A Survey on the Security of Wired, Wireless, and 3D Network-on-Chips
Network-on-Chips (NoCs) have been widely used as a scalable communication solution in the design of multiprocessor system-on-chips (MPSoCs). NoCs enable communications between on-chip Intellectual Property (IP) cores and allow processing cores to achieve higher performance by outsourcing their commu...
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2021-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/9497071/ |
_version_ | 1818584750867087360 |
---|---|
author | Amin Sarihi Ahmad Patooghy Ahmed Khalid Mahdi Hasanzadeh Mostafa Said Abdel-Hameed A. Badawy |
author_facet | Amin Sarihi Ahmad Patooghy Ahmed Khalid Mahdi Hasanzadeh Mostafa Said Abdel-Hameed A. Badawy |
author_sort | Amin Sarihi |
collection | DOAJ |
description | Network-on-Chips (NoCs) have been widely used as a scalable communication solution in the design of multiprocessor system-on-chips (MPSoCs). NoCs enable communications between on-chip Intellectual Property (IP) cores and allow processing cores to achieve higher performance by outsourcing their communication tasks. NoC paradigm is based on the idea of resource sharing in which hardware resources, including buffers, communication links, routers, etc., are shared between all IPs of the MPSoC. In fact, the data being routed by each NoC router might not be related to the router’s local core. Such a utilization-centric design approach can raise security issues in NoC-based designs, e.g., integrity and confidentiality of the data being routed in an NoC might be compromised by unauthorized accesses/modifications of intermediate routers. Many papers in the literature have discovered and addressed security holes of NoCs, aiming at improving the security of the NoC paradigm. However, to the best of our knowledge, there is no solid survey study on the security vulnerabilities and countermeasures for NoCs. This paper will review security threats and countermeasures proposed so far for wired NoCs, wireless NoCs, and 3D NoCs. The paper aims at giving the readers an insight into the attacks and weaknesses/strengths of countermeasures. |
first_indexed | 2024-12-16T08:26:09Z |
format | Article |
id | doaj.art-ba7b5ae10912445baaa987b67e78151b |
institution | Directory Open Access Journal |
issn | 2169-3536 |
language | English |
last_indexed | 2024-12-16T08:26:09Z |
publishDate | 2021-01-01 |
publisher | IEEE |
record_format | Article |
series | IEEE Access |
spelling | doaj.art-ba7b5ae10912445baaa987b67e78151b2022-12-21T22:38:00ZengIEEEIEEE Access2169-35362021-01-01910762510765610.1109/ACCESS.2021.31005409497071A Survey on the Security of Wired, Wireless, and 3D Network-on-ChipsAmin Sarihi0https://orcid.org/0000-0002-0134-8418Ahmad Patooghy1https://orcid.org/0000-0003-2647-2797Ahmed Khalid2https://orcid.org/0000-0001-7258-9385Mahdi Hasanzadeh3https://orcid.org/0000-0003-3093-1319Mostafa Said4https://orcid.org/0000-0001-8331-6315Abdel-Hameed A. Badawy5https://orcid.org/0000-0001-8027-1449Klipsch School of Electrical and Computer Engineering, New Mexico State University, Las Cruces, NM, USADepartment of Computer Science, University of Central Arkansas, Conway, AR, USADepartment of Computer Engineering, Assiut University, Assiut, EgyptIndependent Researcher, Tehran, IranDepartment of Computer and Electrical Engineering and Computer Science, California State University, Bakersfield, CA, USAKlipsch School of Electrical and Computer Engineering, New Mexico State University, Las Cruces, NM, USANetwork-on-Chips (NoCs) have been widely used as a scalable communication solution in the design of multiprocessor system-on-chips (MPSoCs). NoCs enable communications between on-chip Intellectual Property (IP) cores and allow processing cores to achieve higher performance by outsourcing their communication tasks. NoC paradigm is based on the idea of resource sharing in which hardware resources, including buffers, communication links, routers, etc., are shared between all IPs of the MPSoC. In fact, the data being routed by each NoC router might not be related to the router’s local core. Such a utilization-centric design approach can raise security issues in NoC-based designs, e.g., integrity and confidentiality of the data being routed in an NoC might be compromised by unauthorized accesses/modifications of intermediate routers. Many papers in the literature have discovered and addressed security holes of NoCs, aiming at improving the security of the NoC paradigm. However, to the best of our knowledge, there is no solid survey study on the security vulnerabilities and countermeasures for NoCs. This paper will review security threats and countermeasures proposed so far for wired NoCs, wireless NoCs, and 3D NoCs. The paper aims at giving the readers an insight into the attacks and weaknesses/strengths of countermeasures.https://ieeexplore.ieee.org/document/9497071/Network-on-chipthreat modelhardware securityhardware trojanDoS attack |
spellingShingle | Amin Sarihi Ahmad Patooghy Ahmed Khalid Mahdi Hasanzadeh Mostafa Said Abdel-Hameed A. Badawy A Survey on the Security of Wired, Wireless, and 3D Network-on-Chips IEEE Access Network-on-chip threat model hardware security hardware trojan DoS attack |
title | A Survey on the Security of Wired, Wireless, and 3D Network-on-Chips |
title_full | A Survey on the Security of Wired, Wireless, and 3D Network-on-Chips |
title_fullStr | A Survey on the Security of Wired, Wireless, and 3D Network-on-Chips |
title_full_unstemmed | A Survey on the Security of Wired, Wireless, and 3D Network-on-Chips |
title_short | A Survey on the Security of Wired, Wireless, and 3D Network-on-Chips |
title_sort | survey on the security of wired wireless and 3d network on chips |
topic | Network-on-chip threat model hardware security hardware trojan DoS attack |
url | https://ieeexplore.ieee.org/document/9497071/ |
work_keys_str_mv | AT aminsarihi asurveyonthesecurityofwiredwirelessand3dnetworkonchips AT ahmadpatooghy asurveyonthesecurityofwiredwirelessand3dnetworkonchips AT ahmedkhalid asurveyonthesecurityofwiredwirelessand3dnetworkonchips AT mahdihasanzadeh asurveyonthesecurityofwiredwirelessand3dnetworkonchips AT mostafasaid asurveyonthesecurityofwiredwirelessand3dnetworkonchips AT abdelhameedabadawy asurveyonthesecurityofwiredwirelessand3dnetworkonchips AT aminsarihi surveyonthesecurityofwiredwirelessand3dnetworkonchips AT ahmadpatooghy surveyonthesecurityofwiredwirelessand3dnetworkonchips AT ahmedkhalid surveyonthesecurityofwiredwirelessand3dnetworkonchips AT mahdihasanzadeh surveyonthesecurityofwiredwirelessand3dnetworkonchips AT mostafasaid surveyonthesecurityofwiredwirelessand3dnetworkonchips AT abdelhameedabadawy surveyonthesecurityofwiredwirelessand3dnetworkonchips |