A Customized Authentication Design for Traffic Hijacking Detection on Hardware-Trojan Infected NoCs

  • Hussain M
  • Guo H
  • Parameswaran S
N/ACitations
Citations of this article
9Readers
Mendeley users who have this article in their library.

Abstract

Traffic hijacking is a common attack perpetrated on networked systems, where attackers eavesdrop on user transactions, manipulate packet data, and divert traffic to illegitimate locations. Similar attacks can also be unleashed in a NoC (Network on Chip) based system where the NoC comes from a third-party vendor and can be engrafted with hardware Trojans. Unlike the attackers on a traditional network, those Trojans are usually small and have limited capacity. This paper targets such a hardware Trojan; Specifically, the Trojan aims to divert traffic packets to unauthorized locations on the NoC. To detect this kind of traffic hijacking, we propose an authentication scheme in which the source and destination addresses are tagged. We develop a custom design for the packet tagging and authentication such that the implementation costs can be greatly reduced. Our experiments on a set of applications show that on average the detection circuitry incurs about 3.37% overhead in area, 2.61% in power, and 0.097% in performance when compared to the baseline design.

Cite

CITATION STYLE

APA

Hussain, M., Guo, H., & Parameswaran, S. (2018). A Customized Authentication Design for Traffic Hijacking Detection on Hardware-Trojan Infected NoCs. Journal of Computer and Communications, 06(01), 135–152. https://doi.org/10.4236/jcc.2018.61015

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free