{"title":"Evaluating the performance of TinyML singular and ensemble techniques for intrusion detection in IoT networks","authors":"Abderahmane Hamdouchi , Ali Idri","doi":"10.1016/j.micpro.2025.105172","DOIUrl":"10.1016/j.micpro.2025.105172","url":null,"abstract":"<div><div>As the Internet of Things (IoT) expands, safeguarding IoT networks from vulnerabilities becomes critical. Intrusion detection systems (IDS) leveraging machine learning (ML) techniques are essential for enhancing security and preventing unauthorized access. However, transmitting data to the cloud can introduce latency, impeding real-time attack detection. This research evaluates three TinyML ensemble techniques (random forest, XGBoost, and extra trees) and three singular techniques (decision tree, Gaussian naive Bayes, and multilayer perceptron) using two feature selection methods (maximum relevance minimum redundancy and analysis of variance) on the NF-ToN-IoT-v2 and NF-BoT-IoT-v2 datasets for cyberattack detection. Evaluations on the Arduino UNO used the prediction performance criteria (Cohen’s kappa and Matthew’s correlation coefficient), device metrics (latency, static RAM, and flash memory), and the Scott-Knott test and Borda count voting system to assess the statistical significance and to rank the models. Results show that singular TinyML models outperformed ensemble models for multiclass classification in the IDS-IoT context. The best models are: (1) MLP with 20 features and a hidden layer size of 56 for NF-ToN-IoT-v2; and (2) ET with 13 features, 2 estimators, and a tree depth of 16 for NF-BoT-IoT-v2.</div></div>","PeriodicalId":49815,"journal":{"name":"Microprocessors and Microsystems","volume":"117 ","pages":"Article 105172"},"PeriodicalIF":1.9,"publicationDate":"2025-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144262850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zhiyuan Pan , Jiafeng Cheng , Nengyuan Sun , Jinghe Wang , Kai Shi , Jianghong Li , Zhaoyi Niu , Jiaqi Wang , Jiawei Zhang , Linhan Wang , Weize Yu
{"title":"A reconfigurable PUF and TRNG design based on multiplexers for securing IoT applications","authors":"Zhiyuan Pan , Jiafeng Cheng , Nengyuan Sun , Jinghe Wang , Kai Shi , Jianghong Li , Zhaoyi Niu , Jiaqi Wang , Jiawei Zhang , Linhan Wang , Weize Yu","doi":"10.1016/j.micpro.2025.105170","DOIUrl":"10.1016/j.micpro.2025.105170","url":null,"abstract":"<div><div>Physical Unclonable Function (PUF) and True Random Number Generator (TRNG) are two important hardware security primitives in modern cryptography. A regular arbiter PUF can be broken by machine learning (ML) attacks without much effort since a high linear relationship exists between the input data and the output response of the PUF. In this paper, an ML-resistant reconfigurable PUF and TRNG (RePT) architecture is proposed for the first time. Within this RePT design, a non-linearization technique by masking the linear relationship between the input data and the output response is proposed to greatly reinforce the robustness of an arbiter PUF against ML attacks without significantly increasing its area and power overhead. So as to further reuse the existing hardware resource within the arbiter PUF to build another hardware security primitive: TRNG, a novel algorithm is proposed to efficiently determine the selection signal value of each multiplexer within the arbiter PUF. As shown in the result, the proposed RePT design is able to achieve a 38 Mbps PUF (260 Mbps TRNG) throughput with 32,621 <span><math><mi>μ</mi></math></span>m<span><math><msup><mrow></mrow><mrow><mn>2</mn></mrow></msup></math></span> area, under the synthesis of SMIC 55 nm process design kits (PDK). Additionally, when ML attacks are performed on the proposed RePT circuit, it cannot be cracked even if 100,000 training data are enabled.</div></div>","PeriodicalId":49815,"journal":{"name":"Microprocessors and Microsystems","volume":"116 ","pages":"Article 105170"},"PeriodicalIF":1.9,"publicationDate":"2025-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144189866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Himar Fabelo , Raquel Leon , Emanuele Torti , Santiago Marco , Asaf Badouh , Max Verbers , Carlos Vega , Javier Santana-Nunez , Yann Falevoz , Yolanda Ramallo-Fariña , Christian Weis , Ana M Wägner , Eduardo Juarez , Claudio Rial , Alfonso Lagares , Gustav Burström , Francesco Leporati , Luis Jimenez-Roldan , Elisa Marenzi , Teresa Cervero , Gustavo M. Callico
{"title":"STRATUM project: AI-based point of care computing for neurosurgical 3D decision support tools","authors":"Himar Fabelo , Raquel Leon , Emanuele Torti , Santiago Marco , Asaf Badouh , Max Verbers , Carlos Vega , Javier Santana-Nunez , Yann Falevoz , Yolanda Ramallo-Fariña , Christian Weis , Ana M Wägner , Eduardo Juarez , Claudio Rial , Alfonso Lagares , Gustav Burström , Francesco Leporati , Luis Jimenez-Roldan , Elisa Marenzi , Teresa Cervero , Gustavo M. Callico","doi":"10.1016/j.micpro.2025.105157","DOIUrl":"10.1016/j.micpro.2025.105157","url":null,"abstract":"<div><div>Integrated digital diagnostics are transforming complex surgical procedures, with brain tumour surgery being among the most challenging. STRATUM, a five-year Horizon Europe-funded project, aims to develop an advanced 3D decision support system leveraging real-time multimodal data processing powered by artificial intelligence. A key innovation of STRATUM is its design as an energy-efficient Point-of-Care computing system, seamlessly integrated into neurosurgical workflows. This system will provide surgeons with real-time, AI-driven insights, enhancing decision-making accuracy and efficiency. By optimizing surgical precision and reducing procedure duration, STRATUM is expected to improve patient outcomes while streamlining resource utilization within European healthcare systems.</div></div>","PeriodicalId":49815,"journal":{"name":"Microprocessors and Microsystems","volume":"116 ","pages":"Article 105157"},"PeriodicalIF":1.9,"publicationDate":"2025-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144106844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kyriaki Tsantikidou, Grigorios Delimpaltadakis, Damianos Diasakos, Nicolas Sklavos
{"title":"AAL-based smart cane system with security and privacy features for blind and visually impaired individuals","authors":"Kyriaki Tsantikidou, Grigorios Delimpaltadakis, Damianos Diasakos, Nicolas Sklavos","doi":"10.1016/j.micpro.2025.105155","DOIUrl":"10.1016/j.micpro.2025.105155","url":null,"abstract":"<div><div>Ambient Assisted Living (AAL) technologies aim at increasing the quality of life for people with impairments. Practicality, reliability, autonomy, ease-of-use, safety, and low cost are of the utmost importance and in some cases omitted or overlooked by the research community. In this paper, an AAL-based smart cane system with security and privacy features for blind and visually impaired individuals that aims at satisfying these requirements is proposed. Multiple services that facilitate the everyday life for both indoor and outdoor activities are implemented: obstacle detection for ground and head level via ultrasonic (US) sensors and vibrations, ascending and descending stair detection/recognition via computer vision, image processing through various sensors, an emergency button for additional safety, and a LoRa antenna with a security and privacy mechanism for safely communicating with the Health 4.0-based environment. The proposed system is implemented with an Arduino and Raspberry Pi Zero combination and provides more practical and economic services compared to other published related works, including head-level detection, an indoor-outdoor adjustment switch and security mechanisms that are in most cases dismissed. It achieves a 7.4 % accuracy increase for general obstacle detection and a 100 % consistent drop or wall detection accuracy compared to published works. The proposed system presents a 37.82 % increase of speed-adjusted recall and a 24.4 % performance increase in its stair detection feature compared to published works. It focuses on hardware efficiency, safety and real-world autonomy with cost efficient alternatives. The proposed architecture of the security mechanism achieves a small area consumption, minimum of 35.6 % decrease compared to published designs, and an efficient throughput, that is appropriate with the utilized antenna.</div></div>","PeriodicalId":49815,"journal":{"name":"Microprocessors and Microsystems","volume":"114 ","pages":"Article 105155"},"PeriodicalIF":1.9,"publicationDate":"2025-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143906800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel machine learning-driven optimization methodology for faster and more efficient design space exploration in high-level synthesis","authors":"Esra Celik, Deniz Dal","doi":"10.1016/j.micpro.2025.105154","DOIUrl":"10.1016/j.micpro.2025.105154","url":null,"abstract":"<div><div>The optimization of digital circuits is a critical factor in determining the competitiveness of modern electronic systems, particularly in terms of area, performance, and power consumption. High-Level Synthesis (HLS) plays a pivotal role in this optimization process, enabling designers to define system requirements at a higher level of abstraction and providing opportunities to analyze and optimize digital circuits against various metrics prior to production. However, the design constraints inherent in the HLS process often lead to multi-objective optimization problems, which significantly complicate the exploration process. This complexity necessitates the development of novel synthesis methodologies enabling faster and more efficient design space exploration. In response to this need, within the scope of this study, we introduced an innovative and hybrid HLS methodology that combines metaheuristic and machine learning approaches. In this respect, two distinct synthesis tools were developed. The first tool, implemented in C++, utilizes the Simulated Annealing (SA) metaheuristic with a novel three-part solution representation. This representation, a key contribution of our study, aims to minimize the weighted sum of latency and area constraints for Data Flow Graph (DFG) designs. While effective, this approach resulted in extended execution times due to computationally intensive design variables. To address the performance bottleneck identified in the standard cost function evaluation, we developed a second tool that integrates machine learning with the traditional SA. This hybrid approach combines C++ and Python, incorporating a Support Vector Regression (SVR) model to estimate solution costs more efficiently, significantly reducing execution times. Our study also presents the detailed analyses of the experimental results conducted on seven benchmarks with varying node counts. The three-part solution representation in the traditional SA approach demonstrated up to a 53.38% improvement in performance compared to the single-part representation across all benchmarks. For benchmarks with fewer nodes (DiffEq, Lattice, Ellip, and FEWF), the model-based estimation implementation achieved results identical to the traditional approach but required longer execution times. For benchmarks characterized by higher node counts (MatMul, IntAux, and MCM), our novel approach demonstrated equivalent results to the traditional SA implementation with a time savings of up to 129 seconds. We leveraged these time savings to enhance the exploration process, achieving up to 5.4% improvement in solution quality without exceeding the execution time of the traditional approach.</div></div>","PeriodicalId":49815,"journal":{"name":"Microprocessors and Microsystems","volume":"114 ","pages":"Article 105154"},"PeriodicalIF":1.9,"publicationDate":"2025-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143881824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Deepika S․ , Arunachalam V․ , Alex Noel Joseph Raj
{"title":"A review on hardware accelerators for convolutional neural network-based inference engines: Strategies for performance and energy-efficiency enhancement","authors":"Deepika S․ , Arunachalam V․ , Alex Noel Joseph Raj","doi":"10.1016/j.micpro.2025.105146","DOIUrl":"10.1016/j.micpro.2025.105146","url":null,"abstract":"<div><div>In time-critical & safety-critical image classification applications, Convolutional Neural Networks (CNNs) based Inference Engines (IEs) are preferred and required to be fast, accurate, and cost-effective to meet the market demands. The self-feature extraction capabilities use millions of parameters and neurons in the stack of layers with restricted processing time. This paper reviews strategies applied in Hardware-based image classification CNN inference engines. The acceleration strategies are (1) Arithmetic Logic Unit (ALU)-based, (2) Data flow-based, and (3) Sparsity-based are considered here. Considering benchmark accuracy, the 16-bit mixed fixed/floating point could provide 99 % and 3.75 times more performance than Half-precision floating point in an application-specific CNN model. Feeding 2-dimensional or 3-dimensional data frames to the CNN layers would reuse the data. It optimizes the volume of memory usage and improves the efficiency of the processor array. The pruning of zero/near-zero valued Input Feature Maps (IFMs) and weights leads to sparsity in the data fed to the different layers. Therefore, data compression strategies and skipping the trivial computation (zero skipping approach) would reduce the complexity of the controller. There is a benchmark performance improvement of 1.17 times and 6.2 times in power efficiency compared to dense architecture. Minimizing the complexity of indexing and load balancing controller would improve the performance further.</div></div>","PeriodicalId":49815,"journal":{"name":"Microprocessors and Microsystems","volume":"113 ","pages":"Article 105146"},"PeriodicalIF":1.9,"publicationDate":"2025-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143510725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ignacio Horcas , David Moreno-Salinas , José Sánchez-Moreno
{"title":"A cost-effective design for a mid-range microcontroller-based lock-in amplifier","authors":"Ignacio Horcas , David Moreno-Salinas , José Sánchez-Moreno","doi":"10.1016/j.micpro.2025.105145","DOIUrl":"10.1016/j.micpro.2025.105145","url":null,"abstract":"<div><div>Lock-in amplifiers are instruments widely used in physics and engineering laboratories, whose invention goes back to the 1940s. Due to the late electronic developments, the former analog implementations have been replaced with digital versions, mainly based on FPGAs (field-programmable gate arrays). The present work, exploiting the last advances in the microcontrollers field, consists in the development of a functional prototype of a low-cost lock-in amplifier based on a microcontroller with similar specifications to mid-range commercial amplifiers. The performance of the prototype has been tested and compared with commercial devices, showing a similar performance in common use cases at a much reduced cost.</div></div>","PeriodicalId":49815,"journal":{"name":"Microprocessors and Microsystems","volume":"113 ","pages":"Article 105145"},"PeriodicalIF":1.9,"publicationDate":"2025-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143453911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A real-time interception system for compromised frequency-hopping signal eavesdropping","authors":"Corentin Lavaud , Robin Gerzaguet , Matthieu Gautier , Olivier Berder , Erwan Nogues , Stephane Molton","doi":"10.1016/j.micpro.2025.105144","DOIUrl":"10.1016/j.micpro.2025.105144","url":null,"abstract":"<div><div>In modern computing architectures, sensitive data (<em>red data</em>) is carried out in the same processing units as encrypted data (<em>black data</em>). Due to leaks (internal mixing, coupling …), this red data can be emitted in a legitimate radio transmission through a so-called telecom side-channel. This new type of side-channel creates an important threat as it can be passively and remotely processed by a dedicated interception system. This threat becomes even more concerning within the context of the Internet of Things, as the use of low-cost components leads to increased leaks. This paper addresses telecom side-channels on frequency-hopping signals, that are harsh to eavesdrop due to their sporadic nature in both time and frequency domains. To that goal, a wideband interception system is proposed, able to intercept frequency-hopping signals in real time and to extract sensitive red data from it. The system relies on software-defined radios and leverages both hardware and software resources to process a 200MHz bandwidth in real time. The proposed architecture is capable of detecting jumps on the order of <span><math><mrow><mn>20</mn><mi>μ</mi><mi>s</mi></mrow></math></span> and can therefore track 50,000 jumps per second across 1,024 channels. Finally, the criticality of telecom side-channels in Bluetooth communications is demonstrated through real interception on several microcontroller chips.</div></div>","PeriodicalId":49815,"journal":{"name":"Microprocessors and Microsystems","volume":"113 ","pages":"Article 105144"},"PeriodicalIF":1.9,"publicationDate":"2025-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143463740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rubén Nieto , Felipe Machado , Jesús Fernández-Conde , David Lobato , José M. Cañas
{"title":"Open-source ROS-based simulation for verification of FPGA robotics applications","authors":"Rubén Nieto , Felipe Machado , Jesús Fernández-Conde , David Lobato , José M. Cañas","doi":"10.1016/j.micpro.2025.105143","DOIUrl":"10.1016/j.micpro.2025.105143","url":null,"abstract":"<div><div>FPGAs are increasingly incorporated in many high-end robotics applications, often involving computer vision and motor control. However, functional verification of FPGA designs is labor-intensive, time-consuming, and consequently expensive. Moreover, validation of complex systems, such as robots, poses even further challenges because neither the external interactions can be easily modeled with traditional testbenches nor the robot’s response can be adequately observed and ascertained. This work presents a new methodology that validates the robot’s behavior in a realistic simulated environment before transferring the design to the physical robot and the onboard FPGA. This methodology allows integral, fast, and flexible debugging cycles of robotics applications by integrating the functional simulation of the processing unit (FPGA) with the simulation of the robot, its environment, and their mutual interconnections. The Verilator simulation tool is used for fast Verilog/SystemVerilog verification and simulation. ROS, the standard robotics middleware, and Gazebo 3D robotics simulator are used for realistic robot simulation, including a robust physics engine. We have implemented several open-source software extensions to interconnect the Verilog circuit with the simulated ROS sensors and actuators. This methodology’s utility and correctness have been assessed by developing a complete proof-of-concept FPGA-based robotics application in which a commercial robot follows a colored object using its onboard camera and differential drive motors. This work establishes the foundations for developing and testing complex robot FPGA-based modules more efficiently and flexibly.</div></div>","PeriodicalId":49815,"journal":{"name":"Microprocessors and Microsystems","volume":"113 ","pages":"Article 105143"},"PeriodicalIF":1.9,"publicationDate":"2025-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143428214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Borja Losa , Pablo Parra , Antonio Da Silva , Óscar R. Polo , J. Ignacio G. Tejedor , Agustín Martínez , Sebastián Sánchez , David Guzmán
{"title":"Hardware-assisted virtualization extensions for LEON processors in mixed-criticality systems","authors":"Borja Losa , Pablo Parra , Antonio Da Silva , Óscar R. Polo , J. Ignacio G. Tejedor , Agustín Martínez , Sebastián Sánchez , David Guzmán","doi":"10.1016/j.micpro.2024.105130","DOIUrl":"10.1016/j.micpro.2024.105130","url":null,"abstract":"<div><div>The increasing complexity of real-time embedded critical systems has driven the adoption of new methodologies to mitigate high development costs. One of the most common approaches is the implementation of mixed-criticality systems, characterized by integrating applications with different levels of criticality on the same processing unit. In these systems, applications run on a separation kernel hypervisor, a software element that controls the execution of the different operating systems, providing a virtualized environment and ensuring the necessary spatial and temporal isolation. This paper presents the design and implementation of hardware virtualization extensions for LEON processors, whose use is widespread in the field of space systems. These extensions enable the execution of virtualized applications with minimal transitions to the hypervisor, enhancing system performance. Our proposed solution defines a specific execution mode and duplicates control and status registers for the exclusive use of virtualized applications. In addition, the functionality of the hardware and software interrupt signals has been extended, allowing developers to select which ones are handled by the hypervisor and which ones by the guest operating systems directly. We have implemented the proposed extension using the LEON version 3 processor’s original VHDL code, and validated it using exhaustive tests to evaluate performance and resource consumption. The results show that the proposed modifications allow virtualized applications to execute without hypervisor intervention, matching the performance when non-virtualized while significantly outperforming existing para-virtualization solutions. Resource consumption increases by 6% to 14%, depending on the FPGA, which is low when compared to available resources. Power consumption increases by only a few milliwatts, which can be considered negligible.</div></div>","PeriodicalId":49815,"journal":{"name":"Microprocessors and Microsystems","volume":"112 ","pages":"Article 105130"},"PeriodicalIF":1.9,"publicationDate":"2025-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143147891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}