Abstract
Network on Chip (NoC) is an emerging solution to the existing scalability problems with System on Chip (SoC). However, it is exposed to security threats like extraction of secret information from IP cores. In this paper we present an Authenticated Encryption (AE)-based security framework for NoC based systems. The security framework resides in Network Interface (NI) of every IP core allowing secure communication among such IP cores. The secure cores can communicate using permanent keys whereas temporary session keys are used for communication between secure and non-secure cores. A traffic limiting counter is used to prevent bandwidth denial and access rights table avoids unauthorized memory accesses. We simulated and implemented our framework using Verilog/VHDL modules on top of NoCem emulator. The results showed tolerable area overhead and did not affect the network performance apart from some initial latency.
Similar content being viewed by others
References
T. Bjerregaard, S. Mahadevan, A survey of research and practices of network-on-chip. ACM Comput. Surv. 38, 1–51 (2006)
J. Black, Authenticated encryption, in Encyclopedia of Cryptography and Security (Springer, Berlin, 2005)
J.P. Diguet, S. Evain, R. Vaslin, G. Gogniat, E. Juin, NoC-centric security of reconfigurable SoC, in Proceedings of the First International Symposium on Networks-on-Chip (2007), pp. 223–232
M. Dworkin, Recommendation for block cipher modes of operation: Galois/Counter mode (GCM) and GMAC, in Computer Security (2007). NIST Special Publication
S. Evain, J.P. Diguet, From NoC security analysis to design solutions, in IEEE Workshop on Signal Processing Systems Design and Implementation (2005), pp. 166–171
L. Fiorin, G. Palermo, S. Lukovic, C. Silvano, Secure memory accesses on networks-on-chip. IEEE Trans. Comput. 57(9), 1216–1229 (2008)
L. Fiorin, G. Palermo, C. Silvano, A security monitoring service for NoCs, in Proceedings of the International Conference on Hardware/Software Codesign and System Synthesis (2008), pp. 197–202
L. Fiorin, G. Palermo, S. Lukovic, A data protection unit for nocbased architectures, in Proc. of the International Conference on Hardware/software Codesign and System Synthesis (2007), pp. 167–172
C.H. Gebotys, R.J. Gebotys, A framework for security on NoC technologies, in Proceedings of the IEEE Computer Society Annual Symposium on VLSI (ISVLSI’03) (2003), pp. 113–117
C.H. Gebotys, Y. Zhang, Security wrappers and power analysis for SoC technologies, in Proceedings International Conference on Hardware/software Codesign and System Synthesis (2003), pp. 162–167
H. Inoue, T. Abe, K. Ishizaka, J. Sakai, M. Edahiro, Dynamic security domain scaling on embedded symmetric multiprocessors. ACM Trans. Des. Autom. Electron. Syst. 14, 24 (2009)
H.K. Kapoor, K. Sajeesh, An authenticated encryption-based security framework for noc architectures, in Proceedings of the International Symposium on Electronic System Design (ISED) (2011), pp. 134–139
S. Lukovic, N. Christianos, Enhancing network-on-chip components to support security of processing elements, in Proceedings of the 5th Workshop on Embedded Systems Security (2010), pp. 12:1–12:9
S. Lukovic, N. Christianos, Hierarchical multi-agent protection system for NoC based MPSoCs, in Proceedings of the International Workshop on Security and Dependability for Resource Constrained Embedded Systems (2010), pp. 6:1–6:7
D.A. McGrew, J. Viega, The Galois/Counter Mode of Operation (GCM) (2005) NIST
G. Schelle, D. Grunwald, NoCem user guide and release documentation (2007)
G. Schelle, D. Grunwald, Exploring FPGA network on chip implementations across various application and network loads, in Proc. of International Conference on Field Programmable Logic and Applications (2008), pp. 41–46
W. Stallings, Cryptography and Network Security: Principles and Practices. Pearson Education, 4th edn. (2006)
R. Usselmann, Advanced encryption standard/rijndael ip core (2002)
H. Wu, The stream cipher hc-128, in The eSTREAM Finalists (2008), pp. 39–47
Acknowledgements
The authors would like to thank the reviewers for their valuable comments.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Kapoor, H.K., Rao, G.B., Arshi, S. et al. A Security Framework for NoC Using Authenticated Encryption and Session Keys. Circuits Syst Signal Process 32, 2605–2622 (2013). https://doi.org/10.1007/s00034-013-9568-5
Received:
Revised:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00034-013-9568-5