8 research outputs found

    Spoofing prevention via RF power profiling in wireless network-on-chip

    Get PDF
    With increasing integration in SoCs, the Network-on-Chip (NoC) connecting of cores and accelerators is of paramount importance to provide low-latency and high-throughput communication. Due to limits of scaling of electrical wires, especially for long multi-mm distances on-chip, alternate technologies such as Wireless NoC (WNoC) have shown promise. Since WNoCs can provide low-latency one-hop transfers across the entire chip, there has been a recent surge in research demonstrating their performance and energy benefits. However, little to no work has studied the additional security challenges that are unique to WNoCs. In this work, we study the potential threat of spoofing attacks in WNoCs due to malicious hardware trojans. We introduce Veritas, a drop-in solution aimed at detecting and correcting such spoofing attacks. To this end, our solution exploits the static propagation environment of WNoCs to associate each node to a power profile. We demonstrate that, with small area and power overheads, Veritas works well in a variety of settings.Peer ReviewedPostprint (author's final draft

    Spoofing Prevention via RF Power Profiling in Wireless Network-on-Chip

    No full text
    With increased integration in SoCs, the Network-on-Chip (NoC) connecting of cores provides low-latency and high-throughput communication. Due to limits of scaling of electrical wires, especially for long multi-mm distances on-chip, Wireless NoC (WNoC) have shown promise. Since WNoCs can provide low-latency one-hop transfers across the chip, there has been a recent surge in research demonstrating their benefits. WNoCs provide unique security challenges that have yet been unexplored. We study the potential threat of spoofing attacks in WNoCs due to malicious hardware trojans, and introduce Veritas, a drop-in solution that detects and corrects such spoofing attacks. Exploiting the static propagation environment, Veritas associates a node to a power profile. We demonstrate that, with small area and power overheads, Veritas works across a variety of settings

    Architecting a secure wireless network-on-chip

    No full text
    With increasing integration in SoCs, the Network-on-Chip (NoC) connecting cores and accelerators is of paramount importance to provide low-latency and high-throughput communication. Due to limits to scaling of electrical wires in terms of energy and delay, especially for long multi-mm distances on-chip, alternate technologies such as Wireless Network-on-Chip (WNoC) have shown promise. WNoCs can provide low-latency one-hop broadcasts across the entire chip and can augment point-to-point multi-hop signaling over traditional wired NoCs. Thus, there has been a recent surge in research demonstrating the performance and energy benefits of WNoCs. However, little to no work has studied the additional security and fault tolerance challenges that are unique to WNoCs. In this work, we study potential threats related to denial-of-service, spoofing, and eavesdropping attacks in WNoCs, due to malicious hardware trojans or faulty wireless components. We introduce Prometheus, a dropin solution inside the network interface that provides protection from all three attacks, while adhering to the strict area, power and latency constraints of on-chip systems.Peer ReviewedPostprint (published version

    Spoofing prevention via RF power profiling in wireless network-on-chip

    No full text
    With increasing integration in SoCs, the Network-on-Chip (NoC) connecting of cores and accelerators is of paramount importance to provide low-latency and high-throughput communication. Due to limits of scaling of electrical wires, especially for long multi-mm distances on-chip, alternate technologies such as Wireless NoC (WNoC) have shown promise. Since WNoCs can provide low-latency one-hop transfers across the entire chip, there has been a recent surge in research demonstrating their performance and energy benefits. However, little to no work has studied the additional security challenges that are unique to WNoCs. In this work, we study the potential threat of spoofing attacks in WNoCs due to malicious hardware trojans. We introduce Veritas, a drop-in solution aimed at detecting and correcting such spoofing attacks. To this end, our solution exploits the static propagation environment of WNoCs to associate each node to a power profile. We demonstrate that, with small area and power overheads, Veritas works well in a variety of settings.Peer Reviewe

    Architecting a secure wireless network-on-chip

    No full text
    With increasing integration in SoCs, the Network-on-Chip (NoC) connecting cores and accelerators is of paramount importance to provide low-latency and high-throughput communication. Due to limits to scaling of electrical wires in terms of energy and delay, especially for long multi-mm distances on-chip, alternate technologies such as Wireless Network-on-Chip (WNoC) have shown promise. WNoCs can provide low-latency one-hop broadcasts across the entire chip and can augment point-to-point multi-hop signaling over traditional wired NoCs. Thus, there has been a recent surge in research demonstrating the performance and energy benefits of WNoCs. However, little to no work has studied the additional security and fault tolerance challenges that are unique to WNoCs. In this work, we study potential threats related to denial-of-service, spoofing, and eavesdropping attacks in WNoCs, due to malicious hardware trojans or faulty wireless components. We introduce Prometheus, a dropin solution inside the network interface that provides protection from all three attacks, while adhering to the strict area, power and latency constraints of on-chip systems.Peer Reviewe

    Direction Finding System using an N-Channel Software Defined Radio Implemented with a Phase Interferometry Algorithm

    No full text
    Providing portable and accurate radio frequency direction finding capability remains non-trivial, as estimating the direction of signals at a distance becomes very difficult when both systems are not stationary. Improvements in this area could provide significant advantages for both commercial and military systems. This paper presents a traditional radio signal direction finder implemented with a four-channel coherent receiver, GNU Radio software for the signal processing and a four-dipole antenna element array. The signals are received by the four-channel software defined radio (SDR) using a four-antenna dipole antenna array and processed through GNU Radio software. Within GNU radio software we are implementing an interferometry algorithm, through which we present the ability to determine the arrival direction of a signal based on a quadrant (45°, 135°, 225°, 315°). We further resolve the ability to visualize the signals by providing a compass which displays arrow directed to the quadrant of the signal. We will expand on our work by providing potential future improvements that would continuing to make the device more accurate and portable
    corecore