A Security Framework for NoC Using Authenticated Encryption and Session Keys

被引:0
|
作者
Hemangee K. Kapoor
G. Bhoopal Rao
Sharique Arshi
Gaurav Trivedi
机构
[1] Indian Institute of Technology Guwahati,Department of CSE
[2] Indian Institute of Technology Guwahati,Department of EEE
关键词
Network-on-chip; Security; Authenticated encryption; Session key; GCM; NoCem;
D O I
暂无
中图分类号
学科分类号
摘要
Network on Chip (NoC) is an emerging solution to the existing scalability problems with System on Chip (SoC). However, it is exposed to security threats like extraction of secret information from IP cores. In this paper we present an Authenticated Encryption (AE)-based security framework for NoC based systems. The security framework resides in Network Interface (NI) of every IP core allowing secure communication among such IP cores. The secure cores can communicate using permanent keys whereas temporary session keys are used for communication between secure and non-secure cores. A traffic limiting counter is used to prevent bandwidth denial and access rights table avoids unauthorized memory accesses. We simulated and implemented our framework using Verilog/VHDL modules on top of NoCem emulator. The results showed tolerable area overhead and did not affect the network performance apart from some initial latency.
引用
收藏
页码:2605 / 2622
页数:17
相关论文
共 50 条
  • [1] A Security Framework for NoC Using Authenticated Encryption and Session Keys
    Kapoor, Hemangee K.
    Rao, G. Bhoopal
    Arshi, Sharique
    Trivedi, Gaurav
    [J]. CIRCUITS SYSTEMS AND SIGNAL PROCESSING, 2013, 32 (06) : 2605 - 2622
  • [2] Unconditionally Secure Authenticated Encryption with Shorter Keys
    Alomair, Basel
    Poovendran, Radha
    [J]. SECURITY IN INFORMATION SYSTEMS, PROCEEDINGS, 2009, : 3 - 15
  • [3] Establishment of Authenticated Secret Session Keys Using Digital Signature Standard
    Biswas, G. P.
    [J]. INFORMATION SECURITY JOURNAL, 2011, 20 (01): : 9 - 16
  • [4] On the security of a convertible authenticated encryption
    Zhang, JH
    Wang, YM
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 169 (02) : 1063 - 1069
  • [5] Cryptanalysis of an authenticated encryption scheme using self-certified public keys
    Tsai, CS
    Lin, SC
    Hwang, MS
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 166 (01) : 118 - 122
  • [6] On the security of two authenticated encryption schemes
    Zhang, Jianhong
    Ji, Cheng
    [J]. PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL, VOLS 1 AND 2, 2008, : 1315 - 1319
  • [7] Practical convertible authenticated encryption schemes using self-certified public keys
    Lv, JQ
    Wang, XM
    Kim, K
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 169 (02) : 1285 - 1297
  • [8] Data Security using Authenticated Encryption and Decryption Algorithm for Android Phones
    Vichare, Abhishek
    Jose, Tania
    Tiwari, Jagruti
    Yadav, Uma
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2017, : 789 - 794
  • [9] Security of authenticated encryption scheme with message linkages
    Yoon, Eun-Jun
    Yoo, Kee-Young
    [J]. 2006 INTERNATIONAL CONFERENCE ON HYBRID INFORMATION TECHNOLOGY, VOL 1, PROCEEDINGS, 2006, : 496 - +
  • [10] On the security of two improved authenticated encryption schemes
    Informatics Department, Electronics Research Institute, Cairo, Egypt
    [J]. Int. J. Secur. Netw., 2013, 4 (194-199):