Design Challenges in Security Processing
نویسندگان
چکیده
In this paper, we present an investigation into the challenges in designing a network processor that is additionally capable of security processing. First, we provide an overview of the cryptographic algorithms utilized in security processing and highlight several current network protocols that employ these algorithms. Second, we discuss several issues in designing a solution for security processing through the utilization of general-purpose processors, applicationspecific circuits, and/or reconfigurable hardware. Third, several existing commercially available security processors are surveyed followed by an examination of their system architecture and functional objectives. Finally, we highlight the challenges that designers are facing in designing a novel network processor intended to perform both security processing and other network processing tasks. The challenges lies in finding solutions for the following: programmability, reconfigurability, dynamic reconfiguration, new instruction sets, wireless security processing, and secure multimedia data processing. Keywords— Network Processors; Security Processing; Protocol Processing; Reconfigurability; Programmability
منابع مشابه
Security Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System
Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...
متن کاملIEC 60870-5-104 Protocol Security Challenges and Countermeasures Identification
Industrial control systems (ICSs) which are used in critical infrastructure and other industries mostly use various communication protocols. Most of these communication protocols have various cyber security challenges and weakness that give the attackers the opportunity to gain to their malicious intentions. In this paper, we assess IEC 60870-5-104 protocols from security perspective which is u...
متن کاملEmbedding Security in Wireless Embedded Systems
We present an overview of how the need for security will impact the design of embedded systems and the ICs they contain. After a brief introduction to security, we discuss the challenges security processing poses to embedded system architects, integrators, HW designers, and SW engineers. These challenges, as well as current and emerging solutions to address them, are discussed in the context of...
متن کاملPlatforms and Applications in Hardware Security: Trends and Challenges
This paper introduces a few research studies being conducted that are using multicore embedded systems, highlighting the challenges and questions relevant to R&D (Research and Development) in computer systems architecture, focusing on design aspects and optimization of embedded systems that needs to run security solutions or cryptographical algorithms using hardware acceleration, aiming for goo...
متن کاملCognitive Information Processing Challenges for Homeland Security
This paper describes the goals and emerging results of an ongoing research project in order to solicit input and feedback from the AI for Homeland Security community. The objective is to gain a greater understanding of the performance issues and computational requirements associated with real world AI applications for intelligence analysis and homeland security. These computational requirements...
متن کامل