Embedded Computing Systems (TECS)


Search Issue
enter search term and/or author name


ACM Transactions on Embedded Computing Systems (TECS), Volume 16 Issue 3, April 2017

Section: Special Issue on Embedded Computing for IoT

Low-Cost Standard Signatures for Energy-Harvesting Wireless Sensor Networks
Giuseppe Ateniese, Giuseppe Bianchi, Angelo T. Capossele, Chiara Petrioli, Dora Spenza
Article No.: 64
DOI: 10.1145/2994603

This work is motivated by a general question: can micro-scale energy-harvesting techniques be exploited to support low-cost standard security solutions on resource-constrained devices? We focus on guaranteeing integrity and authentication...

Energy-Aware Memory Mapping for Hybrid FRAM-SRAM MCUs in Intermittently-Powered IoT Devices
Hrishikesh Jayakumar, Arnab Raha, Jacob R. Stevens, Vijay Raghunathan
Article No.: 65
DOI: 10.1145/2983628

Forecasts project that by 2020, there will be around 50 billion devices connected to the Internet of Things (IoT), most of which will operate untethered and unplugged. While environmental energy harvesting is a promising solution to power these...

Axiom: DTLS-Based Secure IoT Group Communication
Marco Tiloca, Kirill Nikitin, Shahid Raza
Article No.: 66
DOI: 10.1145/3047413

This article presents Axiom, a DTLS-based approach to efficiently secure multicast group communication among IoT-constrained devices. Axiom provides an adaptation of the DTLS record layer, relies on key material commonly shared among the group...

A PUF-Based Secure Communication Protocol for IoT
Urbi Chatterjee, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay
Article No.: 67
DOI: 10.1145/3005715

Security features are of paramount importance for the Internet of Things (IoT), and implementations are challenging given the resource-constrained IoT setup. We have developed a lightweight identity-based cryptosystem suitable for IoT to enable...

Data-Driven Synchronization for Internet-of-Things Systems
Terrell R. Bennett, Nicholas Gans, Roozbeh Jafari
Article No.: 69
DOI: 10.1145/2983627

The Internet of Things (IoT) is fueled by the growth of sensors, actuators, and services that collect and process raw sensor data. Wearable and environmental sensors will be a major component of the IoT and provide context about people and...

A Multi-Quadcopter Cooperative Cyber-Physical System for Timely Air Pollution Localization
Zhaoyan Shen, Zhijian He, Shuai Li, Qixin Wang, Zili Shao
Article No.: 70
DOI: 10.1145/3005716

We propose a cyber-physical system of unmanned quadcopters to locate air pollution sources in a timely manner. The system consists of a physical part and a cyber part. The physical part includes unmanned quadcopters equipped with multiple sensors....

Section: Special Issue on Embedded Computing for IoT

Guest Editorial for ACM TECS Special Issue on Effective Divide-and-Conquer, Incremental, or Distributed Mechanisms of Embedded Designs for Extremely Big Data in Large-Scale Devices
Bo-Wei Chen, Wen Ji, Zhu Li
Article No.: 72
DOI: 10.1145/3068457

Section: Special Issue on Embedded Computing for IoT

Hardware Architectures for Embedded Speaker Recognition Applications: A Survey
Hasna Bouraoui, Chadlia Jerad, Anupam Chattopadhyay, Nejib Ben Hadj-Alouane
Article No.: 78
DOI: 10.1145/2975161

Authentication technologies based on biometrics, such as speaker recognition, are attracting more and more interest thanks to the elevated level of security offered by these technologies. Despite offering many advantages, such as remote use and...

AdaFT: A Framework for Adaptive Fault Tolerance for Cyber-Physical Systems
Ye Xu, Israel Koren, C. Mani Krishna
Article No.: 79
DOI: 10.1145/2980763

Cyber-physical systems (CPS) frequently have to use massive redundancy to meet application requirements for high reliability. While such redundancy is required, it can be activated adaptively, based on the current state of the controlled plant....

Accelerators for Breast Cancer Detection
Daniele Jahier Pagliari, Mario R. Casu, Luca P. Carloni
Article No.: 80
DOI: 10.1145/2983630

Algorithms used in microwave imaging for breast cancer detection require hardware acceleration to speed up execution time and reduce power consumption. In this article, we present the hardware implementation of two accelerators for two alternative...

On Static Binary Translation of ARM/Thumb Mixed ISA Binaries
Jiunn-Yeu Chen, Wuu Yang, Wei-Chung Hsu, Bor-Yeh Shen, Quan-Huei Ou
Article No.: 81
DOI: 10.1145/2996458

Code discovery has been a main challenge for static binary translation, especially when the source instruction set architecture has variable-length instructions, such as the x86 architectures. Due to embedded data such as PC (program...

An Indoor Test Methodology for Solar-Powered Wireless Sensor Networks
Wilson M. Tan, Paul Sullivan, Hamish Watson, Joanna Slota-Newson, Stephen A. Jarvis
Article No.: 82
DOI: 10.1145/2994604

Repeatable and accurate tests are important when designing hardware and algorithms for solar-powered wireless sensor networks (WSNs). Since no two days are exactly alike with regard to energy harvesting, tests must be carried out indoors. Solar...

On Space Utilization Enhancement of File Systems for Embedded Storage Systems
Tseng-Yi Chen, Yuan-Hao Chang, Shuo-Han Chen, Nien-I Hsu, Hsin-Wen Wei, Wei-Kuan Shih
Article No.: 83
DOI: 10.1145/2820488

Since the mid-2000s, mobile/embedded computing systems conventionally have limited computing power, Random Access Memory (RAM) space, and storage capacity due to the consideration of their cost, energy consumption, and physical size. Recently,...

DMS-Based Energy Optimizations for Clustered WSNs
Maryam Bandari, Robert Simon, Hakan Aydin
Article No.: 86
DOI: 10.1145/2998179

In this article, we consider clustered wireless sensor networks where the nodes harvest energy from the environment. We target performance-sensitive applications that have to collectively send their information to a cluster head by a predefined...

Fault-Tolerant Preemptive Aperiodic RT Scheduling by Supervisory Control of TDES on Multiprocessors
Rajesh Devaraj, Arnab Sarkar, Santosh Biswas
Article No.: 87
DOI: 10.1145/3012278

Safety-critical real-time systems must meet stringent timing and fault-tolerance requirements. This article proposes a methodology for synthesizing an optimal preemptive multiprocessor aperiodic task scheduler using a formal supervisory control...

Configurable Detection of SDC-causing Errors in Programs
Qining Lu, Guanpeng Li, Karthik Pattabiraman, Meeta S. Gupta, Jude A. Rivers
Article No.: 88
DOI: 10.1145/3014586

Silent Data Corruption (SDC) is a serious reliability issue in many domains, including embedded systems. However, current protection techniques are brittle and do not allow programmers to trade off performance for SDC coverage. Further, many...

LiBrA-CAN: Lightweight Broadcast Authentication for Controller Area Networks
Bogdan Groza, Stefan Murvay, Anthony Van Herrewege, Ingrid Verbauwhede
Article No.: 90
DOI: 10.1145/3056506

Despite realistic concerns, security is still absent from vehicular buses such as the widely used Controller Area Network (CAN). We design an efficient protocol based on efficient symmetric primitives, taking advantage of two innovative...