Title | Securing a Wireless Network-on-Chip Against Jamming Based Denial-of-Service Attacks |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Vashist, Abhishek, Keats, Andrew, Pudukotai Dinakarrao, Sai Manoj, Ganguly, Amlan |
Conference Name | 2019 IEEE Computer Society Annual Symposium on VLSI (ISVLSI) |
Keywords | data transfer security threats, denial-of-service attack, denial-of-service attacks, DoS, DoS attack, error correction codes, hardware security, HT, internal hardware Trojans, jamming, jamming attack, learning (artificial intelligence), low-power transceivers, machine learning, machine learning classifier, Metrics, ML classifiers, network on chip security, network-on-chip, network-on-chip communications, NoC switches, nonscalable multihop data transmission paths, On chip interconnect, On chip security, on-chip data transfer, on-chip wireless medium, persistent jamming attack, pubcrawl, radio networks, radio transceivers, radiofrequency interconnections, radiofrequency interference, random burst error correction code, Resiliency, Scalability, Switches, switching networks, system-on-chip, telecommunication computing, telecommunication network routing, telecommunication security, WiNoC security, wired NoC architectures, Wireless communication, wireless interconnection, Wireless NoC, wireless NoC architectures, Wireless sensor networks |
Abstract | Wireless Networks-on-Chips (NoCs) have emerged as a panacea to the non-scalable multi-hop data transmission paths in traditional wired NoC architectures. Using low-power transceivers in NoC switches, novel Wireless NoC (WiNoC) architectures have been shown to achieve higher energy efficiency with improved peak bandwidth and reduced on-chip data transfer latency. However, using wireless interconnects for data transfer within a chip makes the on-chip communications vulnerable to various security threats from either external attackers or internal hardware Trojans (HTs). In this work, we propose a mechanism to make the wireless communication in a WiNoC secure against persistent jamming based Denial-of-Service attacks from both external and internal attackers. Persistent jamming attacks on the on-chip wireless medium will cause interference in data transfer over the duration of the attack resulting in errors in contiguous bits, known as burst errors. Therefore, we use a burst error correction code to monitor the rate of burst errors received over the wireless medium and deploy a Machine Learning (ML) classifier to detect the persistent jamming attack and distinguish it from random burst errors. In the event of jamming attack, alternate routing strategies are proposed to avoid the DoS attack over the wireless medium, so that a secure data transfer can be sustained even in the presence of jamming. We evaluate the proposed technique on a secure WiNoC in the presence of DoS attacks. It has been observed that with the proposed defense mechanisms, WiNoC can outperform a wired NoC even in presence of attacks in terms of performance and security. On an average, 99.87% attack detection was achieved with the chosen ML Classifiers. A bandwidth degradation of \textbackslashtextless;3% is experienced in the event of internal attack, while the wireless interconnects are disabled in the presence of an external attacker. |
DOI | 10.1109/ISVLSI.2019.00065 |
Citation Key | vashist_securing_2019 |