Skip to main content
Log in

A Security Framework for NoC Using Authenticated Encryption and Session Keys

  • Published:
Circuits, Systems, and Signal Processing Aims and scope Submit manuscript

Abstract

Network on Chip (NoC) is an emerging solution to the existing scalability problems with System on Chip (SoC). However, it is exposed to security threats like extraction of secret information from IP cores. In this paper we present an Authenticated Encryption (AE)-based security framework for NoC based systems. The security framework resides in Network Interface (NI) of every IP core allowing secure communication among such IP cores. The secure cores can communicate using permanent keys whereas temporary session keys are used for communication between secure and non-secure cores. A traffic limiting counter is used to prevent bandwidth denial and access rights table avoids unauthorized memory accesses. We simulated and implemented our framework using Verilog/VHDL modules on top of NoCem emulator. The results showed tolerable area overhead and did not affect the network performance apart from some initial latency.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Algorithm 1
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. T. Bjerregaard, S. Mahadevan, A survey of research and practices of network-on-chip. ACM Comput. Surv. 38, 1–51 (2006)

    Article  Google Scholar 

  2. J. Black, Authenticated encryption, in Encyclopedia of Cryptography and Security (Springer, Berlin, 2005)

    Google Scholar 

  3. J.P. Diguet, S. Evain, R. Vaslin, G. Gogniat, E. Juin, NoC-centric security of reconfigurable SoC, in Proceedings of the First International Symposium on Networks-on-Chip (2007), pp. 223–232

    Chapter  Google Scholar 

  4. M. Dworkin, Recommendation for block cipher modes of operation: Galois/Counter mode (GCM) and GMAC, in Computer Security (2007). NIST Special Publication

    Google Scholar 

  5. S. Evain, J.P. Diguet, From NoC security analysis to design solutions, in IEEE Workshop on Signal Processing Systems Design and Implementation (2005), pp. 166–171

    Google Scholar 

  6. L. Fiorin, G. Palermo, S. Lukovic, C. Silvano, Secure memory accesses on networks-on-chip. IEEE Trans. Comput. 57(9), 1216–1229 (2008)

    Article  MathSciNet  Google Scholar 

  7. L. Fiorin, G. Palermo, C. Silvano, A security monitoring service for NoCs, in Proceedings of the International Conference on Hardware/Software Codesign and System Synthesis (2008), pp. 197–202

    Google Scholar 

  8. L. Fiorin, G. Palermo, S. Lukovic, A data protection unit for nocbased architectures, in Proc. of the International Conference on Hardware/software Codesign and System Synthesis (2007), pp. 167–172

    Chapter  Google Scholar 

  9. C.H. Gebotys, R.J. Gebotys, A framework for security on NoC technologies, in Proceedings of the IEEE Computer Society Annual Symposium on VLSI (ISVLSI’03) (2003), pp. 113–117

    Chapter  Google Scholar 

  10. C.H. Gebotys, Y. Zhang, Security wrappers and power analysis for SoC technologies, in Proceedings International Conference on Hardware/software Codesign and System Synthesis (2003), pp. 162–167

    Chapter  Google Scholar 

  11. H. Inoue, T. Abe, K. Ishizaka, J. Sakai, M. Edahiro, Dynamic security domain scaling on embedded symmetric multiprocessors. ACM Trans. Des. Autom. Electron. Syst. 14, 24 (2009)

    Article  Google Scholar 

  12. H.K. Kapoor, K. Sajeesh, An authenticated encryption-based security framework for noc architectures, in Proceedings of the International Symposium on Electronic System Design (ISED) (2011), pp. 134–139

    Google Scholar 

  13. S. Lukovic, N. Christianos, Enhancing network-on-chip components to support security of processing elements, in Proceedings of the 5th Workshop on Embedded Systems Security (2010), pp. 12:1–12:9

    Google Scholar 

  14. S. Lukovic, N. Christianos, Hierarchical multi-agent protection system for NoC based MPSoCs, in Proceedings of the International Workshop on Security and Dependability for Resource Constrained Embedded Systems (2010), pp. 6:1–6:7

    Google Scholar 

  15. D.A. McGrew, J. Viega, The Galois/Counter Mode of Operation (GCM) (2005) NIST

    Google Scholar 

  16. G. Schelle, D. Grunwald, NoCem user guide and release documentation (2007)

  17. G. Schelle, D. Grunwald, Exploring FPGA network on chip implementations across various application and network loads, in Proc. of International Conference on Field Programmable Logic and Applications (2008), pp. 41–46

    Google Scholar 

  18. W. Stallings, Cryptography and Network Security: Principles and Practices. Pearson Education, 4th edn. (2006)

    Google Scholar 

  19. R. Usselmann, Advanced encryption standard/rijndael ip core (2002)

  20. H. Wu, The stream cipher hc-128, in The eSTREAM Finalists (2008), pp. 39–47

    Google Scholar 

Download references

Acknowledgements

The authors would like to thank the reviewers for their valuable comments.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hemangee K. Kapoor.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Kapoor, H.K., Rao, G.B., Arshi, S. et al. A Security Framework for NoC Using Authenticated Encryption and Session Keys. Circuits Syst Signal Process 32, 2605–2622 (2013). https://doi.org/10.1007/s00034-013-9568-5

Download citation

  • Received:

  • Revised:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00034-013-9568-5

Keywords

Navigation