基于FPGA的多层安全硬件网络堆栈

Shreyus Yadaveerappa Kouty
{"title":"基于FPGA的多层安全硬件网络堆栈","authors":"Shreyus Yadaveerappa Kouty","doi":"10.1109/ISRITI51436.2020.9315502","DOIUrl":null,"url":null,"abstract":"This paper presents an implementation of a User Datagram Protocol (UDP)/Internet Protocol (IP) Hardware network Stack using Field Programmable Gate Array (FPGA) [1] and technology to secure and protect data integrity and authenticity at three layers: Transport Layer, Network Layer and Data Link layer using True Random Number Generator (TRNG) digital signal processor (DSP) intellectual property (IP) Core [4]. UDP/IP stack is preferred proposal over Transport Control Protocol (TCP)/Internet Protocol (IP) stack as it is connectionless oriented, and widely used in Internet of Things (IoT), Industrial IoT (IIoT), Virtual Protocol Network (VPN), Video Conference, Voice over Internet Protocol (VoIP), Avionics and defense communication systems. Due to its technology independent, digital entropy source, easy to integrate and port to FPGA, TRNG is preferred over other reported cost-effective security methods like Static Random Access Memory (SRAM) based Physical Un-clonable Functions (PUF) generates random number based on start up behavior due to nano variations in circuit elements in addressing cloning, impersonation and data integrity loss, and also TRNG is not effected by environmental fluctuations such as voltage, temperature, and noise. However, cross inverters in SRAM PUF can be used as source of entropy in TRNG. FPGA based Hardware network stack is preferred over software network stack as it reduces the execution overhead in the Operating System (OS), Hardware network stack node is independent of Microprocessors as it consists of its own Digital Clock Manager (DCM), Memory Blocks, Dedicated Hardware Interfaces, and System on Chip (SoC) IP Cores which are configurable and extendable based on requirements. Hardware based network stack is susceptible to loss of data integrity and authenticity due to 1. Unstable digital circuits, 2. Noise diode and register, small AC voltage, polarity semiconductor, 3. instability of oscillator (jitter in circuits), 4. Meta-stability of flip-flops, 5. Cross inverters in SRAM circuits (SRAM PUF) and 6. Block RAM write conflict [7]. Multilayer secure Hardware network node is important as the data integrity and authenticity is responsible for good communication network with the high performance and throughput. This paper discusses about, how TRNG DSP IP Core is used in securing the three layers of the FPGA based UDP/IP Hardware Network Stack to secure data.","PeriodicalId":325920,"journal":{"name":"2020 3rd International Seminar on Research of Information Technology and Intelligent Systems (ISRITI)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2020-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Multilayer Secure Hardware Network Stack using FPGA\",\"authors\":\"Shreyus Yadaveerappa Kouty\",\"doi\":\"10.1109/ISRITI51436.2020.9315502\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper presents an implementation of a User Datagram Protocol (UDP)/Internet Protocol (IP) Hardware network Stack using Field Programmable Gate Array (FPGA) [1] and technology to secure and protect data integrity and authenticity at three layers: Transport Layer, Network Layer and Data Link layer using True Random Number Generator (TRNG) digital signal processor (DSP) intellectual property (IP) Core [4]. UDP/IP stack is preferred proposal over Transport Control Protocol (TCP)/Internet Protocol (IP) stack as it is connectionless oriented, and widely used in Internet of Things (IoT), Industrial IoT (IIoT), Virtual Protocol Network (VPN), Video Conference, Voice over Internet Protocol (VoIP), Avionics and defense communication systems. Due to its technology independent, digital entropy source, easy to integrate and port to FPGA, TRNG is preferred over other reported cost-effective security methods like Static Random Access Memory (SRAM) based Physical Un-clonable Functions (PUF) generates random number based on start up behavior due to nano variations in circuit elements in addressing cloning, impersonation and data integrity loss, and also TRNG is not effected by environmental fluctuations such as voltage, temperature, and noise. However, cross inverters in SRAM PUF can be used as source of entropy in TRNG. FPGA based Hardware network stack is preferred over software network stack as it reduces the execution overhead in the Operating System (OS), Hardware network stack node is independent of Microprocessors as it consists of its own Digital Clock Manager (DCM), Memory Blocks, Dedicated Hardware Interfaces, and System on Chip (SoC) IP Cores which are configurable and extendable based on requirements. Hardware based network stack is susceptible to loss of data integrity and authenticity due to 1. Unstable digital circuits, 2. Noise diode and register, small AC voltage, polarity semiconductor, 3. instability of oscillator (jitter in circuits), 4. Meta-stability of flip-flops, 5. Cross inverters in SRAM circuits (SRAM PUF) and 6. Block RAM write conflict [7]. Multilayer secure Hardware network node is important as the data integrity and authenticity is responsible for good communication network with the high performance and throughput. This paper discusses about, how TRNG DSP IP Core is used in securing the three layers of the FPGA based UDP/IP Hardware Network Stack to secure data.\",\"PeriodicalId\":325920,\"journal\":{\"name\":\"2020 3rd International Seminar on Research of Information Technology and Intelligent Systems (ISRITI)\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-12-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 3rd International Seminar on Research of Information Technology and Intelligent Systems (ISRITI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISRITI51436.2020.9315502\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 3rd International Seminar on Research of Information Technology and Intelligent Systems (ISRITI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISRITI51436.2020.9315502","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

本文提出了一种使用现场可编程门阵列(FPGA)[1]的用户数据报协议(UDP)/互联网协议(IP)硬件网络堆栈的实现,以及使用真随机数生成器(TRNG)数字信号处理器(DSP)知识产权(IP)核心[4]在传输层、网络层和数据链路层三层保护数据完整性和真实性的技术。UDP/IP栈是传输控制协议(TCP)/互联网协议(IP)栈的首选方案,因为它面向无连接,广泛应用于物联网(IoT),工业物联网(IIoT),虚拟协议网络(VPN),视频会议,互联网协议语音(VoIP),航空电子设备和国防通信系统。由于其技术独立,数字熵源,易于集成和移植到FPGA, TRNG比其他报道的具有成本效益的安全方法更受欢迎,如基于静态随机存取存储器(SRAM)的物理不可克隆函数(PUF)在解决克隆,模拟和数据完整性丢失时,由于电路元件的纳米变化,TRNG根据启动行为生成随机数,并且TRNG不受环境波动如电压,温度,和噪音。然而,SRAM PUF中的交叉逆变器可以作为TRNG中的熵源。基于FPGA的硬件网络堆栈优于软件网络堆栈,因为它减少了操作系统(OS)的执行开销。硬件网络堆栈节点独立于微处理器,因为它由自己的数字时钟管理器(DCM),内存块,专用硬件接口和片上系统(SoC) IP内核组成,可根据需求进行配置和扩展。基于硬件的网络栈容易受到数据完整性和真实性损失的影响。2.不稳定数字电路;噪声二极管和寄存器,小交流电压,极性半导体,3。4.振荡器的不稳定性(电路中的抖动)。人字拖的亚稳定性,5。SRAM电路中的交叉逆变器(SRAM PUF)和6。块RAM写冲突[7]。多层安全硬件网络节点是保证高性能、高吞吐量的良好通信网络的重要组成部分,它保证了数据的完整性和真实性。本文讨论了如何利用TRNG DSP IP核保护基于FPGA的UDP/IP硬件网络栈的三层,以保证数据的安全。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Multilayer Secure Hardware Network Stack using FPGA
This paper presents an implementation of a User Datagram Protocol (UDP)/Internet Protocol (IP) Hardware network Stack using Field Programmable Gate Array (FPGA) [1] and technology to secure and protect data integrity and authenticity at three layers: Transport Layer, Network Layer and Data Link layer using True Random Number Generator (TRNG) digital signal processor (DSP) intellectual property (IP) Core [4]. UDP/IP stack is preferred proposal over Transport Control Protocol (TCP)/Internet Protocol (IP) stack as it is connectionless oriented, and widely used in Internet of Things (IoT), Industrial IoT (IIoT), Virtual Protocol Network (VPN), Video Conference, Voice over Internet Protocol (VoIP), Avionics and defense communication systems. Due to its technology independent, digital entropy source, easy to integrate and port to FPGA, TRNG is preferred over other reported cost-effective security methods like Static Random Access Memory (SRAM) based Physical Un-clonable Functions (PUF) generates random number based on start up behavior due to nano variations in circuit elements in addressing cloning, impersonation and data integrity loss, and also TRNG is not effected by environmental fluctuations such as voltage, temperature, and noise. However, cross inverters in SRAM PUF can be used as source of entropy in TRNG. FPGA based Hardware network stack is preferred over software network stack as it reduces the execution overhead in the Operating System (OS), Hardware network stack node is independent of Microprocessors as it consists of its own Digital Clock Manager (DCM), Memory Blocks, Dedicated Hardware Interfaces, and System on Chip (SoC) IP Cores which are configurable and extendable based on requirements. Hardware based network stack is susceptible to loss of data integrity and authenticity due to 1. Unstable digital circuits, 2. Noise diode and register, small AC voltage, polarity semiconductor, 3. instability of oscillator (jitter in circuits), 4. Meta-stability of flip-flops, 5. Cross inverters in SRAM circuits (SRAM PUF) and 6. Block RAM write conflict [7]. Multilayer secure Hardware network node is important as the data integrity and authenticity is responsible for good communication network with the high performance and throughput. This paper discusses about, how TRNG DSP IP Core is used in securing the three layers of the FPGA based UDP/IP Hardware Network Stack to secure data.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Combined Firefly Algorithm-Random Forest to Classify Autistic Spectrum Disorders Analysis of Indonesia's Internet Topology Borders at the Autonomous System Level Influence Distribution Training Data on Performance Supervised Machine Learning Algorithms Design of Optimal Satellite Constellation for Indonesian Regional Navigation System based on GEO and GSO Satellites Real-time Testing on Improved Data Transmission Security in the Industrial Control System
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1