2020 IEEE International Symposium on Circuits and Systems (ISCAS) 2020
DOI: 10.1109/iscas45731.2020.9180581
|View full text |Cite
|
Sign up to set email alerts
|

Security Threats in Channel Access Mechanism of Wireless NoC and Efficient Countermeasures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
6
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
1
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 20 publications
0
6
0
Order By: Relevance
“…On-off keying modulation and medium access control (MAC) are the most popular techniques to ensure simple circuit and collision-free wireless communication. Token-based MAC is frequently used to allocate WI slots, making it an easy target for attacks that aim to disrupt communication through unauthorized access to data or tokens [48], [49]. The use of error control coding in wireless interfaces can improve communication reliability [50], but this does not prevent attacks from taking place.…”
Section: Wireless Interface (Wi)mentioning
confidence: 99%
See 1 more Smart Citation
“…On-off keying modulation and medium access control (MAC) are the most popular techniques to ensure simple circuit and collision-free wireless communication. Token-based MAC is frequently used to allocate WI slots, making it an easy target for attacks that aim to disrupt communication through unauthorized access to data or tokens [48], [49]. The use of error control coding in wireless interfaces can improve communication reliability [50], but this does not prevent attacks from taking place.…”
Section: Wireless Interface (Wi)mentioning
confidence: 99%
“…Wireless interface-based availability and integrity attacks are tackled in [48] and [49]. Shared single channels and allocation of slots using a token-based scheme are also considered here.…”
Section: Wireless Interface (Wi)mentioning
confidence: 99%
“…Such attacks can be initiated by implanting a time-bomb HT as shown in Fig. 5 [8]. Whenever the register value reaches zero, the payload circuit activates the load enable signal (LEn*).…”
Section: Wireless Noc Securitymentioning
confidence: 99%
“…In a decentralized CACM, a distributed ranking-based channel access controller (DRCAC) is deployed within the WI as shown in Fig. 6(a) [8]. Initially, the information related to the traffic density and the data criticality status of all the WIs is broadcast over the wireless channel.…”
Section: Wireless Noc Securitymentioning
confidence: 99%
“…In [112], the authors have utilized a distributed channel access mechanism (CAM). Each CAM controller determines the access time needed for its corresponding WI according to the local load level [113].…”
Section: Wireless Nocs Countermeasuresmentioning
confidence: 99%