Host-based IDS installed individually to each host computer has been useful to supplement network-based IDS (Intrusion Detection System). However, host-based IDS so far developed lacks real-time response due to software implementation, and thus it has poor ability to dynamically analyze packet. In order to add the ability of real-time response with strong security, we have proposed the hardware implementation of hostbased IDS built into NIC (Network Interlace Card). The hardware of host-based IDS has been designed by using wave-pipeline technique and implemented hy using reconfigurable hardware, FPGA (Field Programmable Gate Array). This has achieved the fairly high speed of400MHz that supports 1-Ghps bandwidth by processing a few bits in.parallel on today's major bit-serial Ethernet.
Abslracl-With respect to privacy on Internet, it is a matter of keen interest to provision security for multimedia mobile communication. This is characterized by the power conscious high speed cryptography of large quantity of image data. Such demand should be covered by B single VLSl processor system. We describe in this article a hardware security-embedded multimedia mobile processor named HSgorilla by sophisticatedly unifying five up-to-date processor technique. They are single processor SMT (simultaneous multithreading), VLlW (very long instruction word), wave-pipeline, Java, and random addressing. RAC (random addressing cryptography) achieved by HSgoriUs is very promising compared wilh regular cryptographic operations in view of running time and secure strength. Carefully considering features of image cryptography by RAC, it is very promising technique in the era of ubiquitous computing. INTRODUCT~ONIn the era of ubiquitous computing, we are faced with the disturbance of privacy due to the spread of multimedia information. The protection of privacy and provision for security are crucial for M e r promoting everlasting ubiquitous trend [I]. A key technology in ubiquitous community will be a simpler yet stronger cryptographic procedure for multimedia data.Although the actual public key scheme, RSA (RivestShamir-Adelman), guarantees extremely high reliability, it is rather time-consuming. RSA suffers a trade-off between high reliability and long processing time. The exploitation of a dedicated processor implementing ECC (Elliptic Curve cryptography) [Z] might be promising. It is stronger than RSA but requires further more resources.Since it is not expedient to treat large amounts of data as public key, common key schemes are expected to complement the public key in encrypting large amounts of multimedia data. Then, it is expedient to develop a single VLSl processor system with built-in functions covering those schemes.One of our previous works for downsizing, power reduction, and speedup in ubiquitous computing was the development of a multimedia mobile processor core named gorilla [3]-[6]. The architectural aspects of gorilla are as follows. J Hardware SMT and VLIW to swiftly deal with large quantity of multimedia data. J Wave-pipeline for execution units that brings about PClike high speed and low power dissipation proper to mobile devices [7]-[HI. J Interpreter type Java CPU to enhance sophisticated multimedia processing [I31 -[IS]. J Microprogramming techniques for a hardware thread branch that covers PicoJava in conjunction with VLIW. The result of another previous work was the development of RAP (random addressing-accelerated processor). This is characterized by the direct connection of a built-in RNG (random number generator) and a data cache without additional chip area and power dissipation [19], [20]. The direct connection applied to RAP has been exactly a challenge preceding direct communication in instruction level architecture. While the direct communication in recent years exploits the directness ...
Ever growing ubiquitous environment makes overall demands for security, speed, and power consciousness in
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.