UW Allen School MSR Summer Institute 2017 (Day 1)
Schedule and slides available on:
https://www.cs.washington.edu/mssi/2017/schedule.html
Introductions Victor Bahl (MSR) & Shyam Gollakota (UW)
IoT as in interdisciplinary topic, hence a range of skills and expertise involved in this summer institute. Important to get interaction across disciplines. The industry is on a race to deployment, and academia is working on visionary projects. It is important to get conversation going between the two.
There are infrastructure questions: AI, Intelligent Edge, IoT, etc. While academia has been discussing this for a while, a push from huge industry partners will drive this forward, while privacy & security are of importance here. This Institute aims to drive collaborations, joint projects and publications, while highlighting the risks and challenges.
Keynote: Affan Dar, Principal Group Software Engineering Manager, Azure IoT Platform, Microsoft
Simplifying IoT with Cloud and Edge
IoT is not a technology evolution, rather a business revolution enabled by technology. Real customers have interests in this space for cost saving, maintenance, analytics, and fault-finding. However currently there is high barrier to entry due to diverse ecosystem of devices, OSes, capabilities, protocols, standards. No winner in the space yet. The cloud and device app models are completely different hence scalability and customisation is challenging.
Azure IoT platform aims to address some of these challenges, supporting easy-to-build building blocks and supporting a range of protocols and frameworks, including an Edge SDK for local decision making and processing. Though it is difficult to maintain cohesive security, as devices can be deployed in untrusted environments. However having integrated platforms can help with securing applications, and hardware/software attestations and trust.
Edge computing was highlighted: constrained network resources, high latencies, unreliable networks. Understanding disconnectivity in operational state is an important challenge for a self-sustaining system. We need to go away from mission-criticality. Audience engaged heavily in discussions of the cloud versus edge processing and compromises to be made there. Container-based management and workload control nd local storage are being explored. Scalability in number of devices, throughput and burst scenarios is another challenge faced in this space.
Session 1: The Intelligent Edge
Evan Welbourne, Amazon: Learning at the Edge
Presented a case for running machine learning models at the Edge of the network with an example from prior work at Samsung Research. Also presented key challenges and brainstorming topics for learning new models at the Edge: decentralized learning algorithms, diverse device resource constraints, device-cloud security, soliciting feedback or labels from end users, and peer-to-peer device coordination to learn at the Edge. Closed with a note on hiring for Machine Learning at Amazon Alexa Smart Home.
Anind Dey, Carnegie Mellon University: GIoTTO: An Open-Source IoT Framework
CMU GIoTTO aims to enable an IoT ecology for enabling security & privacy, end-user programmability, machine learning, and large-scale deployability. The goal is to improve HCI and human interaction in user-driven queries, while supporting privacy with role-based ACL. Anind demoed a number of ubiquitous applications of the platform for training and performing inferences. See more on https://iotexpedition.org
Artur Laksberg, Microsoft: Programming IoT Edge Devices: Cloud-Client Duality
Cloud latency, privacy, reliable connectivity, and security are important challenges in IoT for legal requirements, transmission costs, and user experience. Hence there is clear need for local processing and connectivity. Today’s workloads are based on data filtering and aggregation, but tomorrow this could be ML, computer vision, and security. More hardware manufacturers will support new features to enable this. Edge devices minimise transit latencies for many analysis types. AWS greengrass and Azure IoT edge are examples in this space. These challenges, in addition to the power requirements and performance overhead imposed by message-based APIs (container, API, crypto, etc) make the cloud-based approaches less appealing for critical applications. Will the two approaches (edge & cloud) be in contrast, or do we have to maintain both platforms for consumers, developers, and applications?
Suman Banerjee, University of Wisconsin: Intelligent Edge for Education
Suman presented challenges in education and teaching resources, and how the teaching labs can be maintained by using a cloud-hosted platform to democratise software access. This browser-based system allows VM access over VPNs for software access.The platform can use any cloud offering, but currently is mostly hosted bat Microsoft Azure. This introduces new challenges as software systems use in scalability grow in needs of interactivity, complexity, and various types of dependencies. Various optimizations are possible that allow reduced costs for academic institutions.
Session 2: Prototyping & Connecting the Next Billion Devices
Steve Hodges, Microsoft Research: Building connected devices
Steve presented the early work in his group on the .NET Gadgeteer prototyping platform, which brought together three key elements: modular pluggable hardware, modern programming metaphors and tools, and support for custom form factors. The talk presented the aims and challenges of developing this platform and an unanticipated success for the technology as a tool for teaching computer science in schools. This experience, coupled with other work showing that the tactile, tangible nature of physical computing engages students, shaped the direction of the BBC Micro:bit which Steve briefly demoed. Finally, Steve mentioned a new prototyping platform which extends the Micro:bit with additional sensing, a bitmapped display, and WiFi connectivity with the aim of empowering web developers to explore programming for embedded connected devices.
Vamsi Talla, Jeeva Wireless: Enabling cheap and reliable connectivity for the next billion devices
Jeeva Wireless is reimaging connectivity by reducing the cost, size and power consumption of wireless communication. The key challenge with current radios is that the analog RF front end and RF signal generation consumes tremendous amount of power. Jeeva’s solution presented by Vamsi relies on using only digital and backscatter communication to synthesize WiFi (or ZigBee/BLE) or LoRA packets by reflecting a carrier signal using tiny small devices and these packets can be received on any standards compliant receiver. This greatly reduces the complexity of the solutions and results in orders of magnitude reduction in power consumption. This approach can bring connectivity between passive backscatter devices (e.g., contact lenses or credit cards) and smartphones/tablets/routers. The use of long-range backscatter technique gives a coverage of 100s of metres allowing a number of devices to get connected with at a low data rate using backscatter method.
Vikram Iyer, University of Washington: 3D Printing Internet Connected Objects
Today 3D printed objects are separate from connectivity modules (e.g., WiFi chips). It would be ideal to 3D-print IoT/connected devices using mechanical motion to reflect WiFi waves to encode a message. This requires printing an antenna (e.g., small dipole antenna printed using a composite copper-plastic material. On-off or encoding switches are also printed using an ordinary 3D printer. Power can be gained using energy-harvesting methods (e.g., an anemometer) or interaction-based devices.
Alanson Sample, Disney Research: Rethinking the RF physical layer to enable the next generation of IoT sensors
UHF RFID tags offer a means of minimally instrumenting “dumb” objects and bring them into the virtual world. By monitoring changes in the communication channel parameters between the RFID reader and tags and using machine learning techniques it is possible detect users object interaction event which can enabling activity inferencing applications in the home and workplace. To solve the battery charging problem, room scale wireless power using quasi-static cavity resonance can seemly deliver large amounts of safe wireless power anywhere in room. Lastly, energy harvesting sensor nodes using ultra-wideband ambient backscatter techniques reduce power consumption by backscattering ambient radio broadcasts source such as FM, TV and Cellular broadcasts to a universal backscatter reader.
Saman Naderiparizi, University of Washington: Battery-free Cameras and Low-power Machine Vision for IoT
Wireless cameras are increasingly present in the environmental monitoring scene. Going battery-free can reduce the maintenance complexity here. The main idea here is how to bring the power consumption of, traditionally known to be power-hungry, wireless streaming cameras to a level (sub-mW) that energy harvesting from ambient sources, such as WiFi or RFID readers, can enable fully battery-free streaming cameras. Analog backscatter communication is used here to stream the video data from the camera and allows for eliminating the need for power hungry components such as ADC and amplifiers. The experiment showed that traditional face detection algorithms can be applied to the received videos and result in a high-accuracy of face detection at up to 100ft away from the access point.
Joshua Smith, University of Washington: Battery-free Cellphone
Exponential improvements in the energy efficiency of microelectronics is helping enable battery-free sensing/computing systems. Josh presented a battery-free cell phone that transmits voice signals using analog backscatter, transmits dialing information using digital backscatter, and receives voice and call-control data in a passive fashion. These scaling trends and novel sensing/computing systems could lead to much larger numbers of edge-devices, larger quantities of sensor data, improved environmental sustainability (by eliminating batteries), and also reduced maintenance complexity.
Session 3: Emerging Applications and Use Cases of IoT
Ranveer Chandra, Microsoft: FarmBeats: AI and IoT For Data-Driven Farming
Understanding farm conditions (nutrients, mositure, temperature) level is important for dynamic farming and precision agriculture to optimise use of water, pesticides, etc to improve yield & sustainability. FarmBeats aims to help with this challenge using data-driven sensing platforms. They use TV White Spaces for connectivity, and sensors and drones with ML-based computer vision to monitor the farms. For areas with legal issues around drone-usage, they use balloons for imagery acquisition. Hence sparse sensor data and the image can be mixed up to provide insights to the farmer. Edge processing and offline ML is used for analytics in case of network connectivity issues.
Klara Nahrstedt, University of Illinois, Urbana-Champaign: Exploring IoT Co-dependencies in Electro-Mobility
Klara presented the dynamic wireless charging for electric cars on highways. The interdependence between the car companies, the energy sector, the road infrastructure, and telcos make this a challenging task. Many sensors are involved in the ecosystem from all these players. The positioning of coils, their efficiency and quality, and load shaping is important for different times of day and different vehicles. Key management, authentication in short time, and location privacy are important. Privacy-preserving billing is an important aspect.
Edward Wang, University of Washington: Changing the way we diagnose health using mobile and IoT technologies
Healthcare and clinical infrastructure are an obvious area where IoT can make a big impact. Continuous monitoring and sensing can provide us with valuable health data. As an example, edward presented HemaApp which can be used for hemoglobin monitoring.Wearables such as glasses can also be used for blood pressure and heart rate monitoring. This can lead to correlations between other sensors such as activity recognition, or for personalisation of medication.
Deepak Ganesan, UMass Amherst: Towards continuous measurement of cognitive state and addictive behavior in natural environments
Addictive behaviour monitoring is considered as an epidemic and is a costly task for the health system. Accuracy in drug usage detection is of importance and the cues, triggers, and individuals’ routines are important for understanding the habits and providing potential interventions. Using smart glasses, eye closure rates can be monitored for fatigue and dopamine level sensing with high accuracy. Wearable ECG can also be used for drug usage detection. Though simple models can be developed in the lab, in-the-field detection from addicted users is difficult.
Round Table Presentations #1
Rahul Bhattacharyya, MIT: Low-cost, pervasive sensing leveraging existing wireless infrastructure
Rahul talked about low-cost sensing research. E.g., use of RFID tags with probe interface to traditional paper-based anemia detection can only costs a few $s. Other modalities include use of sensors in vehicular monitoring, for example wheel imbalance. RFID sensors can be adapted for a bunch of other modalities like crack section, soil moisture sensing and fluid level sensing. Use of time-windowing techniques and PCA techniques form FFT features can lead to highly accurate detection techniques for presence of imbalance. Mobile sensors are pretty useful here. Moving to intelligence to peripheral devices and offboard computation leads to easy deployment.
Jean Camp, Indiana University: Risk Communication as Security Interaction in the IoT
Jean presented the tussle between security & privacy. Communicating privacy and data exchange deals and incentives, usability, and awareness of risk is highly ignored. Methods from risk communication off-line, such a mental models should be used to enable security and risk communication to the ordinary users.
Anat Caspi, UW Allen School: Independent mobility in the Connected City: IoT-enabled Pedestrian-Centered Mobility for People with Disabilities and Older Adults
Anat presented IoT for the public good challenge. Sensing in cities and built environments includes interaction between a number of agents and stakeholders. The need for specialised equipment and environment for accessibility in the cities is a challenge for making the cities easy to navigate for those with mobility impairments. Consumption of the sensor data through apps is being developed. Proprietary data formats are an obstacle to gaining access to larger datasets and data collusion. Combination of wearable devices for different users, and mobile apps, can help with more useful feedback to the users. Optimal routes are not necessarily the shortest paths, hence tagging paths and routes with data about condition of the paths, elevation, pollution, etc is being enabled in their effort in this space.
Aakanksha Chowdhery, Princeton: Video analytics at scale for mobile Internet-of-things platform
Video cameras are increasingly appearing for surveillance and connected cars and other areas. The local processing versus cloud-based approaches are used in this space, though this depends on the type of analytics which are of interest (summaries, anomalies, highlights, etc). Edge computing can provide more efficient bandwidth provision here. Bandwidth constraint, the energy trade offs, low-latency, and analytics are of interest here. Local processing and adaptive algorithms can help with achieving the right tradeoff.
James Fogarty, UW Allen School: The Data is the Interaction
IoT presents new challenges for interaction because of the unprecedented volumes of personal data. As we work to understand new technologies and opportunities, we often copy forward prior designs, with limited success. New designs require reconsidering prior assumptions about benefits, burdens, and control. What is the data, and how does an individual get genuine personal value from that data?
Hamed Haddadi, Imperial College London: Containing Personal Data Processing with the Databox
Presented the Databox – open source project; personal data ecosystem; Challenges: data security, privacy, scalability, energy – platform for curation of data; open source personal networked system , mediate access to data; apps, data stores, everything is docker container; Databox – give temporary access to data; runs analytics; and then kill container, and remove it; Databox and apps ecosystem – personalize cooking program (demo); using analytics; data ecology & use; Data negotiability; app communicates with user about risks and benefits; Discussion – who puts infrastructure for databox (it is setup-box provider) ; there is some regulation on what data we can collect;
Panel #1: The Intelligent Edge (Scribed by Justin Chan and Hanchuan Li)
David: How does the user know which devices he can take a picture of and which he cannot (referencing the Synthetic Sensors project)?
Anind: In the future everything would be enabled. In practice we did a large advertising campaign listing which devices were enabled. You could also have a sticker marking each device.
David: Why not put a QR code on each printer?
Anind: QR codes are hard to scan for devices like a projector that is far away. They need to be scanned from the right angle and be in line of sight as a result putting QR code. With our method, a user can take a picture of the device from any angle without alignment, and bring up its interface.
Suman: Maybe we could have a gesture based system. Make a gesture with phone and printer in proximity will print a document.
Stefan: All pictures looks similar and sending it to all ambient devices makes it convenient to issue man in the middle attacks. We need strong notions of identities and integrity in the IoT space. This is incredibly insecure.
Anind: We could make user friendly system first and let security experts to solve security problems later. There is almost no way to do both things at exactly the same time
Steve: How can you build an application first and think about security later? Wouldn’t that result in an insecure system? It the system has security vulnerabilities, then I won’t consider it to be really useful or human centered. E.g. a phone app very usable yet let others hackers steal your money.
Artur: Security and usability are not mutually exclusive.
Deepak: Would intelligent edge result in a glut of configuration rules and sensors. How do we simplify this vast space into a usable set of options for the user?
Artur: You should be able to narrow down your machine learning algorithm based on the problem and other design constraints.
Anind: We select options based on how humans respond to particular configurations.
Jean Camp: Will edge computing harm the users? Aren’t we shifting all the risk to the user. Victims of smart cars: long distance truckers and old people. You have to think about usability and security at the same time.
Hamad: How well can we train machine learning models for facial recognition and things like that, locally.
Evan: Not all of it is done locally, a lot of processing is done on the cloud.
Victor: There is a lot of work towards doing machine learning at the edge. But the state of the art is not quite there yet.
AnonA: A lot of these is already happening. Recently developed DNN has been pushing these applications further. In addition, there are companies building devices with embedded DNN.
Mat: I build consumer robots. Doing Speech recognition for children is very different for adults. Also answers for different age groups are also different. It is important to capture the context and provide answers accordingly.
Victor: Will this architecture change in the future? What will it be?
Kiara: What about sustainability in IoT. You might leave behind white elephants in smart cities. Electric companies deploy IoT every 5 to 10 years. What about adaptability? Do these systems evolve with time? Not every sector will develop at the same pace.
Phil: Edge means something you’re comfortable with, it can be a multi-core desktop that can run 802.11 or Bluetooth.
Affan: In Azure IoT, SLA contracts support protocols for up to 20 years now in response to customer concerns (initial support was 7 years).
Aakanksha: IoT architecutre is like reverse CDNs.
Victor: Edge devices are not just storage or caches.
Victor: How do you program these devices? Your abstractions need to take into account the system and user. What should be the developer learn and think when there is an edge concept.
Now there are 2 main trends, could and edge they may be other ways to solve computation for IoT.
Evan: We need devices to be programmable by users. But we don’t have a good solution to this. Programing by 3rd party developers, take Alexa for example, Alexa don’t release anything internally that we don’t also release to 3rd party developers which could support 3rd party to do stuff that we can. Customers programing can be more challenging. It is super hard to support end user with building applications.
Anind: The end user does not care if there is an edge in the system.They care about the usability and applications. As a end user I just want a model that would be easy to understand and build an application.
Krishna: Human body is complex. It is very similar current networked systems. Edge is almost like as our senses and brain as a low latency cloud. so I believe the current model of edge and cloud could be sustainable.
Victor: Who owns the edge, the consumer or the service provider? How can we provide SLAs. Robots moving around, you have a edge dealing with mission critical applications. Can you build a mission critical service without the service company having full control from the cloud? If things are loaded to the edge, it is very challenging to maintain the same level of service and security. I would like to see an agenda that could providentially solve this issue
Victor: How do we define what edge means?
Suman: Edge of the infrastructure
AnonA: The actual end devices that is facing the customer.
AnonA: Any device that the customer has access
Artur: An edge is any small computer. Any sensors with a small processor is a computer.
AnonA: These additional things that are outside the cloud concept.
Panel #2: Prototyping & Connecting the Next Billion Devices (Scribed by Justin Chan and Hanchuan Li)
AnonQ: Which is the best ambient signal to use as a source?
Josh/Vamsi: Cell towers are the things that are scaling and growing smaller (5G, picocells, femtocells). So that seems like the most ubiquitous form of connectivity, compared to FM.
Affan: Should we have specialized towers just for powering these passive devices?
Deepak: Other than EPC-Gen2, should we have a new protocol for all these new applications.
Vamsi: Yes. EPC-Gen2 is not made for sensing applications.
Greg: We need a compelling business case for these applications for a new protocol.
Klara: I am interested in all your stuff are really small, if the things that does not need to be small, will there be other opportunities open up? Is there any advantage to not miniaturizing things?
Alanson: There is a sort of spatial diversity if you decide to work with larger sensors and tags. You could make higher gain antennas for example.
Thomas: With 5G, what modifications are needed?
Josh: Most modifications can be made on the firmware side.
Vamsi: For any protocol, you can backscatter it. Including 5G.
Victor: What’s your endgame?
Josh: If we can hit a couple of niches, that would help with wide deployment.
Vamsi: We have some ideas on what are good niche markets, and we intend to build out examples for those markets. Then we will work on integrating them into more common standards.
AnonQ: How do you see yourself winning by designing some products that save transmission energy?
Vamsi: We intend to demonstrate a couple of applications and make it work really well, opportunities will open up from there. And of course we would keep marketing it and build great applications around it.
Victor: You should discuss with people designing 5G if there is any way to in cooperate backscatter into their protocol. It’s a pretty uphill battle to getting to the level of industry impact like P4 from Nick’s group at Stanford. As an exercise, some companies send people to standards bodies and negotiate with them about new regulations.
Putting the capability into the standard now is important or if it is deployed it will be extremely hard to incorporate your backscattered system into the next generation of wireless network.
Phil: For IEEE, you need quite a bit of lead time to gain credibility, like a couple of years, before you can begin making any impact. So you’d need to think ahead.
Vamsi: It would be a great thing to put backscatter into 5G but as a start up we have limited resources. We would be happy to get into contact with anyone who knows anyone within the 5G standards body.
Deepak: Is backscatter a replacement for existing IoT applications, or is this an addition to enable new applications? I’m curious about the trends forward in terms of prototyping flexible devices that incorporate computing.
Steve: We can’t fundamentally print integrated electronic devices. But we could probably begin with printing particular modules. We need to think about scaling reliable devices that can work for a long time. 3D printing technologies are not at the stage where we can use it robustly. There’s no silver bullet.
Josh/Vikram: 3D printed things really kicks into the rapid prototype space. It will be fantastic to have a small form factor hardware with computation applicabilities. it is much easier to do 3d printing for prototyping and also add in value when you have a customized piece for your own special purposes.
With 3D printing you can use it produce something that does not meet the economies of scale of large manufacturing orders.
On a smaller scale, it is much easier to use a 3D printer for prototyping. You can use 3D printers to produce highly customized shapes.
Josh: We recently visited BlueOrigin and we found they are actually flying a lot of 3D printed metal objects. It is actually fine quality for aircraft experimentations.
Klara: I’m curious about flexible miniature electronics and wireless charging. Are you looking into that?
Alanson: A challenge is how to interface a flexible fabric with a rigid sensing circuit. Printing conductors and transistors and printing sensors using screen or inkjet printed. There are fantastic technologies for printing customized electronic pieces. Though they are still not as good as the ones manufactured. If you look at flexible fabrics. The flexible things usually held back by the circuits and electronics which are not flexible at all.