A framework for security on NoC technologies

被引:31
|
作者
Gebotys, CH [1 ]
Gebotys, RJ [1 ]
机构
[1] Univ Waterloo, Waterloo, ON N2L 3G1, Canada
来源
ISVLSI 2003: IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI, PROCEEDINGS: NEW TRENDS AND TECHNOLOGIES FOR VLSI SYSTEMS DESIGN | 2003年
关键词
D O I
10.1109/ISVLSI.2003.1183361
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Multiple heterogeneous processor cores, memory cores and application specific IP cores integrated in a communication network, also known as Networks on chips (NoCs), will handle a large number of applications including security. Although NoCs offer more resistance to bus probing attacks, power/EM attacks and network snooping attacks are relevant. For the first time a framework for security on NoC at both the network level (or transport layer) and at the core level (or application layer) is proposed At the network level, each IP core has a security wrapper and a key-keeper core is included in the NoC protecting encrypted private and public keys. Using this framework, unencrypted keys are prevented from leaving the cores and NoC This is crucial to prevent untrusted software on or off the NoC from gaining access to keys. At the core level (application layer) the security framework is illustrated with software modification for resistance against power attacks with extremely low overheads in energy. With the emergence of secure IP cores in the market and nanometer technologies, a security framework for designing NoCs is crucial for supporting future wireless internet enabled devices.
引用
收藏
页码:113 / 117
页数:5
相关论文
共 50 条
  • [21] Methodological Framework for NoC Resources Dimensioning on FPGAs
    Fresse, Virginie
    Combes, Catherine
    Payet, Matthieu
    Rousseau, Frederic
    10TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC 2015) / THE 12TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2015) AFFILIATED WORKSHOPS, 2015, 56 : 391 - 396
  • [22] Network Security Intelligence Center as a combination of SIC and NOC
    Miloslayskaya, Natalia
    POSTPROCEEDINGS OF THE 9TH ANNUAL INTERNATIONAL CONFERENCE ON BIOLOGICALLY INSPIRED COGNITIVE ARCHITECTURES (BICA 2018), 2018, 145 : 354 - 358
  • [23] Dynamic and Distributed Security Management for NoC Based MPSoCs
    Azad, Siavoosh Payandeh
    Jervan, Gert
    Sepulveda, Johanna
    COMPUTATIONAL SCIENCE - ICCS 2019, PT II, 2019, 11537 : 649 - 662
  • [24] Integration of social and IoT technologies: architectural framework for digital transformation and cyber security challenges
    Mendhurwar, Subodh
    Mishra, Rajhans
    ENTERPRISE INFORMATION SYSTEMS, 2021, 15 (04) : 565 - 584
  • [25] Framework and key technologies of digital twin system cyber security under perspective of bionics
    Li, Lin-Li
    Gu, Fu
    Li, Hao
    Gu, Xin-Jian
    Luo, Guo-Fu
    Wu, Zhi-Qiang
    Gang, Yi-Jin
    Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science), 2022, 56 (03): : 419 - 435
  • [26] Security Technologies for NGN
    Teng Zhimeng Wu Bo Wei Yinxing(Central Research Institute of ZTE Corporation
    ZTE Communications, 2007, (04) : 27 - 32
  • [27] Trends in security technologies
    Dostalova, Petra
    PRZEGLAD ELEKTROTECHNICZNY, 2023, 99 (01): : 147 - 150
  • [28] New security technologies
    Vitch, Martin L.
    Construction Specifier, 1999, 52 (04):
  • [29] Security, Justice and Technologies
    Froment, Jean-Charles
    DROIT ET CULTURES, 2011, 61
  • [30] Cloud security technologies
    Muttik, Igor
    Barton, Chris
    Information Security Technical Report, 2009, 14 (01): : 1 - 6