Affiliation:
1. Indian Institute of Technology Guwahati, Assam, India
2. Chandigarh University, Punjab, India
Abstract
Multiple software and hardware intellectual property (IP) components are combined on a single chip to form Multi-Processor Systems-on-Chips (MPSoCs). Due to the rigid time-to-market constraints, some of the IPs are from outsourced third parties. Due to the supply-chain management of IP blocks being handled by unreliable third-party vendors, security has grown as a crucial design concern in the MPSoC. These IPs may get exposed to certain unwanted practises like the insertion of malicious circuits called Hardware Trojan (HT) leading to security threats and attacks, including sensitive data leakage or integrity violations. A Network-on-Chip (NoC) connects various units of an MPSoC. Since it serves as the interface between various units in an MPSoC, it has complete access to all the data flowing through the system. This makes NoC security a paramount design issue. Our research focuses on a threat model where the NoC is infiltrated by multiple HTs that can corrupt packets. Data integrity verified at the destination’s network interface (NI) triggers re-transmissions of packets if the verification results in an error. In this article, we propose an opportunistic trust-aware routing strategy that efficiently avoids HT while ensuring that the packets arrive at their destination unaltered. Experimental results demonstrate the successful movement of packets through opportunistically selected neighbours along a trust-aware path free from the HT effect. We also observe a significant reduction in the rate of packet re-transmissions and latency at the expense of incurring minimum area and power overhead.
Funder
SERB Project
DST, and ISEA Project Phase-II, Government of India
Publisher
Association for Computing Machinery (ACM)
Reference39 articles.
1. Fort-NoCs
2. Praveen Bhojwani, Rohit Singhal, Gwan Choi, and Rabi Mahapatra. 2018. Forward error correction for on-chip interconnection networks. In Unique Chips and Systems. CRC Press, 341–354.
3. Hardware Trojan Attacks: Threat Analysis and Countermeasures
4. The gem5 simulator
5. Packet Security with Path Sensitization for NoCs
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献