2021
DOI: 10.1016/j.micpro.2021.103963
|View full text |Cite
|
Sign up to set email alerts
|

Exploring the security landscape: NoC-based MPSoC to Cloud-of-Chips

Abstract: This is a PDF file of an article that has undergone enhancements after acceptance, such as the addition of a cover page and metadata, and formatting for readability, but it is not yet the definitive version of record. This version will undergo additional copyediting, typesetting and review before it is published in its final form, but we are providing this version to give early visibility of the article. Please note that, during the production process, errors may be discovered which could affect the content, a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(4 citation statements)
references
References 55 publications
0
4
0
Order By: Relevance
“…Because of the growing attention shown by academia and industry, research on DoS Attack Countermeasure techniques (DoS A-CTs) in the context of MPSoCs-based IoT remains scarce in the literature. The majority of published research articles have concentrated on the MPSoC communication security aspects and several expected Hardware Trojans (HTs) and other malicious circuits that may include in the MPSoC platforms by a disloyal member during the design or fabrication process [5]. Some studies have focused on the MPSoCs communication system routing protocols and routers aspects, highlighting the necessity of the proposed defenses techniques compatible with MPSoC design constraints or investigating the appropriate countermeasure technique for MPSoC in real runtime [6]- [9].…”
Section: B Challengesmentioning
confidence: 99%
“…Because of the growing attention shown by academia and industry, research on DoS Attack Countermeasure techniques (DoS A-CTs) in the context of MPSoCs-based IoT remains scarce in the literature. The majority of published research articles have concentrated on the MPSoC communication security aspects and several expected Hardware Trojans (HTs) and other malicious circuits that may include in the MPSoC platforms by a disloyal member during the design or fabrication process [5]. Some studies have focused on the MPSoCs communication system routing protocols and routers aspects, highlighting the necessity of the proposed defenses techniques compatible with MPSoC design constraints or investigating the appropriate countermeasure technique for MPSoC in real runtime [6]- [9].…”
Section: B Challengesmentioning
confidence: 99%
“…Sharma et al [15] analyze the security aspects of MP-SoCs, discussing several defense mechanisms known in the literature, such as secure zones, firewalls, and key agreement, and then expand the discussion to the Cloud of Chips scope. Furthermore, the authors propose a software-defined network-on-chip (SDNoC) as an alternative that can reserve resources, avoiding congestion and harmful paths.…”
Section: Related Workmentioning
confidence: 99%
“…As previously mentioned, these techniques enhance cache memory architecture's overall performance. When side-channel data are detected, the theoretical usage of cache memory on a side-channel based on cryptography is a possible option [20]. Simple text encryption allows for data hacking.…”
Section: A Security Issues In Cache Memorymentioning
confidence: 99%