期刊论文详细信息
IEEE Access
A Survey on the Security of Wired, Wireless, and 3D Network-on-Chips
Ahmed Khalid1  Ahmad Patooghy2  Mostafa Said3  Mahdi Hasanzadeh4  Abdel-Hameed A. Badawy5  Amin Sarihi5 
[1] Department of Computer Engineering, Assiut University, Assiut, Egypt;Department of Computer Science, University of Central Arkansas, Conway, AR, USA;Department of Computer and Electrical Engineering and Computer Science, California State University, Bakersfield, CA, USA;Independent Researcher, Tehran, Iran;Klipsch School of Electrical and Computer Engineering, New Mexico State University, Las Cruces, NM, USA;
关键词: Network-on-chip;    threat model;    hardware security;    hardware trojan;    DoS attack;   
DOI  :  10.1109/ACCESS.2021.3100540
来源: DOAJ
【 摘 要 】

Network-on-Chips (NoCs) have been widely used as a scalable communication solution in the design of multiprocessor system-on-chips (MPSoCs). NoCs enable communications between on-chip Intellectual Property (IP) cores and allow processing cores to achieve higher performance by outsourcing their communication tasks. NoC paradigm is based on the idea of resource sharing in which hardware resources, including buffers, communication links, routers, etc., are shared between all IPs of the MPSoC. In fact, the data being routed by each NoC router might not be related to the router’s local core. Such a utilization-centric design approach can raise security issues in NoC-based designs, e.g., integrity and confidentiality of the data being routed in an NoC might be compromised by unauthorized accesses/modifications of intermediate routers. Many papers in the literature have discovered and addressed security holes of NoCs, aiming at improving the security of the NoC paradigm. However, to the best of our knowledge, there is no solid survey study on the security vulnerabilities and countermeasures for NoCs. This paper will review security threats and countermeasures proposed so far for wired NoCs, wireless NoCs, and 3D NoCs. The paper aims at giving the readers an insight into the attacks and weaknesses/strengths of countermeasures.

【 授权许可】

Unknown   

  文献评价指标  
  下载次数:0次 浏览次数:1次