2019
DOI: 10.3390/jlpea9010007
|View full text |Cite
|
Sign up to set email alerts
|

DoS Attack Detection and Path Collision Localization in NoC-Based MPSoC Architectures

Abstract: Denial of Service (DoS) attacks are an increasing threat for Multiprocessor System-on-Chip (MPSoC) architectures. By exploiting the shared resources on the chip, an attacker is able to prevent completion or degrade the performance of a task. This is extremely dangerous for MPSoCs used in critical applications. The Network-on-Chip (NoC), as a central MPSoC infrastructure, is exposed to this attack. In order to maintain communication availability, NoCs should be enhanced with an effective and precise attack dete… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(4 citation statements)
references
References 21 publications
0
4
0
Order By: Relevance
“…As we mentioned, the CRITIC approach has six steps to be applied to compute the DM criteria weights. The obtained weights after applying Equation (11) to normalize the DM into the interval of (0 to 1) then using Equation (12) to determine the intensity of the contrast using the standard deviation of normalized criterion values. Moreover, Equation ( 13) was utilized after obtaining a symmetric matrix to express the criteria's correlation coefficient.…”
Section: A Criteria Weighting Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…As we mentioned, the CRITIC approach has six steps to be applied to compute the DM criteria weights. The obtained weights after applying Equation (11) to normalize the DM into the interval of (0 to 1) then using Equation (12) to determine the intensity of the contrast using the standard deviation of normalized criterion values. Moreover, Equation ( 13) was utilized after obtaining a symmetric matrix to express the criteria's correlation coefficient.…”
Section: A Criteria Weighting Resultsmentioning
confidence: 99%
“…This section categorizes the DoS attacks in the context of MPSoC-based IoT according to the threat motel. The threat model is a methodology based on pre-identified steps implemented by a system attacker [39]. In general, DoS attacks almost shares the same characteristics regarding threat models in the context of MPSoCs-based IoT except for a few improvements by attackers or system designers in terms of improving their DoS attacks countermeasure techniques against proposed DoS strategies (e.g., DoS and DDoS) attacks.…”
Section: B Dos Attack Threat Modelmentioning
confidence: 99%
“…However, the downloaded software may be malicious and modify the system operation, retrieve secret information, or disrupt their services. Since the NoC is a shared medium is the preferred center of hackers’ attacks, it will affect computation and communication services [ 33 ]. In the IoT context, NoC-based systems integrate cryptographic hardware core for confidentiality and authentication security services.…”
Section: The Motivation For An Sdnoc Approachmentioning
confidence: 99%
“…Security vulnerabilities, especially in the IoT context, arise due to exposure of the MCSoC infrastructure to DoS attacks by malicious users. An example of a low-cost mechanism for detecting the location of the attacker in the MCSoC and direction of the collision is presented by Chaves et al [ 43 ].…”
Section: Related Workmentioning
confidence: 99%