2013 IEEE Eighth International Conference on Networking, Architecture and Storage 2013
DOI: 10.1109/nas.2013.29
|View full text |Cite
|
Sign up to set email alerts
|

Robustness Analysis of Mesh-Based Network-on-Chip Architecture under Flooding-Based Denial of Service Attacks

Abstract: The attacks such as Denial of Service (DoS) violate the security of Network-on-Chip (NoC) which emerges as a promising solution for multi-core system. In this paper, we explore the robustness of mesh-based NoC architecture under various flooding-based DoS attacks. Simulation results reveal that the robustness of NoC architecture can be correlated with parameters such as routing algorithm, the number and positions of attacked nodes. It indicates that deterministic routing algorithm xy will result in less perfor… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 24 publications
(9 citation statements)
references
References 24 publications
0
8
0
Order By: Relevance
“…XY routing is simple, it basically takes all the X links first followed by Y links. There are also adaptive routing algorithms such as odd-even, west-first, north-last, and negative-first [36].…”
Section: Routing Protocolmentioning
confidence: 99%
See 1 more Smart Citation
“…XY routing is simple, it basically takes all the X links first followed by Y links. There are also adaptive routing algorithms such as odd-even, west-first, north-last, and negative-first [36].…”
Section: Routing Protocolmentioning
confidence: 99%
“…The flooded packets will fill up buffers and eat up processing time of the routers in the path making extremely high latency for legitimate packets. Several flooding based DoS attack scenarios in mesh-based NoC has been implemented and evaluated in [36]. The authors present a novel congestion based attack model to evaluate bandwidth based congestion attack on NoC.…”
Section: Availabilitymentioning
confidence: 99%
“…HT-assisted DoS attacks [26,16,27,28,29] can directly target the NoC of a many-core chip, as malfunctioning of NoC can cause the entire chip to be disconnected and disintegrated, even though each single core might still be fully functional. In [26], a bandwidth denial attack that increases the network latency by rejecting the resource request was described, and a detection method referred as RLAN (Runtime Latency Auditor for NoCs) was suggested.…”
Section: Ht-enabled Dos Attacks On Nocmentioning
confidence: 99%
“…The authors also proposed a DoS resilient wireless architecture to defend against such an attack, and they also suggested countermeasures that can alleviate the effect of the DoS attack with defense methods at both physical and data routing levels. In [28], various flooding-based DoS attacks were evaluated and the robustness of mesh-based NoC architectures under these attacks was examined. In [29], a target-activated sequential payload (TASP) HT in support of a new type of DoS attack was proposed.…”
Section: Ht-enabled Dos Attacks On Nocmentioning
confidence: 99%
“…These three classes can be directly applied in NoC infrastructures, which result in an increase in the end-to-end communication latency of the sensitive packet flows [6]. Previous published research outlines the possibility of executing DoS attacks in NoCs and propose new router architectures to mitigate them.…”
Section: Introductionmentioning
confidence: 99%