OPTIMIZATION OF NEURAL NETWORK COMPUTATION USING INTEGER ARITHMETIC

Authors

  • Oleksandr Zakovorotnyi
  • Andrii Khulap

DOI:

https://doi.org/10.26906/SUNZ.2024.2.090

Keywords:

microcontroller, neural network, optimization, software implementation

Abstract

Most of the sensor devices in the Internet of Things systems are based on energy-efficient microcontrollers, the computing resources of which are limited, as well as the amount of available memory. Increasing the security of the use of such devices with the help of neural networks is an important and urgent problem. The article describes the possibility of using artificial neural networks in small microcontrollers with limited resources. The purpose of this work is to check the possibility of calculating neural networks based on integer arithmetic to reduce the time of calculating a neural network and eliminate data normalization operations, as well as to evaluate the feasibility of using such neural networks in the field of security of the Internet of Things in comparison with traditional methods, such as black lists and white lists. The following results were obtained: when switching to integer arithmetic, compared to floating point, the accuracy of the result calculations is within the permissible error of neural network training, that is, it has not changed. Execution time decreased by 30-96%, depending on the architecture of the microcontroller. The program size is reduced by 22-48%, also depending on the microcontroller architecture. Conclusions: the possibility and expediency of using neural networks optimized for microcontrollers with limited resources was proved. This will increase the security of Internet of Things systems, especially against device authentication threats and intrusion detection. Prospects for further research are determined.

Downloads

Download data is not yet available.

References

Duarte F. Number of IoT Devices. 2024. URL: https://explodingtopics.com/blog/number-of-iot-devices

Ragan S. Here are the 61 passwords that powered the Mirai IoT botnet. Csoonline, 2016. URL: https://www.csoonline.com/article/3126924/here-are-the-61-passwords-that-powered-the-mirai-iot-botnet.html

Vorakulpipat C., Rattanalerdnusorn E., Thaenkaew P., Hai H.D. Recent challenges, trends, and concerns related to IoT security: an evolutionary study. IEEE, 2018. DOI: https://doi.org/10.23919/ICACT.2018.8323774

Abdul-Ghani H.A., Konstantas D., Mahyoub M. A comprehensive IoT attacks survey based on a building-blocked reference mode. International Journal of Advanced Computer Science and Applications, Vol. 9, No. 3, 2018. C. 355–373. URL: https://doi.org/10.14569/IJACSA.2018.090349

Заковоротний О.Ю., Орлова Т.О. Порівняльний аналіз хмарних та туманних середовищ Інтернету речей. Системи управління, навігації та зв'язку, 2023, випуск 2(72). С. 152–154. DOI: https://doi.org/10.26906/SUNZ. 2023.3.152

Melamed T. An active man-in-the-middle attack on Bluetooth smart devices. Safety and Security Eng., Vol. 8, No. 2, 2018. C. 200–211. URL: https://www.witpress.com/Secure/ejournals/papers/SSE080202f.pdf

De Donno M., N Dragoni N., Giaretta A. Analysis of DDoS-capable IoT malwares. IEEE, 2017. DOI: https://doi.org/10.15439/2017F288

Cekerevac Z., Dvorak Z., Prigoda L., Cekerevac P. Internet of things and the man-in-the-middle attacks–security and economic risks. MEST Journal, 2017. 11 c. DOI: https://doi.org/10.12709/mest.05.05.02.03

Narudin F.A., Feizollah A., Anuar N.B.,Gani A. Evaluation of machine learning classifiers for mobile malware detection. Soft Computing, 2016. DOI: https://doi.org/10.1007/s00500-014-1511-6

Xiao L ., Li Y.,Huang X, Du X.J. Cloud-based malware detection game for mobile devices with offloading. IEEE, 2017. DOI: https://doi.org/10.1109/TMC.2017.2687918

Brain.js: GPU accelerated Neural networks in JavaScript. URL: https://brain.js.org/#/ (дата звернення 20.03.2024).

Githib: Some cool AI tools. Now the community carries the torch. URL: https://github.com/BrainJS/brain.js/blob/master/src/neural-network.ts

Cortex-M3 Devices Generic User Guide. URL: https://developer.arm.com/documentation/dui0552/a/the-cortex-m3-instruction-set

Published

2024-04-30

Most read articles by the same author(s)