Hierarchical Group-key Management for NoC-Based MPSoCs Protection
نویسندگان
چکیده
منابع مشابه
Hierarchical Group-key Management for NoC-Based MPSoCs Protection
Group keys can be used in order to communicate secretly sensitive data among IP cores. However, the flexibility and dynamic nature of MPSoCs force reshaping the security zones at runtime. Members of a zone must be able to efficiently compute the new group key while former members must be prevented for data disclosure. Efficiently creating security zones for achieving sensitive traffic isolation...
متن کاملBandwidth-Aware Application Mapping for NoC-Based MPSoCs
Network-on-Chip (NoC) has been introduced to meet the communication challenges for on chip multi-processors and the bandwidth of NoC takes a significant role in area and power consumption of overall system. In order to minimize the bandwidth requirement of NoC, a mapping method is proposed to schedule the tasks of an application onto NoC architecture. More precisely, given the application task ...
متن کاملEnergy-Efficient Cache Coherence Protocol for NoC-based MPSoCs
As the number of cores and functionalities integrated in embedded devices increases, the amount of memory used on these devices also increases, justifying the development of memory architectures presenting scalability, low energy consumption and low latency. To implement memory solutions, most works adopting NoC-based MPSoCs only employ basic communication services, such as send/receive, withou...
متن کاملNovel Authentication & Authorization Management for Sensitive Information Privacy Protection Using Dynamic Key Based Group Key Management
This paper presents a secure authentication and authorization management mechanism for protecting privacy in sensitive information systems. It allows involved individuals and group participants to achieve high security levels and tight authorization control. The need of sharing long term secrets to authenticate individuals and group users is eradicated in the proposed protocol by dynamic keys. ...
متن کاملHierarchical Scalable Group Key Management Based on Chinese Remainder Theorem
In this paper, we present a new group key management protocol based on the Chinese Remainder Theorem (CRT), which is developed based on our previous paper [29]. By shifting more computing load onto the key server we optimized the number of re-key broadcast message, user-side key computation and number of key storages. Our protocol, Hierarchical Chinese Remaindering Group Key (HCRGK) Protocol, o...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Integrated Circuits and Systems
سال: 2016
ISSN: 1872-0234,1807-1953
DOI: 10.29292/jics.v11i1.428