Network-on-chip (NoC) is widely used to facilitate communication between components in sophisticated system-on-chip (SoC) designs. Security of the on-chip communication is crucial because exploiting any vulnerability in shared NoC would be a goldmine for an attacker that puts the entire computing infrastructure at risk. We investigate the security strength of existing anonymous routing protocols in NoC architectures, making two pivotal contributions. Firstly, we develop and perform a machine learning (ML)-based flow correlation attack on existing anonymous routing techniques in NoC systems, revealing that they provide only packet-level anonymity. Secondly, we propose a novel, lightweight anonymous routing protocol featuring outbound traffic tunneling and traffic obfuscation. This protocol is designed to provide robust defense against ML-based flow correlation attacks, ensuring both packet-level and flow-level anonymity. Experimental evaluation using both real and synthetic traffic demonstrates that our proposed attack successfully deanonymizes state-of-the-art anonymous routing in NoC architectures with high accuracy (up to 99%) for diverse traffic patterns. It also reveals that our lightweight anonymous routing protocol can defend against ML-based attacks with minor hardware and performance overhead.
more »
« less
Performance Evaluation and Analysis of Proactive and Reactive MANET Protocols at Varied Speeds
A Mobile Ad Hoc Network (MANET) is a decentralized wireless network that does not rely on pre-existing infrastructure. Instead, it is each node's responsibility to forward data according to its specified routing protocol. Although these protocols perform the same task, their performance in a variety of scenarios differ. This paper simulates four different routing protocols in NS-3 at a variety of movement speeds and area sizes, comparing their Packet Delivery Ratio (PDR) and Average End-To-End Delay (AETED). The performance results reflect what would be expected if a system would be implemented in a similar environment. Therefore, it is crucial selecting a protocol to best suit a system.
more »
« less
- Award ID(s):
- 1816197
- PAR ID:
- 10191710
- Date Published:
- Journal Name:
- 2020 10th Annual Computing and Communication Workshop and Conference (CCWC)
- Page Range / eLocation ID:
- 0981 to 0985
- Format(s):
- Medium: X
- Sponsoring Org:
- National Science Foundation
More Like this
-
-
null (Ed.)It is vital to consider the energy usage of motes when designing a Wireless Sensor Network (WSN). Protocols can be altered to their application to enhance a system's performance. This project modifies the Routing Protocol for Low-Power and Lossy Networks (RPL) protocol using a S-MAC algorithm to increase its energy efficiency. The project began with the application and the focus of the WSN. The proposed protocol was developed within the Cooja simulator, then implemented on TelosB motes using the Contiki-NG operating system. Lastly, the WSN was tested with the proposed system and compared against its original counterpart. In conclusion it was found that the proposed method provides a significant increase in energy efficiency, extending the life of a WSN.more » « less
-
We present Contra, a system for performance-aware routing that can adapt to traffic changes at hardware speeds. While point solutions exist for a fixed topology (e.g., a Fattree) with a fixed routing policy (e.g., use least utilized paths), Contra can operate seamlessly over any network topology and a wide variety of sophisticated routing policies. Users of Contra write network-wide policies that rank network paths given their current performance. A compiler then analyzes such policies in conjunction with the network topology and decomposes them into switch-local P4 programs, which collectively implement a new, specialized distance-vector protocol. This protocol generates compact probes that traverse the network, gathering path metrics to optimize for the user policy dynamically. Switches respond to changing network conditions by routing flowlets along the best policy-compliant paths. Our experiments show that Contra scales to large networks, and that in terms of flow completion times, it is competitive with hand-crafted systems that have been customized for specific topologies and policies.more » « less
-
Routing protocol design is one of the major challenges for swarm UAV networks. Due to the characteristics of a dynamic network topology, the low-complexity and the large volume of UAV devices, existing routing protocols based on network topology information, and routing table updates are not applicable in swarm UAV networks. In this paper, a Random Network Coding (RNC) enabled routing protocol is proposed to support an efficient routing process, which does not require network topology information or pre-determined routing tables. With the proposed routing protocol, the routing process could be significantly expedited, since each forwarding UAV may have already overheard some encoded packets in previous hops. As a result, some hops may be required to deliver a few encoded packets, and less hops may need to be completed in the whole routing process. The corresponding simulation study is conducted, demonstrating that our proposed routing protocol is able to facilitate a more efficient routing process.more » « less
-
A mobile ad-hoc network is a set of mobile nodes in which data is transmitted wirelessly amongst all nodes. Due to the mobility of wireless nodes, network topology changes frequently. Consequently, routing protocols used in mobile ad-hoc networks must be adaptive. The routing protocols enabling data transfer within MANETs are classified into reactive, proactive, and hybrid protocols. Proactive routing protocols, such as the Destination Sequenced Distance Vector, are table-driven protocols that use stale paths in case of broken links which causes loss of data in the network. This research study will explore A Neighbor Coverage Multipath DSDV as a potential solution for data loss by finding alternate routes to the destination when a link is broken. Simulations have been carried out for the three routing protocols: DSDV, FSR, and the proposed NCMDSDV. Results showed that the proposed routing protocol has better efficiency compared to DSDV and FSR routing protocols.more » « less
An official website of the United States government

