TY - GEN
T1 - Neuromorphic-Enabled Security for IoT
AU - Salehi, Soheil
AU - Sheaves, Tyler
AU - Gubbi, Kevin Immanuel
AU - Arash Beheshti, Sayed
AU - Sai Manoj, P. D.
AU - Rafatirad, Setareh
AU - Sasan, Avesta
AU - Mohsenin, Tinoosh
AU - Homayoun, Houman
N1 - Publisher Copyright:
© 2022 IEEE.
PY - 2022
Y1 - 2022
N2 - Hardware attacks on resource-constrained IoT devices are evolving rapidly. These threats have become a significant concern due to the increase of IoT devices used in applications such as human health, public transportation, autonomous vehicles, defense, and environmental monitoring. Recent studies show the potential of using deep learning to steal user data by monitoring hardware features and side-channel information. Additionally, machine learning (ML) approaches have recently been widely adopted in IoT applications. Advanced platforms demand novel circuits and architectures that can yield several orders of magnitude improvements in energy consumption in ML applications while maintaining consistent accuracy. Neuromorphic computing leveraging digital, mixed-signal, and analog processing has been shown to be a promising candidate due to energy, wire count, and area efficiency. Thus, an effective cutting-edge hardware approach for neuromorphic computing to perform rapid, energy-efficient, and secure supervised and unsupervised learning at the IoT edge is sought. Here we discuss the challenges and potential benefits of using neuromorphic computing modules for security at the IoT edge. The intersection of neuromorphic computing and hardware security serves many IoT domains in mission-critical and privacy-preserving applications.
AB - Hardware attacks on resource-constrained IoT devices are evolving rapidly. These threats have become a significant concern due to the increase of IoT devices used in applications such as human health, public transportation, autonomous vehicles, defense, and environmental monitoring. Recent studies show the potential of using deep learning to steal user data by monitoring hardware features and side-channel information. Additionally, machine learning (ML) approaches have recently been widely adopted in IoT applications. Advanced platforms demand novel circuits and architectures that can yield several orders of magnitude improvements in energy consumption in ML applications while maintaining consistent accuracy. Neuromorphic computing leveraging digital, mixed-signal, and analog processing has been shown to be a promising candidate due to energy, wire count, and area efficiency. Thus, an effective cutting-edge hardware approach for neuromorphic computing to perform rapid, energy-efficient, and secure supervised and unsupervised learning at the IoT edge is sought. Here we discuss the challenges and potential benefits of using neuromorphic computing modules for security at the IoT edge. The intersection of neuromorphic computing and hardware security serves many IoT domains in mission-critical and privacy-preserving applications.
KW - Hardware Security
KW - IoT
KW - Machine Learning
KW - Neuromorphic Computing
KW - Reverse Engineering
KW - Side-Channel Attack
KW - Supply Chain Security
UR - https://www.scopus.com/pages/publications/85138747657
UR - https://www.scopus.com/pages/publications/85138747657#tab=citedBy
U2 - 10.1109/NEWCAS52662.2022.9842256
DO - 10.1109/NEWCAS52662.2022.9842256
M3 - Conference contribution
AN - SCOPUS:85138747657
T3 - 20th IEEE International Interregional NEWCAS Conference, NEWCAS 2022 - Proceedings
SP - 153
EP - 157
BT - 20th IEEE International Interregional NEWCAS Conference, NEWCAS 2022 - Proceedings
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 20th IEEE International Interregional NEWCAS Conference, NEWCAS 2022
Y2 - 19 June 2022 through 22 June 2022
ER -