A Survey on the Security of Wired, Wireless, and 3D Network-on-Chips

Network-on-Chips (NoCs) have been widely used as a scalable communication solution in the design of multiprocessor system-on-chips (MPSoCs). NoCs enable communications between on-chip Intellectual Property (IP) cores and allow processing cores to achieve higher performance by outsourcing their commu...

Full description

Bibliographic Details
Main Authors: Amin Sarihi, Ahmad Patooghy, Ahmed Khalid, Mahdi Hasanzadeh, Mostafa Said, Abdel-Hameed A. Badawy
Format: Article
Language:English
Published: IEEE 2021-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/9497071/
_version_ 1818584750867087360
author Amin Sarihi
Ahmad Patooghy
Ahmed Khalid
Mahdi Hasanzadeh
Mostafa Said
Abdel-Hameed A. Badawy
author_facet Amin Sarihi
Ahmad Patooghy
Ahmed Khalid
Mahdi Hasanzadeh
Mostafa Said
Abdel-Hameed A. Badawy
author_sort Amin Sarihi
collection DOAJ
description Network-on-Chips (NoCs) have been widely used as a scalable communication solution in the design of multiprocessor system-on-chips (MPSoCs). NoCs enable communications between on-chip Intellectual Property (IP) cores and allow processing cores to achieve higher performance by outsourcing their communication tasks. NoC paradigm is based on the idea of resource sharing in which hardware resources, including buffers, communication links, routers, etc., are shared between all IPs of the MPSoC. In fact, the data being routed by each NoC router might not be related to the router’s local core. Such a utilization-centric design approach can raise security issues in NoC-based designs, e.g., integrity and confidentiality of the data being routed in an NoC might be compromised by unauthorized accesses/modifications of intermediate routers. Many papers in the literature have discovered and addressed security holes of NoCs, aiming at improving the security of the NoC paradigm. However, to the best of our knowledge, there is no solid survey study on the security vulnerabilities and countermeasures for NoCs. This paper will review security threats and countermeasures proposed so far for wired NoCs, wireless NoCs, and 3D NoCs. The paper aims at giving the readers an insight into the attacks and weaknesses/strengths of countermeasures.
first_indexed 2024-12-16T08:26:09Z
format Article
id doaj.art-ba7b5ae10912445baaa987b67e78151b
institution Directory Open Access Journal
issn 2169-3536
language English
last_indexed 2024-12-16T08:26:09Z
publishDate 2021-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj.art-ba7b5ae10912445baaa987b67e78151b2022-12-21T22:38:00ZengIEEEIEEE Access2169-35362021-01-01910762510765610.1109/ACCESS.2021.31005409497071A Survey on the Security of Wired, Wireless, and 3D Network-on-ChipsAmin Sarihi0https://orcid.org/0000-0002-0134-8418Ahmad Patooghy1https://orcid.org/0000-0003-2647-2797Ahmed Khalid2https://orcid.org/0000-0001-7258-9385Mahdi Hasanzadeh3https://orcid.org/0000-0003-3093-1319Mostafa Said4https://orcid.org/0000-0001-8331-6315Abdel-Hameed A. Badawy5https://orcid.org/0000-0001-8027-1449Klipsch School of Electrical and Computer Engineering, New Mexico State University, Las Cruces, NM, USADepartment of Computer Science, University of Central Arkansas, Conway, AR, USADepartment of Computer Engineering, Assiut University, Assiut, EgyptIndependent Researcher, Tehran, IranDepartment of Computer and Electrical Engineering and Computer Science, California State University, Bakersfield, CA, USAKlipsch School of Electrical and Computer Engineering, New Mexico State University, Las Cruces, NM, USANetwork-on-Chips (NoCs) have been widely used as a scalable communication solution in the design of multiprocessor system-on-chips (MPSoCs). NoCs enable communications between on-chip Intellectual Property (IP) cores and allow processing cores to achieve higher performance by outsourcing their communication tasks. NoC paradigm is based on the idea of resource sharing in which hardware resources, including buffers, communication links, routers, etc., are shared between all IPs of the MPSoC. In fact, the data being routed by each NoC router might not be related to the router’s local core. Such a utilization-centric design approach can raise security issues in NoC-based designs, e.g., integrity and confidentiality of the data being routed in an NoC might be compromised by unauthorized accesses/modifications of intermediate routers. Many papers in the literature have discovered and addressed security holes of NoCs, aiming at improving the security of the NoC paradigm. However, to the best of our knowledge, there is no solid survey study on the security vulnerabilities and countermeasures for NoCs. This paper will review security threats and countermeasures proposed so far for wired NoCs, wireless NoCs, and 3D NoCs. The paper aims at giving the readers an insight into the attacks and weaknesses/strengths of countermeasures.https://ieeexplore.ieee.org/document/9497071/Network-on-chipthreat modelhardware securityhardware trojanDoS attack
spellingShingle Amin Sarihi
Ahmad Patooghy
Ahmed Khalid
Mahdi Hasanzadeh
Mostafa Said
Abdel-Hameed A. Badawy
A Survey on the Security of Wired, Wireless, and 3D Network-on-Chips
IEEE Access
Network-on-chip
threat model
hardware security
hardware trojan
DoS attack
title A Survey on the Security of Wired, Wireless, and 3D Network-on-Chips
title_full A Survey on the Security of Wired, Wireless, and 3D Network-on-Chips
title_fullStr A Survey on the Security of Wired, Wireless, and 3D Network-on-Chips
title_full_unstemmed A Survey on the Security of Wired, Wireless, and 3D Network-on-Chips
title_short A Survey on the Security of Wired, Wireless, and 3D Network-on-Chips
title_sort survey on the security of wired wireless and 3d network on chips
topic Network-on-chip
threat model
hardware security
hardware trojan
DoS attack
url https://ieeexplore.ieee.org/document/9497071/
work_keys_str_mv AT aminsarihi asurveyonthesecurityofwiredwirelessand3dnetworkonchips
AT ahmadpatooghy asurveyonthesecurityofwiredwirelessand3dnetworkonchips
AT ahmedkhalid asurveyonthesecurityofwiredwirelessand3dnetworkonchips
AT mahdihasanzadeh asurveyonthesecurityofwiredwirelessand3dnetworkonchips
AT mostafasaid asurveyonthesecurityofwiredwirelessand3dnetworkonchips
AT abdelhameedabadawy asurveyonthesecurityofwiredwirelessand3dnetworkonchips
AT aminsarihi surveyonthesecurityofwiredwirelessand3dnetworkonchips
AT ahmadpatooghy surveyonthesecurityofwiredwirelessand3dnetworkonchips
AT ahmedkhalid surveyonthesecurityofwiredwirelessand3dnetworkonchips
AT mahdihasanzadeh surveyonthesecurityofwiredwirelessand3dnetworkonchips
AT mostafasaid surveyonthesecurityofwiredwirelessand3dnetworkonchips
AT abdelhameedabadawy surveyonthesecurityofwiredwirelessand3dnetworkonchips