Institutional Repository [SANDBOX]
Technical University of Crete
EN  |  EL

Search

Browse

My Space

Security enhancements for building saturation-free, low-power NoC-based MPSoCs

Papadimitriou Kyprianos, Petrakis Polydoros, Grammatikakis Miltos D., Coppola Marcello

Full record


URI: http://purl.tuc.gr/dl/dias/2256BE2E-FD4B-458E-9A39-42A1599280D7
Year 2015
Type of Item Conference Full Paper
License
Details
Bibliographic Citation K. Papadimitriou, P. Petrakis, M. Grammatikakis and M. Coppola, "Security Enhancements for Building Saturation-free, Low-power NoC-based MPSoCs", in IEEE International Workshop on Security and Privacy in Cybermatics (SPiCy), in conjunction with the IEEE International Conference on Communications and Network Security (CNS), Sep. 2015.
Appears in Collections

Summary

In the future almost every consumer electronicsdevice will be connected to an ecosystem of third-party partnersproviding services such as payment, streaming content, and soon. Present work aims to expose the foundations of a secureenvironment by ensuring security on the edge devices. MPSoCsare widely used in edge devices due to their capability to executemultiple applications in single-chips. To achieve the targetedsecurity level against physical adversaries, all communicationsbetween the MPSoC and its environment must be protected.In an MPSoC multiple processing elements such as CPUssend requests to different on-chip memories. Network-on-chiphas been proposed for MPSoC design, aiming at increasingperformance and reducing power compared to on-chip buses.Tailoring the NoC to application(s) takes place usually at designtime.The selection of NoC parameter values affects both performanceand power, while configuring them unwisely can result inunnecessary area overhead and chip cost. In the present workwe concentrate on a commercial interconnect called STNoC fromSTMicroelectronics. We keep the NoC parameters fixed, and weexplore the effects from the variation of other parameters, such asthe injection rate of the packets transmitted by the CPUs, and theactivation/deactivation of a security mechanism integrated in thenetwork interface of the NoC, for multiple traffic scenarios witheach one representing different amount of legal and maliciousrequests, for different mappings, and for different node setups.Experimental results, reveal the conditions under which the NoCstarts experiencing saturation phenomena.

Services

Statistics