Hardware Trojan Detection and Mitigation in NoC using Key authentication and Obfuscation Techniques

IF 0.4 Q4 ENGINEERING, ELECTRICAL & ELECTRONIC
Thejaswini P, V. G, Anu H, Priya R, Krishna Prasad B S, Nischay M
{"title":"Hardware Trojan Detection and Mitigation in NoC using Key authentication and Obfuscation Techniques","authors":"Thejaswini P, V. G, Anu H, Priya R, Krishna Prasad B S, Nischay M","doi":"10.24003/emitter.v10i2.716","DOIUrl":null,"url":null,"abstract":"Today's Multiprocessor System-on-Chip (MPSoC) contains many cores and integrated circuits. Due to the current requirements of communication, we make use of Network-on-Chip (NoC) to obtain high throughput and low latency. NoC is a communication architecture used in the processor cores to transfer  data from source to destination through several nodes. Since NoC deals with on-chip interconnection for data transmission, it will be a good prey for data leakage and other security attacks. One such way of attacking is done by a third-party vendor introducing Hardware Trojans (HTs) into routers of NoC architecture. This can cause packets to traverse in wrong paths, leak/extract information and cause Denial-of-Service (DoS) degrading the system performance. In this paper, a novel HT detection and mitigation approach using obfuscation and key-based authentication technique is proposed. The proposed technique prevents any illegal transitions between routers thereby protecting data from malicious activities, such as packet misrouting and information leakage. The proposed technique is evaluated on a 4x4 NoC architecture under synthetic traffic pattern and benchmarks, the hardware model is synthesized in Cadence Tool with 90nm technology. The introduced Hardware Trojan affects 8% of packets passing through infected router. Experimental results demonstrate that the proposed technique prevents those 10-15% of packets infected from the HT effect. Our proposed work has negligible power and area overhead of 8.6% and  2% respectively.","PeriodicalId":40905,"journal":{"name":"EMITTER-International Journal of Engineering Technology","volume":null,"pages":null},"PeriodicalIF":0.4000,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"EMITTER-International Journal of Engineering Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.24003/emitter.v10i2.716","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
引用次数: 1

Abstract

Today's Multiprocessor System-on-Chip (MPSoC) contains many cores and integrated circuits. Due to the current requirements of communication, we make use of Network-on-Chip (NoC) to obtain high throughput and low latency. NoC is a communication architecture used in the processor cores to transfer  data from source to destination through several nodes. Since NoC deals with on-chip interconnection for data transmission, it will be a good prey for data leakage and other security attacks. One such way of attacking is done by a third-party vendor introducing Hardware Trojans (HTs) into routers of NoC architecture. This can cause packets to traverse in wrong paths, leak/extract information and cause Denial-of-Service (DoS) degrading the system performance. In this paper, a novel HT detection and mitigation approach using obfuscation and key-based authentication technique is proposed. The proposed technique prevents any illegal transitions between routers thereby protecting data from malicious activities, such as packet misrouting and information leakage. The proposed technique is evaluated on a 4x4 NoC architecture under synthetic traffic pattern and benchmarks, the hardware model is synthesized in Cadence Tool with 90nm technology. The introduced Hardware Trojan affects 8% of packets passing through infected router. Experimental results demonstrate that the proposed technique prevents those 10-15% of packets infected from the HT effect. Our proposed work has negligible power and area overhead of 8.6% and  2% respectively.
基于密钥认证和混淆技术的NoC硬件木马检测与缓解
今天的多处理器片上系统(MPSoC)包含许多核心和集成电路。由于当前通信的要求,我们利用片上网络(NoC)来获得高吞吐量和低延迟。NoC是处理器核心中使用的一种通信体系结构,通过多个节点将数据从源传输到目标。由于NoC处理的是数据传输的片上互连,因此它将成为数据泄露和其他安全攻击的好猎物。一种这样的攻击方式是由第三方供应商将硬件木马(ht)引入NoC架构的路由器。这可能导致数据包在错误的路径上遍历,泄漏/提取信息,并导致拒绝服务(DoS),降低系统性能。本文提出了一种基于模糊和基于密钥的认证技术的新型高温检测和缓解方法。所提出的技术可以防止路由器之间的非法传输,从而保护数据免受恶意活动的影响,例如数据包路由错误和信息泄漏。在综合流量模式和基准测试下,在4x4 NoC架构上对该技术进行了评估,并在Cadence Tool中采用90nm技术合成了硬件模型。引入的硬件木马会影响通过受感染路由器的8%的数据包。实验结果表明,该技术可以有效防止10-15%的数据包感染HT效应。我们建议的工作功率和面积开销分别为8.6%和2%,可以忽略不计。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
EMITTER-International Journal of Engineering Technology
EMITTER-International Journal of Engineering Technology ENGINEERING, ELECTRICAL & ELECTRONIC-
自引率
0.00%
发文量
7
审稿时长
12 weeks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信