Abstract
In recent years, Network-on-Chip (NoC) has established itself as an important concept for fast and efficient data transmission in Multiprocessor System-on-Chip (MPSoC). Due to the complexity of MPSoCs, third-party components are often integrated to reduce development time and costs. However, the use of third-party components also increases the attack surface, e.g., by the injection of Hardware Trojans that may be used for a variety of attacks. In this paper, we focus on active attacks, particularly, the modification or deletion of transmitted data. The use of appropriate security mechanisms can ensure that such attacks are detected. However, the transmission of modified or deleted data has to be repeated. On the one hand, retransmissions increase network load and latencies; on the other hand, they may even not be successful if the same path is used for the retransmission. Within this paper, we propose a trust-based adaptive routing strategy that aims to select paths that are not controlled by an attacker in order to mitigate the impact of retransmissions. Simulations confirm that the reliability of a successful transmission can be significantly improved even in case of multiple attackers.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
References
Bhunia, S., Hsiao, M., Banga, M., Narasimhan, S.: Hardware trojan attacks: threat analysis and countermeasures. Proc. IEEE 102(8), 1229–1247 (2014)
Buchegger, S., Le Boudec, J.Y.: Performance analysis of the CONFIDANT protocol. In: Proceedings of the 3rd ACM International Symposium on Mobile A Hoc Networking & Computing, pp. 226–236. ACM (2002)
Charles, S., Mishra, P.: Trust-aware routing in NoC-based SoCs. In: Mishra, P., Charles, S. (eds.) Network-on-Chip Security and Privacy, pp. 101–121. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-69131-8_5
Charles, S., Mishra, P.: A survey of network-on-chip security attacks and countermeasures. ACM Comput. Surv. 54(5) (2021)
Fattah, M., et al.: A low-overhead, fully-distributed, guaranteed-delivery routing algorithm for faulty network-on-chips. In: Proceedings of the 9th International Symposium on Networks-on-Chip. ACM (2015)
Haase, J., Jaster, S., Franz, E., Göhringer, D.: Secure communication protocol for network-on-chip with authenticated encryption and recovery mechanism. In: 2022 IEEE 33rd International Conference on Application-Specific Systems, Architectures and Processors (ASAP), pp. 156–160. IEEE (2022)
Li, M., Zeng, Q.A., Jone, W.B.: DyXY - a proximity congestion-aware deadlock-free dynamic routing method for network on chip. IEEE (2006)
Li, T., Hofmann, C., Franz, E.: Secure and reliable data transmission in SDN-based backend networks of industrial IoT, Sydney, NSW, Australia, pp. 365–368. IEEE (2020)
Manevich, R., Cidon, I., Kolodny, A., Walter, I.: Centralized adaptive routing for NoCs. IEEE Comput. Architect. Lett. 9, 57–60 (2010)
Manju, R., Das, A., Jose, J., Mishra, P.: SECTAR: secure NoC using trojan aware routing. IEEE (2021)
Michiardi, P., Molva, R.: Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Jerman-Blažič, B., Klobučar, T. (eds.) Advanced Communications and Multimedia Security. ITIFIP, vol. 100, pp. 107–121. Springer, Boston (2002). https://doi.org/10.1007/978-0-387-35612-9_9
Moriam, S., Franz, E., Walther, P., Kumar, A., Strufe, T., Fettweis, G.: Efficient communication protection of many-core systems against active attackers. Electronics 10(3) (2021)
Nesson, T., Johnsson, S.L.: ROMM routing on mesh and torus networks. In: Proceedings of the 7th Annual ACM Symposium on Parallel Algorithms and Architectures, SPAA 1995, Santa Barbara, California, USA, pp. 275–287. ACM Press (1995)
Palesi, M., Daneshtalab, M. (eds.): Routing Algorithms in Networks-on-Chip. Springer, New York (2014)
Rezgui, A., Eltoweissy, M.: TARP: a trust-aware routing protocol for sensor-actuator networks. In: Proceedings of IEEE International Conference on Mobile Adhoc and Sensor Systems, pp. 1–9. IEEE (2007)
Sarihi, A., et al.: A survey on the security of wired, wireless, and 3D network-on-chips. IEEE Access 9, 107625–107656 (2021)
Sethumadhavan, S., et al.: Trustworthy hardware from untrusted components. Commun. ACM 58(9), 60–71 (2015)
Tanenbaum, A., Feamster, N., Wetherall, D.: Computer Networks, 6th edn. Pearson Education, London (2021)
Xiao, K., et al.: Hardware trojans: lessons learned after one decade of research. 22(1) (2016)
Zhou, J., Lau, F.C.: Adaptive fault-tolerant wormhole routing in 2D meshes. In: Proceedings of the 15th International Parallel and Distributed Processing Symposium (2001)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Franz, E., Grützner, A. (2023). Trust-Based Adaptive Routing for NoCs. In: Silvano, C., Pilato, C., Reichenbach, M. (eds) Embedded Computer Systems: Architectures, Modeling, and Simulation. SAMOS 2023. Lecture Notes in Computer Science, vol 14385. Springer, Cham. https://doi.org/10.1007/978-3-031-46077-7_20
Download citation
DOI: https://doi.org/10.1007/978-3-031-46077-7_20
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-46076-0
Online ISBN: 978-3-031-46077-7
eBook Packages: Computer ScienceComputer Science (R0)