2022
DOI: 10.24003/emitter.v10i2.716
|View full text |Cite
|
Sign up to set email alerts
|

Hardware Trojan Detection and Mitigation in NoC using Key authentication and Obfuscation Techniques

Abstract: Today's Multiprocessor System-on-Chip (MPSoC) contains many cores and integrated circuits. Due to the current requirements of communication, we make use of Network-on-Chip (NoC) to obtain high throughput and low latency. NoC is a communication architecture used in the processor cores to transfer  data from source to destination through several nodes. Since NoC deals with on-chip interconnection for data transmission, it will be a good prey for data leakage and other security attacks. One such way of attacking … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
0
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 25 publications
0
0
0
Order By: Relevance
“…Thejaswini et al [10] present an HT detection and mitigation approach using obfuscation and key-based authentication. The authors aim to prevent illegal transactions between routers, protecting the NoC against packet misrouting and information leakage.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Thejaswini et al [10] present an HT detection and mitigation approach using obfuscation and key-based authentication. The authors aim to prevent illegal transactions between routers, protecting the NoC against packet misrouting and information leakage.…”
Section: Related Workmentioning
confidence: 99%
“…MCSoCs are susceptible to various attacks, such as hardware Trojans (HT), side channel attacks (SCA), denial of service (DoS), and spoofing [6]. Current security methods in MCSoCs include the implementation of firewalls [7], secure routing algorithms [8], encryption [9], authentication [10], anomaly detection [11], among others. These proposals focus on mitigating a single type of attack rather than seeking to create an integrated security framework.…”
Section: Introductionmentioning
confidence: 99%