Rout et al., 2020 - Google Patents
Security threats in channel access mechanism of wireless NoC and efficient countermeasuresRout et al., 2020
- Document ID
- 9701935481094164576
- Author
- Rout S
- Singh A
- Patil S
- Sinha M
- Deb S
- Publication year
- Publication venue
- 2020 IEEE International Symposium on Circuits and Systems (ISCAS)
External Links
Snippet
Wireless Network-on-Chip (WNoC) broadly adopts single channel for low overhead data transmission. Sharing of the channel among multiple wireless interfaces (WIs) is controlled by a channel access mechanism (CAM). Such CAM can be malfunctioned by a Hardware …
- 230000005540 biological transmission 0 abstract description 4
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
- G06F15/16—Combinations of two or more digital computers each having at least an arithmetic unit, a programme unit and a register, e.g. for a simultaneous processing of several programmes
- G06F15/163—Interprocessor communication
- G06F15/173—Interprocessor communication using an interconnection network, e.g. matrix, shuffle, pyramid, star, snowflake
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/10—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L49/00—Packet switching elements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic regulation in packet switching networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Application independent communication protocol aspects or techniques in packet data networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Eliyan et al. | DoS and DDoS attacks in Software Defined Networks: A survey of existing solutions and research challenges | |
Diguet et al. | NOC-centric security of reconfigurable SoC | |
US7178015B2 (en) | Security measures in a partitionable computing system | |
Boraten et al. | Securing NoCs against timing attacks with non-interference based adaptive routing | |
Ruaro et al. | A systemic and secure SDN framework for NoC-based many-cores | |
Guo et al. | Potential threats and possible countermeasures for photonic network-on-chip | |
Rout et al. | Security threats in channel access mechanism of wireless NoC and efficient countermeasures | |
US11797667B2 (en) | Real-time detection and localization of DoS attacks in NoC based SoC architectures | |
Sarihi et al. | A survey on the security of wired, wireless, and 3D network-on-chips | |
Daoud | Secure network-on-chip architectures for mpsoc: Overview and challenges | |
Caimi et al. | Security in many-core SoCs leveraged by opaque secure zones | |
Sharma et al. | Exploring the security landscape: NoC-based MPSoC to Cloud-of-Chips | |
Ganguly et al. | A denial-of-service resilient wireless NoC architecture | |
Ahmed et al. | AWARe-Wi: A jamming-aware reconfigurable wireless interconnection using adversarial learning for multichip systems | |
Weerasena et al. | Security of electrical, optical, and wireless on-chip interconnects: A survey | |
Stefan et al. | Enhancing the security of time-division-multiplexing networks-on-chip through the use of multipath routing | |
Caimi et al. | Activation of secure zones in many-core systems with dynamic rerouting | |
Biswas | Efficient timing channel protection for hybrid (packet/circuit-switched) network-on-chip | |
Caimi et al. | Runtime creation of continuous secure zones in many-core systems for secure applications | |
Faccenda et al. | Detection and countermeasures of security attacks and faults on noc-based many-cores | |
Daoud et al. | Efficient mitigation technique for Black Hole router attack in Network-on-Chip | |
Kondoth et al. | Wireless network-on-chip security review: Attack taxonomy, implications, and countermeasures | |
Biswas et al. | Attacks toward wireless network-on-chip and countermeasures | |
Pasricha et al. | Electronic, Wireless, and Photonic Network-on-Chip Security: Challenges and Countermeasures. | |
Zhao et al. | On a new hardware Trojan attack on power budgeting of many core systems |