{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:18:53Z","timestamp":1763468333818,"version":"3.41.0"},"reference-count":39,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2016,11,16]],"date-time":"2016-11-16T00:00:00Z","timestamp":1479254400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"PhD scholarship from MHRD, Government of India"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["J. Emerg. Technol. Comput. Syst."],"published-print":{"date-parts":[[2017,4,30]]},"abstract":"<jats:p>It is known that maliciously configured Network-on-Chip routers can enable an attacker to launch different attacks inside a Multiprocessor System-on-Chip. A source authentication mechanism for router configuration packets can prevent such vulnerability. This ensures that a router is configured by the configuration packets sent only by a trusted configuration source. Conventional method like Secure Hash Algorithm-3 (SHA-3) can provide required source authentication in a router but with a router area overhead of 1355.25% compared to a normal router area. We propose eight source authentication mechanisms that can achieve similar level of security as SHA-3 for a router configuration perspective without causing significant area and power increase. Moreover, the processing time of our proposed techniques is 1\/100th of SHA-3 implementation. Most of our proposed techniques use different timing channel watermarking methods to transfer source authentication data to the receiver router. We also propose the Individual packet-based stream authentication technique and combinations of this technique with timing channel watermarking techniques. It is shown that, among all of our proposed techniques, maximum router area increment required is 28.32% compared to a normal router.<\/jats:p>","DOI":"10.1145\/2996194","type":"journal-article","created":{"date-parts":[[2016,11,17]],"date-time":"2016-11-17T16:33:35Z","timestamp":1479400415000},"page":"1-31","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Source Authentication Techniques for Network-on-Chip Router Configuration Packets"],"prefix":"10.1145","volume":"13","author":[{"given":"Arnab Kumar","family":"Biswas","sequence":"first","affiliation":[{"name":"Indian Institute of Science, Bangalore, India"}]}],"member":"320","published-online":{"date-parts":[[2016,11,16]]},"reference":[{"volume-title":"Proceedings of the Workshop on Multimedia Security at ACM Multimedia\u201902","author":"Ahsan K.","key":"e_1_2_1_1_1","unstructured":"K. Ahsan and D. Kundur . 2002. Practical data hiding in TCP\/IP . In Proceedings of the Workshop on Multimedia Security at ACM Multimedia\u201902 . Juan Les Pins, France. K. Ahsan and D. Kundur. 2002. Practical data hiding in TCP\/IP. In Proceedings of the Workshop on Multimedia Security at ACM Multimedia\u201902. Juan Les Pins, France."},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2012.21"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.03.007"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/CONECCT.2015.7383936"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00034-015-9980-0"},{"key":"e_1_2_1_8_1","unstructured":"Bluespec. 2015. Homepage. Retrieved from http:\/\/www.bluespec.com.  Bluespec. 2015. Homepage. Retrieved from http:\/\/www.bluespec.com."},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030108"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ic.2004.02.003"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74124-4_4"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38530-8_9"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5062143"},{"key":"e_1_2_1_15_1","first-page":"1","article-title":"A novel class of robust covert channels using out-of-order packets","volume":"99","author":"El-Atawy A.","year":"2015","unstructured":"A. El-Atawy , Q. Duan , and E. Al-Shaer . 2015 . A novel class of robust covert channels using out-of-order packets . IEEE Trans. Depend. Sec. Comput. PP , 99 (2015), 1 -- 1 . A. El-Atawy, Q. Duan, and E. Al-Shaer. 2015. A novel class of robust covert channels using out-of-order packets. IEEE Trans. Depend. Sec. Comput. PP, 99 (2015), 1--1.","journal-title":"IEEE Trans. Depend. Sec. Comput. PP"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/827263.828282"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/646762.706183"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2485984.2485994"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-48302-1_30"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1671954.1671960"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2009.4959879"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2593069.2593226"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44687-7_15"},{"key":"e_1_2_1_24_1","volume-title":"Proceedings of the 17th USENIX Security Symposium.","author":"Kiyavash Negar","year":"2008","unstructured":"Negar Kiyavash , Amir Houmansadr , and Nikita Borisov . 2008 . Multi-flow attacks against network flow watermarking schemes . In Proceedings of the 17th USENIX Security Symposium. Negar Kiyavash, Amir Houmansadr, and Nikita Borisov. 2008. Multi-flow attacks against network flow watermarking schemes. In Proceedings of the 17th USENIX Security Symposium."},{"key":"e_1_2_1_25_1","doi-asserted-by":"crossref","unstructured":"S. Kullback and R. A. Leibler. 1951. On information and sufficiency. Ann. Math. Statist. 22 1 (03 1951) 79--86.  S. Kullback and R. A. Leibler. 1951. On information and sufficiency. Ann. Math. Statist. 22 1 (03 1951) 79--86.","DOI":"10.1214\/aoms\/1177729694"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/946246.946520"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2013.2271537"},{"key":"e_1_2_1_28_1","unstructured":"Ralph Charles Merkle. 1979. Secrecy Authentication and Public Key Systems. Ph.D. Dissertation. Stanford University.  Ralph Charles Merkle. 1979. Secrecy Authentication and Public Key Systems. Ph.D. Dissertation. Stanford University."},{"volume-title":"FIPS PUB 202: SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions","author":"National Institute of Standards and Technology. 2015.","key":"e_1_2_1_29_1","unstructured":"National Institute of Standards and Technology. 2015. FIPS PUB 202: SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions . NIST , Gaithersburg, MD . National Institute of Standards and Technology. 2015. FIPS PUB 202: SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions. NIST, Gaithersburg, MD."},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2145694.2145703"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.01.017"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.80"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12267-5_13"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2016.02.013"},{"key":"e_1_2_1_35_1","volume-title":"Cryptography and Network Security: Principles and Practice","author":"Stallings William","unstructured":"William Stallings . 2014. Cryptography and Network Security: Principles and Practice , 6 th Edition. Pearson Education, Inc., Upper Saddle River, NJ. William Stallings. 2014. Cryptography and Network Security: Principles and Practice, 6th Edition. Pearson Education, Inc., Upper Saddle River, NJ.","edition":"6"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2012.80"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2012.031212.120237"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2629423"},{"key":"e_1_2_1_39_1","first-page":"1","article-title":"Securing network processors with high-performance hardware monitors","volume":"99","author":"Wolf T.","year":"2014","unstructured":"T. Wolf , H. Chandrikakutty , K. Hu , D. Unnikrishnan , and R. Tessier . 2014 . Securing network processors with high-performance hardware monitors . IEEE Trans. Depend. Secure Comput. PP , 99 (2014), 1 -- 1 . T. Wolf, H. Chandrikakutty, K. Hu, D. Unnikrishnan, and R. Tessier. 2014. Securing network processors with high-performance hardware monitors. IEEE Trans. Depend. Secure Comput. PP, 99 (2014), 1--1.","journal-title":"IEEE Trans. Depend. Secure Comput. PP"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-014-0287-x"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.05.006"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24010-2_23"}],"container-title":["ACM Journal on Emerging Technologies in Computing Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2996194","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2996194","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:23:10Z","timestamp":1750220590000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2996194"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11,16]]},"references-count":39,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2017,4,30]]}},"alternative-id":["10.1145\/2996194"],"URL":"https:\/\/doi.org\/10.1145\/2996194","relation":{},"ISSN":["1550-4832","1550-4840"],"issn-type":[{"type":"print","value":"1550-4832"},{"type":"electronic","value":"1550-4840"}],"subject":[],"published":{"date-parts":[[2016,11,16]]},"assertion":[{"value":"2016-03-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2016-09-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2016-11-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}