2019
DOI: 10.1109/tvlsi.2019.2928960
|View full text |Cite
|
Sign up to set email alerts
|

Securing a Wireless Network-on-Chip Against Jamming-Based Denial-of-Service and Eavesdropping Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 29 publications
(19 citation statements)
references
References 26 publications
0
15
0
Order By: Relevance
“…In [108]- [110] the authors have targeted jamming and eavesdropping attacks from both internal and external sources. The jammer node is assumed to inject packets without permission, i.e., with no valid token.…”
Section: Wireless Nocs Countermeasuresmentioning
confidence: 99%
See 2 more Smart Citations
“…In [108]- [110] the authors have targeted jamming and eavesdropping attacks from both internal and external sources. The jammer node is assumed to inject packets without permission, i.e., with no valid token.…”
Section: Wireless Nocs Countermeasuresmentioning
confidence: 99%
“…To protect the chip against possible external eavesdroppers, the authors used a simple data scrambling approach in the form of XORing the flits with the same (periodically changing) key. For internal eavesdropping attacks, though, they have equipped the input port with a low [108], [109].…”
Section: Wireless Nocs Countermeasuresmentioning
confidence: 99%
See 1 more Smart Citation
“…The HT on the interface will interfere with the signal for a long enough time, making the calibration/detection module ineffective. This situation will evolve into a DoS attack and even other WIs on the chip will be affected [ 67 ].…”
Section: Hardware Trojans On Special Chipsmentioning
confidence: 99%
“…The study has used Poisson process over multiple tier with information about regular and malicious nodes using probability concept. Vashist et al [16] have developed an analytical model for resisting denial-of-service attack along with jamming attack. The solutions for this is presented using correction code with burst error as well as the authors have also deployed a unique classification approach using machine learning.…”
Section: Related Workmentioning
confidence: 99%