Synopsis

We want to understand how much information can be transferred in secret for the resource 
constrained, short packet, low latency, inference applications most relevant to IoT.  Then we 
wanted to develop approaches that approach these rates.  This involves research in information 
theory, communications, signal processing, and inference.  We were also interesed in understanding 
the possible attacks on IoT inference systems, their impact and how to protect against them. We 
hoped to obtain fundamental theory, limits and protection approaches in the distributed processing 
environments typical in IoT.  Many important attacks on IoT and CPS systems, like electrical grids, 
vehicle networks and gas networks, can be described as changing the topology of a graph.  Due to 
this, we also hoped to perform fundamental research on detecting topology changes in graphs.  
Another, important topic is attacks on machine learning and reinforcement learning and we hoped to 
make contributions on that topic.   To augment research on attack detection and protection, it is also 
important to investigate authentication, especially at the physical layer where much remains uninvestigated.

Leave a Reply