2021
DOI: 10.1109/tetc.2020.2973427
|View full text |Cite
|
Sign up to set email alerts
|

Attacks Toward Wireless Network-on-Chip and Countermeasures

Abstract: IntroductionA Wireless Network-on-Chip (WiNoC) offers a promising solution to reduce broadcast and long distance communication bottlenecks of conventional architectures by augmenting them with single hop wireless links. In this paper, we discuss new security vulnerabilities and countermeasures to protect against them in a WiNoC based system. In particular, we describe Malicious Threshold Configuration (MTC) Attack, Disruptive Token Passing (DTP) Attack, Data Stealing by Broadcast (DSB) Attack and Hybrid Attack… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 38 publications
(50 reference statements)
0
4
0
Order By: Relevance
“…Similarly, spoofing is detected by monitoring the channel against a threshold idle time. In [57], various novel attacks, namely, Malicious threshold configuration attacks, Disruptive token passing attacks, Data stealing by broad-cast attacks, and Hybrid attacks in wireless interfaces, are described. These attacks involve tampering with the router, NI, and wireless hub configuration (HC) registers to cause various security vulnerabilities.…”
Section: Wireless Interface (Wi)mentioning
confidence: 99%
See 1 more Smart Citation
“…Similarly, spoofing is detected by monitoring the channel against a threshold idle time. In [57], various novel attacks, namely, Malicious threshold configuration attacks, Disruptive token passing attacks, Data stealing by broad-cast attacks, and Hybrid attacks in wireless interfaces, are described. These attacks involve tampering with the router, NI, and wireless hub configuration (HC) registers to cause various security vulnerabilities.…”
Section: Wireless Interface (Wi)mentioning
confidence: 99%
“…Monitors packet transmission, reception, and token access counts [57] Tailored to suit token-based channel access mechanism limiting their adaptability.…”
Section: Access Time Manipulationmentioning
confidence: 99%
“…The malicious configuration attacks discussed in Section III-B are addressed in [114]. The authors have used reconfigurable routers, NIs, and wireless hubs.…”
Section: Wireless Nocs Countermeasuresmentioning
confidence: 99%
“…Recent technological advances makes it feasible to integrate wireless transceivers on a silicon die [18]. Consequently, various contributions have been made in literature to improve the power and performance efficiency of traditional wirebased NoCs by augmenting long ranged wireless channels in the form of mm-wave forming hybrid architectures [19], [20].…”
Section: Related Workmentioning
confidence: 99%