A Survey of Network-on-Chip Security Attacks and Countermeasures
نویسندگان
چکیده
With the advances of chip manufacturing technologies, computer architects have been able to integrate an increasing number processors and other heterogeneous components on same chip. Network-on-Chip (NoC) is widely employed by multicore System-on-Chip (SoC) architectures cater their communication requirements. NoC has received significant attention from both attackers defenders. The increased usage its distributed nature across made it a focal point potential security attacks. Due prime location in SoC coupled with connectivity various components, can be effectively utilized implement countermeasures protect There wide variety existing literature attacks countermeasures. In this article, we provide comprehensive survey vulnerabilities NoC-based discuss relevant
منابع مشابه
A survey on RPL attacks and their countermeasures
RPL (Routing Protocol for Low Power and Lossy Networks) has been designed for low power networks with high packet loss. Generally, devices with low processing power and limited memory are used in this type of network. IoT (Internet of Things) is a typical example of low power lossy networks. In this technology, objects are interconnected through a network consisted of low-power circuits. Exampl...
متن کاملNetwork Coding Security: Attacks and Countermeasures
By allowing intermediate nodes to perform non-trivial operations on packets, such as mixing data from multiple streams, network coding breaks with the ruling store and forward networking paradigm and opens a myriad of challenging security questions. Following a brief overview of emerging network coding protocols, we provide a taxonomy of their security vulnerabilities, which highlights the diff...
متن کاملSecurity Attacks and Countermeasures for Wireless Sensor Networks: Survey
The security topic is a conclusive challenge for Wireless Sensor Networks (WSNs) due to the deployment nature and the resources limitations of wireless sensor devices used in such networks. Wireless Sensor Networks are used sometime in very sensitive applications, such as military, airports, and healthcare. Therefore, we must address the security concerns from the beginning of network design. D...
متن کاملDevelopment of DNS security, attacks and countermeasures
We use the Internet every day. The Internet relies in its very foundations on DNS, the Domain Name System. What most people don’t know is how fragile DNS actually is. This paper discusses the shortcomings of DNS, and how it is being secured. We explain common attacks, such as cache poisoning and DNS forgery. Then we mention some incidents briefly, before moving on the improvements. The improvem...
متن کاملA survey on security attacks and countermeasures with primary user detection in cognitive radio networks
Currently, there are several ongoing efforts for the definition of new regulation policies, paradigms, and technologies aiming a more efficient usage of the radio spectrum. In this context, cognitive radio (CR) emerges as one of the most promising players by enabling the dynamic access to vacant frequency bands on a non-interference basis. However, the intrinsic characteristic of CR opens new w...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ACM Computing Surveys
سال: 2021
ISSN: ['0360-0300', '1557-7341']
DOI: https://doi.org/10.1145/3450964