Skip to main content

Elements of TinyML on Constrained Resource Hardware

  • Conference paper
  • First Online:
Advances in Computing and Data Sciences (ICACDS 2022)

Abstract

The next phase of intelligent computing could be entirely reliant on the Internet of Things (IoT). The IoT is critical in changing industries into smarter entities capable of providing high-quality services and products. The widespread adoption of IoT devices raises numerous issues concerning the privacy and security of data gathered and retained by these services. This concern increases exponentially when such data is generated by healthcare applications. To develop genuinely intelligent devices, data must be transferred to the cloud for processing due to the computationally costly nature of current Neural Network implementations. Tiny Machine Learning (TinyML) is a new technology that has been presented by the scientific community as a means of developing autonomous and secure devices that can gather, process, and provide output without transferring data to remote third party organizations. This work presents three distinct TinyML applications to cope with the aforementioned issues and open the road for intelligent machines that provide tailored results to their users.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Lee, I., Lee, K.: The Internet of Things (IoT): applications, investments, and challenges for enterprises. Bus. Horizons 58, 431–440 (2015). https://doi.org/10.1016/j.bushor.2015.03.008

  2. Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M.: Internet of Things (IoT): a vision, architectural elements, and future directions. Future Gener. Comput. Syst. 29, 1645–1660 (2013). https://doi.org/10.1016/j.future.2013.01.010

  3. Ashton, K.: That “Internet of Things” Thing. http://www.itrco.jp/libraries/RFIDjournal-That Internet of Things Thing.pdf. Accessed 12 Feb 2022

  4. Sundmaeker, H., et al.: Vision and Challenges for Realising the Internet of Things. European Commision (2010)

    Google Scholar 

  5. Atzori, L., Iera, A., Morabito, G.: The Internet of Things: A survey. Comput. Networks 54, 2787–2805 (2010). https://doi.org/10.1016/j.comnet.2010.05.010

  6. Liu, Q., Ma, Y., Alhussein, M., Zhang, Y., Peng, L.: Green data center with IoT sensing and cloud-assisted smart temperature control system. Comput. Networks 101, 104–112 (2016). https://doi.org/10.1016/j.comnet.2015.11.024

  7. Gondchawar, N., Kawitkar, R.: IoT based Smart Agriculture

    Google Scholar 

  8. Mohd Kassim, M.R., Mat, I., Harun, A.N.: Wireless Sensor Network in precision agriculture application. In: 2014 International Conference on Computer, Information and Telecommunication Systems (CITS), pp. 1–5 (2014). https://doi.org/10.1109/CITS.2014.6878963

  9. What is a denial of service attack (DoS)? https://www.paloaltonetworks.com/cyberpedia/what-is-a-denial-of-service-attack-dos. Accessed 13 Feb 2022

  10. Arış, A., Oktuǧ, S.F., Yalçın, S.B.Ö.: Internet-of-Things security: Denial of service attacks. In: 2015 23nd Signal Processing and Communications Applications Conference (SIU), pp. 903–906 (2015). https://doi.org/10.1109/SIU.2015.7129976

  11. Forensic Analysis and Security. https://securitytoday.com/articles/2018/05/01/forensic-analysis-and-security.aspx. Accessed 13 Feb 2022

  12. Rai, S., Chukwuma, P., Cozart, R.: Security and Auditing of Smart Devices: Managing Proliferation of Confidential Data on Corporate and BYOD Devices. Auerbach Publications (2017)

    Google Scholar 

  13. Melamed, T.: An active man-in-the-middle attack on Bluetooth smart devices. Int. J. Safety Secur. Eng. 8, 200–211 (2018). https://doi.org/10.2495/SAFE-V8-N2-200-211

  14. Bluetooth Bug Opens Devices to Man-in-the-Middle Attacks. https://threatpost.com/bluetooth-bug-mitm-attacks/159124/. Accessed 13 Feb 2022

  15. Hajian, R., ZakeriKia, S., Erfani, S.H., Mirabi, M.: SHAPARAK: scalable healthcare authentication protocol with attack-resilience and anonymous key-agreement. Comput. Networks 183, 107567 (2020). https://doi.org/10.1016/j.comnet.2020.107567

  16. LeCun, Y., Bengio, Y., Hinton, G.: Deep learning. Nature 521, 436–444 (2015). https://doi.org/10.1038/nature14539

  17. Monteiro, P.L., Zanin, M., Menasalvas Ruiz, E., PimentĂŁo, J., Alexandre da Costa Sousa, P.: Indoor Temperature Prediction in an IoT Scenario. Sensors 18, 3610 (2018). https://doi.org/10.3390/s18113610

  18. Prathibha, S.R., Hongal, A., Jyothi, M.P.: IOT based monitoring system in smart agriculture. In: 2017 International Conference on Recent Advances in Electronics and Communication Technology (ICRAECT), pp. 81–84 (2017). https://doi.org/10.1109/ICRAECT.2017.52

  19. Kang, D.-H., et al.: Room temperature control and fire alarm/suppression IoT service using MQTT on AWS. In: 2017 International Conference on Platform Technology and Service (PlatCon), pp. 1–5 (2017). https://doi.org/10.1109/PlatCon.2017.7883724

  20. Subahi, A.F., Bouazza, K.E.: An intelligent IoT-based system design for controlling and monitoring greenhouse temperature. IEEE Access 8, 125488–125500 (2020). https://doi.org/10.1109/ACCESS.2020.3007955

  21. Rahman, R.A., Hashim, U.R., Ahmad, S.: IoT based temperature and humidity monitoring framework. Bull. Electr. Eng. Inform. 9, 229–237 (2020). https://doi.org/10.11591/eei.v9i1.1557

  22. Nayyar, A., Puri, V.: Smart farming: IoT based smart sensors agriculture stick for live temperature and moisture monitoring using Arduino, cloud computing & solar technology. Presented at the November 9 (2016). https://doi.org/10.1201/9781315364094-121

  23. Ashish, B.: Temperature monitored IoT based smart incubator. In: 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), pp. 497–501 (2017). https://doi.org/10.1109/I-SMAC.2017.8058400

  24. Tolentino, L.K.S., et al.: Development of an IoT-based aquaponics monitoring and correction system with temperature-controlled greenhouse. In: 2019 International SoC Design Conference (ISOCC), pp. 261–262 (2019). https://doi.org/10.1109/ISOCC47750.2019.9027722

  25. Vamseekrishna, A., Nishitha, R., Kumar, T.A., Hanuman, K., Supriya, Ch.G.: Prediction of temperature and humidity using IoT and machine learning algorithm. In: Bhattacharyya, S., Nayak, J., Prakash, K.B., Naik, B., Abraham, A. (eds.) International Conference on Intelligent and Smart Computing in Data Analytics. pp. 271–279. Springer, Singapore (2021). https://doi.org/10.1007/978-981-33-6176-8_30

  26. TensorFlow https://www.tensorflow.org/. Accessed 12 Feb 2022

  27. Edge Impulse https://www.edgeimpulse.com/. Accessed 12 Feb 2022

  28. Hagiwara, M.: Removal of hidden units and weights for back propagation networks. In: Proceedings of the International Joint Conference on Neural Networks, pp. 351–353. Publ by IEEE (1993)

    Google Scholar 

  29. Karnin, E.D.: A simple procedure for pruning back-propagation trained neural networks. IEEE Trans. Neural Netw. 1, 239–242 (1990). https://doi.org/10.1109/72.80236

  30. Mozer, M.C., Smolensky, P.: Skeletonization: A Technique for Trimming the Fat from a Network via Relevance Assessment. In: Advances in Neural Information Processing Systems. Morgan-Kaufmann (1989)

    Google Scholar 

  31. Dettmers, T.: 8-Bit Approximations for Parallelism in Deep Learning. arXiv:1511.04561 [cs]. (2016)

  32. Gysel, P., Pimentel, J., Motamedi, M., Ghiasi, S.: Ristretto: A Framework for Empirical Study of Resource-Efficient Inference in Convolutional Neural Networks. IEEE Transactions on Neural Networks and Learning Systems. 29, 5784–5789 (2018). https://doi.org/10.1109/TNNLS.2018.2808319

  33. Settle, S.O., Bollavaram, M., D’Alberto, P., Delaye, E., Fernandez, O., Fraser, N., Ng, A., Sirasao, A., Wu, M.: Quantizing Convolutional Neural Networks for Low-Power High-Throughput Inference Engines. arXiv:1805.07941 [cs, stat]. (2018)

  34. Park, E., Yoo, S., Vajda, P.: Value-aware Quantization for Training and Inference of Neural Networks. arXiv:1804.07802 [cs]. (2018)

  35. Gholami, A., Kim, S., Dong, Z., Yao, Z., Mahoney, M.W., Keutzer, K.: A Survey of Quantization Methods for Efficient Neural Network Inference. arXiv:2103.13630 [cs]. (2021)

  36. Edge Impulse https://www.edgeimpulse.com/. Last accessed 12 Feb 2022

  37. David, R., Duke, J., Jain, A., Reddi, V.J., Jeffries, N., Li, J., Kreeger, N., Nappier, I., Natraj, M., Regev, S., Rhodes, R., Wang, T., Warden, P.: TensorFlow Lite Micro: Embedded Machine Learning on TinyML Systems. arXiv:2010.08678 [cs]. (2021)

  38. Arduino Nano 33 BLE Sense https://store-usa.arduino.cc/products/arduino-nano-33-ble-sense. Accessed 12 Feb 2022

  39. Raspberry Pi 4 https://www.raspberrypi.com/products/raspberry-pi-4-model-b/. Accessed 12 Feb 2022

  40. ST B-L475E-IOT01A. https://www.st.com/en/evaluation-tools/b-l475e-iot01a.html. Accessed 12 Feb 2022

  41. Arduino Nano 33 Datasheet. https://docs.arduino.cc/resources/datasheets/ABX00031-datasheet.pdf. Accessed 12 Feb 2022

  42. Platformio. https://platformio.org/. Accessed 12 Feb 2022

  43. NXP. https://www.nxp.com/. Accessed 12 Feb 2022

  44. Microsoft’s ELL. https://microsoft.github.io/ELL/. Accessed 12 Feb 2022

  45. Ravaglia, L., Rusci, M., Nadalini, D., Capotondi, A., Conti, F., Benini, L.: A TinyML Platform for On-Device Continual Learning with Quantized Latent Replays. arXiv:2110.10486 [cs]. (2021)

  46. Arduino Nano case. https://www.thingiverse.com/thing:4412970/files. Accessed 12 Feb 2022

Download references

Acknowledgment

We acknowledge support of this work by the project “ParICT_CENG: Enhancing ICT research infrastructure in Central Greece to enable processing of Big data from sensor stream, multimedia content, and complex mathematical modeling and simulations” (MIS 5047244) which is implemented under the Action “Reinforcement of the Research and Innovation Infrastructure”, funded by the Operational Programme “Competitiveness, Entrepreneurship and Innovation” (NSRF 2014–2020) and co-financed by Greece and the European Union (European Regional Development Fund).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Athanasios Kakarountas .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Tsoukas, V., Gkogkidis, A., Kakarountas, A. (2022). Elements of TinyML on Constrained Resource Hardware. In: Singh, M., Tyagi, V., Gupta, P.K., Flusser, J., Ă–ren, T. (eds) Advances in Computing and Data Sciences. ICACDS 2022. Communications in Computer and Information Science, vol 1614. Springer, Cham. https://doi.org/10.1007/978-3-031-12641-3_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-12641-3_26

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-12640-6

  • Online ISBN: 978-3-031-12641-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics