Skip to main content

Trust-Based Adaptive Routing for NoCs

  • Conference paper
  • First Online:
Embedded Computer Systems: Architectures, Modeling, and Simulation (SAMOS 2023)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 14385))

Included in the following conference series:

  • 472 Accesses

Abstract

In recent years, Network-on-Chip (NoC) has established itself as an important concept for fast and efficient data transmission in Multiprocessor System-on-Chip (MPSoC). Due to the complexity of MPSoCs, third-party components are often integrated to reduce development time and costs. However, the use of third-party components also increases the attack surface, e.g., by the injection of Hardware Trojans that may be used for a variety of attacks. In this paper, we focus on active attacks, particularly, the modification or deletion of transmitted data. The use of appropriate security mechanisms can ensure that such attacks are detected. However, the transmission of modified or deleted data has to be repeated. On the one hand, retransmissions increase network load and latencies; on the other hand, they may even not be successful if the same path is used for the retransmission. Within this paper, we propose a trust-based adaptive routing strategy that aims to select paths that are not controlled by an attacker in order to mitigate the impact of retransmissions. Simulations confirm that the reliability of a successful transmission can be significantly improved even in case of multiple attackers.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    https://omnetpp.org.

References

  1. Bhunia, S., Hsiao, M., Banga, M., Narasimhan, S.: Hardware trojan attacks: threat analysis and countermeasures. Proc. IEEE 102(8), 1229–1247 (2014)

    Article  Google Scholar 

  2. Buchegger, S., Le Boudec, J.Y.: Performance analysis of the CONFIDANT protocol. In: Proceedings of the 3rd ACM International Symposium on Mobile A Hoc Networking & Computing, pp. 226–236. ACM (2002)

    Google Scholar 

  3. Charles, S., Mishra, P.: Trust-aware routing in NoC-based SoCs. In: Mishra, P., Charles, S. (eds.) Network-on-Chip Security and Privacy, pp. 101–121. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-69131-8_5

    Chapter  Google Scholar 

  4. Charles, S., Mishra, P.: A survey of network-on-chip security attacks and countermeasures. ACM Comput. Surv. 54(5) (2021)

    Google Scholar 

  5. Fattah, M., et al.: A low-overhead, fully-distributed, guaranteed-delivery routing algorithm for faulty network-on-chips. In: Proceedings of the 9th International Symposium on Networks-on-Chip. ACM (2015)

    Google Scholar 

  6. Haase, J., Jaster, S., Franz, E., Göhringer, D.: Secure communication protocol for network-on-chip with authenticated encryption and recovery mechanism. In: 2022 IEEE 33rd International Conference on Application-Specific Systems, Architectures and Processors (ASAP), pp. 156–160. IEEE (2022)

    Google Scholar 

  7. Li, M., Zeng, Q.A., Jone, W.B.: DyXY - a proximity congestion-aware deadlock-free dynamic routing method for network on chip. IEEE (2006)

    Google Scholar 

  8. Li, T., Hofmann, C., Franz, E.: Secure and reliable data transmission in SDN-based backend networks of industrial IoT, Sydney, NSW, Australia, pp. 365–368. IEEE (2020)

    Google Scholar 

  9. Manevich, R., Cidon, I., Kolodny, A., Walter, I.: Centralized adaptive routing for NoCs. IEEE Comput. Architect. Lett. 9, 57–60 (2010)

    Article  Google Scholar 

  10. Manju, R., Das, A., Jose, J., Mishra, P.: SECTAR: secure NoC using trojan aware routing. IEEE (2021)

    Google Scholar 

  11. Michiardi, P., Molva, R.: Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Jerman-Blažič, B., Klobučar, T. (eds.) Advanced Communications and Multimedia Security. ITIFIP, vol. 100, pp. 107–121. Springer, Boston (2002). https://doi.org/10.1007/978-0-387-35612-9_9

    Chapter  Google Scholar 

  12. Moriam, S., Franz, E., Walther, P., Kumar, A., Strufe, T., Fettweis, G.: Efficient communication protection of many-core systems against active attackers. Electronics 10(3) (2021)

    Google Scholar 

  13. Nesson, T., Johnsson, S.L.: ROMM routing on mesh and torus networks. In: Proceedings of the 7th Annual ACM Symposium on Parallel Algorithms and Architectures, SPAA 1995, Santa Barbara, California, USA, pp. 275–287. ACM Press (1995)

    Google Scholar 

  14. Palesi, M., Daneshtalab, M. (eds.): Routing Algorithms in Networks-on-Chip. Springer, New York (2014)

    Google Scholar 

  15. Rezgui, A., Eltoweissy, M.: TARP: a trust-aware routing protocol for sensor-actuator networks. In: Proceedings of IEEE International Conference on Mobile Adhoc and Sensor Systems, pp. 1–9. IEEE (2007)

    Google Scholar 

  16. Sarihi, A., et al.: A survey on the security of wired, wireless, and 3D network-on-chips. IEEE Access 9, 107625–107656 (2021)

    Article  Google Scholar 

  17. Sethumadhavan, S., et al.: Trustworthy hardware from untrusted components. Commun. ACM 58(9), 60–71 (2015)

    Article  Google Scholar 

  18. Tanenbaum, A., Feamster, N., Wetherall, D.: Computer Networks, 6th edn. Pearson Education, London (2021)

    Google Scholar 

  19. Xiao, K., et al.: Hardware trojans: lessons learned after one decade of research. 22(1) (2016)

    Google Scholar 

  20. Zhou, J., Lau, F.C.: Adaptive fault-tolerant wormhole routing in 2D meshes. In: Proceedings of the 15th International Parallel and Distributed Processing Symposium (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Elke Franz .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Franz, E., Grützner, A. (2023). Trust-Based Adaptive Routing for NoCs. In: Silvano, C., Pilato, C., Reichenbach, M. (eds) Embedded Computer Systems: Architectures, Modeling, and Simulation. SAMOS 2023. Lecture Notes in Computer Science, vol 14385. Springer, Cham. https://doi.org/10.1007/978-3-031-46077-7_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-46077-7_20

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-46076-0

  • Online ISBN: 978-3-031-46077-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics