategy is a...
Sparse subspace clustering (SSC) is a classical method to cluster data with specific subspace structure for each group. It has many desirable theoretical properties and has been shown to be effective in various applications. However, under the...
Collaborative PCA/DCA Learning Methods for Compressive Privacy
Sun-Yuan Kung, Thee Chanyaswad, J. Morris Chang, Peiyuan Wu
Article No.: 76
In the Internet era, the data being collected on consumers like us are growing exponentially, and attacks on our privacy are becoming a real threat. To better ensure our privacy, it is safer to let the data owner control the data to be uploaded to...
Corrections to and Discussion of “Implementation and Evaluation of Mixed-criticality Scheduling Approaches for Sporadic Tasks”
Tom Fleming, Huang-Ming Huang, Alan Burns, Chris Gill, Sanjoy Baruah, Chenyang Lu
Article No.: 77
The AMC-IA mixed-criticality scheduling analysis was proposed as an improvement to the AMC-MAX adaptive mixed-criticality scheduling analysis. However, we have identified several necessary corrections to the AMC-IA analysis. In this article, we...
Hardware Architectures for Embedded Speaker Recognition Applications: A Survey
Hasna Bouraoui, Chadlia Jerad, Anupam Chattopadhyay, Nejib Ben Hadj-Alouane
Article No.: 78
Authentication technologies based on biometrics, such as speaker recognition, are attracting more and more interest thanks to the elevated level of security offered by these technologies. Despite offering many advantages, such as remote use and...
AdaFT: A Framework for Adaptive Fault Tolerance for Cyber-Physical Systems
Ye Xu, Israel Koren, C. Mani Krishna
Article No.: 79
Cyber-physical systems (CPS) frequently have to use massive redundancy to meet application requirements for high reliability. While such redundancy is required, it can be activated adaptively, based on the current state of the controlled plant....
Algorithms used in microwave imaging for breast cancer detection require hardware acceleration to speed up execution time and reduce power consumption. In this article, we present the hardware implementation of two accelerators for two alternative...
Code discovery has been a main challenge for static binary translation, especially when the source instruction set architecture has variable-length instructions, such as the x86 architectures. Due to embedded data such as PC (program...
Repeatable and accurate tests are important when designing hardware and algorithms for solar-powered wireless sensor networks (WSNs). Since no two days are exactly alike with regard to energy harvesting, tests must be carried out indoors. Solar...
On Space Utilization Enhancement of File Systems for Embedded Storage Systems
Tseng-Yi Chen, Yuan-Hao Chang, Shuo-Han Chen, Nien-I Hsu, Hsin-Wen Wei, Wei-Kuan Shih
Article No.: 83
Since the mid-2000s, mobile/embedded computing systems conventionally have limited computing power, Random Access Memory (RAM) space, and storage capacity due to the consideration of their cost, energy consumption, and physical size. Recently,...
Serial Arithmetic Strategies for Improving FPGA Throughput
Aaron Landy, Greg Stitt
Article No.: 84
Serial arithmetic has been shown to offer attractive advantages in area for field-programmable gate array (FPGA) datapaths but suffers from a significant reduction in throughput compared to traditional bit-parallel designs. In this work, we...
Bounded-rate multimode systems are hybrid systems that switch freely among a finite set of modes, and whose dynamics are specified by a finite number of real-valued variables with mode-dependent rates that vary within given bounded sets. The...
In this article, we consider clustered wireless sensor networks where the nodes harvest energy from the environment. We target performance-sensitive applications that have to collectively send their information to a cluster head by a predefined...
Fault-Tolerant Preemptive Aperiodic RT Scheduling by Supervisory Control of TDES on Multiprocessors
Rajesh Devaraj, Arnab Sarkar, Santosh Biswas
Article No.: 87
Safety-critical real-time systems must meet stringent timing and fault-tolerance requirements. This article proposes a methodology for synthesizing an optimal preemptive multiprocessor aperiodic task scheduler using a formal supervisory control...
Silent Data Corruption (SDC) is a serious reliability issue in many domains, including embedded systems. However, current protection techniques are brittle and do not allow programmers to trade off performance for SDC coverage. Further, many...
An FPGA-Based Architecture for High-Speed Compressed Signal Reconstruction
Guoxian Huang, Lei Wang
Article No.: 89
Compressive Sensing (CS) is an emerging research area that allows efficient signal acquisition under the sub-Nyquist rate while still promising reliable data recovery. However, practical applications of CS in hardware platforms are limited as...
LiBrA-CAN: Lightweight Broadcast Authentication for Controller Area Networks
Bogdan Groza, Stefan Murvay, Anthony Van Herrewege, Ingrid Verbauwhede
Article No.: 90
Despite realistic concerns, security is still absent from vehicular buses such as the widely used Controller Area Network (CAN). We design an efficient protocol based on efficient symmetric primitives, taking advantage of two innovative...