Seesaw: End-to-end Dynamic Sensing for IoT using Machine Learning

被引:0
|
作者
Goyal, Vidushi [1 ]
Bertacco, Valeria [1 ]
Das, Reetuparna [1 ]
机构
[1] Univ Michigan, Ann Arbor, MI 48109 USA
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
IoT edge devices' small form factor places tight constraints on their battery life. These devices are often equipped with multiple sensors, a few of them responsible for most of the energy usage. Naively lowering the sensing rate of these power-hungry sensors reduces energy consumption, but also degrades application's output quality. In this work, we observe that it is possible to leverage low-power sensors in a system to predict the impact of throttling a power-intensive sensor on application's output accuracy. We thus propose Seesaw, an end-to-end ML-based solution that automatically identifies correlations between power-intensive and lightweight sensors without human expertise. Further, Seesaw deploys a low-overhead decision tree predictor to determine the optimal sensing rates for power-intensive sensors, thus avoiding significant quality degradation. We show that Seesaw improves battery life for (1) video recording on mountable video cameras and (2) route tracking on fitness trackers by 32% and 66%, respectively, without significant accuracy loss.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] End-to-end consensus using end-to-end channels
    Wiesmann, Matthias
    Defago, Xavier
    [J]. 12TH PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING, PROCEEDINGS, 2006, : 341 - +
  • [32] Providing End-to-End Security Using Quantum Walks in IoT Networks
    Abd El-Latif, Ahmed A.
    Abd-El-Atty, Bassem
    Venegas-Andraca, Salvador E.
    Elwahsh, Haitham
    Piran, Md Jalil
    Bashir, Ali Kashif
    Song, Oh-Young
    Mazurczyk, Wojciech
    [J]. IEEE ACCESS, 2020, 8 : 92687 - 92696
  • [33] End-to-End Data Authentication Deep Learning Model for Securing IoT Configurations
    Hammad, Mohamed
    Iliyasu, Abdullah M.
    Elgendy, Ibrahim A.
    Abd El-Latif, Ahmed A.
    [J]. HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2022, 12
  • [34] An End-to-End View of IoT Security and Privacy
    Ling, Zhen
    Liu, Kaizheng
    Xu, Yiling
    Jin, Yier
    Fu, Xinwen
    [J]. GLOBECOM 2017 - 2017 IEEE GLOBAL COMMUNICATIONS CONFERENCE, 2017,
  • [35] An End-to-End Authentication Scheme for Healthcare IoT Systems Using WMSN
    Nashwan, Shadi
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 68 (01): : 607 - 642
  • [36] End-to-End Semantic Interoperability Mechanisms for IoT
    Lakka, Eftychia
    Petroulakis, Nikolaos E.
    Hatzivasilis, George
    Soultatos, Othonas
    Michalodimitrakis, Manolis
    Rak, Urszula
    Waledzik, Karolina
    Anicic, Darko
    Kulkarni, Vivek
    [J]. 2019 IEEE 24TH INTERNATIONAL WORKSHOP ON COMPUTER AIDED MODELING AND DESIGN OF COMMUNICATION LINKS AND NETWORKS (IEEE CAMAD), 2019,
  • [37] EverySense: An end-to-end IoT market platform
    Mano, Hiroshi
    [J]. ADJUNCT PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: COMPUTING NETWORKING AND SERVICES (MOBIQUITOUS 2016), 2016, : 1 - 5
  • [38] An end-to-end intrusion detection system with IoT dataset using deep learning with unsupervised feature extraction
    Kunang, Yesi Novaria
    Nurmaini, Siti
    Stiawan, Deris
    Suprapto, Bhakti Yudho
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2024, 23 (03) : 1619 - 1648
  • [39] Lightweight End-to-End Blockchain for IoT Applications
    Lee, Seungcheol
    Lee, Jaehyun
    Hong, Sengphil
    Kim, Jae-Hoon
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2020, 14 (08) : 3224 - 3242
  • [40] Model-Driven End-to-End Learning for Integrated Sensing and Communication
    Mateos-Ramos, Jose Miguel
    Hager, Christian
    Keskin, Musa Furkan
    Le Magoarou, Luc
    Wymeersch, Henk
    [J]. ICC 2023-IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2023, : 5695 - 5700