{"id":"https://openalex.org/W2971074067","doi":"https://doi.org/10.1109/tvlsi.2019.2928960","title":"Securing a Wireless Network-on-Chip Against Jamming-Based Denial-of-Service and Eavesdropping Attacks","display_name":"Securing a Wireless Network-on-Chip Against Jamming-Based Denial-of-Service and Eavesdropping Attacks","publication_year":2019,"publication_date":"2019-08-26","ids":{"openalex":"https://openalex.org/W2971074067","doi":"https://doi.org/10.1109/tvlsi.2019.2928960","mag":"2971074067"},"language":"en","primary_location":{"id":"doi:10.1109/tvlsi.2019.2928960","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tvlsi.2019.2928960","pdf_url":null,"source":{"id":"https://openalex.org/S37538908","display_name":"IEEE Transactions on Very Large Scale Integration (VLSI) Systems","issn_l":"1063-8210","issn":["1063-8210","1557-9999"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Very Large Scale Integration (VLSI) Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5088446238","display_name":"Abhishek Vashist","orcid":"https://orcid.org/0000-0002-2176-8567"},"institutions":[{"id":"https://openalex.org/I155173764","display_name":"Rochester Institute of Technology","ror":"https://ror.org/00v4yb702","country_code":"US","type":"education","lineage":["https://openalex.org/I155173764"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Abhishek Vashist","raw_affiliation_strings":["Department of Computer Engineering, Rochester Institute of Technology, Rochester, USA"],"raw_orcid":"https://orcid.org/0000-0002-2176-8567","affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Rochester Institute of Technology, Rochester, USA","institution_ids":["https://openalex.org/I155173764"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047102926","display_name":"Andrew Keats","orcid":"https://orcid.org/0000-0002-8733-7372"},"institutions":[{"id":"https://openalex.org/I155173764","display_name":"Rochester Institute of Technology","ror":"https://ror.org/00v4yb702","country_code":"US","type":"education","lineage":["https://openalex.org/I155173764"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Andrew Keats","raw_affiliation_strings":["Department of Computer Engineering, Rochester Institute of Technology, Rochester, USA"],"raw_orcid":"https://orcid.org/0000-0002-8733-7372","affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Rochester Institute of Technology, Rochester, USA","institution_ids":["https://openalex.org/I155173764"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047725314","display_name":"Sai Manoj Pudukotai Dinakarrao","orcid":"https://orcid.org/0000-0002-4417-2387"},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sai Manoj Pudukotai Dinakarrao","raw_affiliation_strings":["Department of Electrical and Computer Engineering, George Mason University, Fairfax, USA"],"raw_orcid":"https://orcid.org/0000-0002-4417-2387","affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, George Mason University, Fairfax, USA","institution_ids":["https://openalex.org/I162714631"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5004368293","display_name":"Amlan Ganguly","orcid":"https://orcid.org/0000-0001-7354-7873"},"institutions":[{"id":"https://openalex.org/I155173764","display_name":"Rochester Institute of Technology","ror":"https://ror.org/00v4yb702","country_code":"US","type":"education","lineage":["https://openalex.org/I155173764"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Amlan Ganguly","raw_affiliation_strings":["Department of Computer Engineering, Rochester Institute of Technology, Rochester, USA"],"raw_orcid":"https://orcid.org/0000-0001-7354-7873","affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Rochester Institute of Technology, Rochester, USA","institution_ids":["https://openalex.org/I155173764"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5088446238"],"corresponding_institution_ids":["https://openalex.org/I155173764"],"apc_list":null,"apc_paid":null,"fwci":6.1701,"has_fulltext":false,"cited_by_count":38,"citation_normalized_percentile":{"value":0.97125855,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"27","issue":"12","first_page":"2781","last_page":"2791"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11601","display_name":"Neuroscience and Neural Engineering","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/2804","display_name":"Cellular and Molecular Neuroscience"},"field":{"id":"https://openalex.org/fields/28","display_name":"Neuroscience"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},{"id":"https://openalex.org/T10829","display_name":"Interconnection Networks and Systems","score":0.9909999966621399,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/eavesdropping","display_name":"Eavesdropping","score":0.7805373668670654},{"id":"https://openalex.org/keywords/jamming","display_name":"Jamming","score":0.7569675445556641},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7131595611572266},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6915255784988403},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.6326667666435242},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.5423344969749451},{"id":"https://openalex.org/keywords/data-transmission","display_name":"Data transmission","score":0.5179558992385864},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.44344624876976013},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.17103183269500732},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.1574712097644806}],"concepts":[{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.7805373668670654},{"id":"https://openalex.org/C2779079576","wikidata":"https://www.wikidata.org/wiki/Q17092823","display_name":"Jamming","level":2,"score":0.7569675445556641},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7131595611572266},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6915255784988403},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.6326667666435242},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.5423344969749451},{"id":"https://openalex.org/C557945733","wikidata":"https://www.wikidata.org/wiki/Q389772","display_name":"Data transmission","level":2,"score":0.5179558992385864},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.44344624876976013},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.17103183269500732},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.1574712097644806},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tvlsi.2019.2928960","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tvlsi.2019.2928960","pdf_url":null,"source":{"id":"https://openalex.org/S37538908","display_name":"IEEE Transactions on Very Large Scale Integration (VLSI) Systems","issn_l":"1063-8210","issn":["1063-8210","1557-9999"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Very Large Scale Integration (VLSI) Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/7","display_name":"Affordable and clean energy","score":0.9100000262260437}],"awards":[{"id":"https://openalex.org/G4079544850","display_name":null,"funder_award_id":"CNS-1553264","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W794907248","https://openalex.org/W1571368811","https://openalex.org/W1978915475","https://openalex.org/W2002123074","https://openalex.org/W2053555538","https://openalex.org/W2096996538","https://openalex.org/W2098156582","https://openalex.org/W2107571813","https://openalex.org/W2111361097","https://openalex.org/W2118961575","https://openalex.org/W2121264877","https://openalex.org/W2132874238","https://openalex.org/W2149040906","https://openalex.org/W2161364734","https://openalex.org/W2163793927","https://openalex.org/W2164217202","https://openalex.org/W2230781190","https://openalex.org/W2278553053","https://openalex.org/W2316824423","https://openalex.org/W2336034469","https://openalex.org/W2404032169","https://openalex.org/W2578481478","https://openalex.org/W2626731758","https://openalex.org/W2765898536","https://openalex.org/W2785495041","https://openalex.org/W2797742547","https://openalex.org/W2899232680","https://openalex.org/W2963265635","https://openalex.org/W3105750153","https://openalex.org/W4243270327","https://openalex.org/W6683993454","https://openalex.org/W6703221425"],"related_works":["https://openalex.org/W2563654986","https://openalex.org/W4312624776","https://openalex.org/W2158425649","https://openalex.org/W4320503161","https://openalex.org/W2794497535","https://openalex.org/W2963194396","https://openalex.org/W3112295988","https://openalex.org/W2783009528","https://openalex.org/W2897241102","https://openalex.org/W2971074067"],"abstract_inverted_index":{"Wireless":[0],"networks-on-chips":[1],"(NoCs)":[2],"(WiNoCs)":[3],"have":[4,31],"emerged":[5],"as":[6,135],"a":[7,82,90,141,159,180,200,224,247,263,323,349],"possible":[8],"solution":[9],"to":[10,34,84,145,163,189,231,249],"the":[11,86,112,123,126,147,154,165,177,191,195,209,215,235,239,251,255,259,266,284,292,305,320,333,336,340,343,358,365],"nonscalable":[12],"multihop":[13],"data":[14,46,55,120,202,228],"transmission":[15],"paths":[16],"in":[17,25,65,89,119,129,131,208,265,304,319,357],"traditional":[18],"wired":[19,350],"NoC":[20,26],"architectures.":[21],"Using":[22],"low-power":[23],"transceivers":[24],"switches,":[27],"novel":[28],"WiNoC":[29,91,264,344],"architectures":[30],"been":[32],"shown":[33],"achieve":[35],"higher":[36],"energy":[37],"efficiency":[38],"with":[39,291,346],"improved":[40],"peak":[41],"bandwidth":[42,297],"and":[43,99,105,157,169,226,253,270,276,310,374],"reduced":[44],"on-chip":[45,66,113],"transfer":[47,56,121,203],"latency.":[48],"However,":[49],"using":[50],"wireless":[51,87,114,155,196,236,315,337],"interconnects":[52,316],"for":[53,329],"intrachip":[54],"over":[57,122,153,194,234],"an":[58,218,242,280,361],"unguided":[59],"medium":[60,115,156],"introduces":[61],"additional":[62],"security":[63],"vulnerabilities":[64],"communication":[67,88,233],"arising":[68],"from":[69,102,172,273],"either":[70],"external":[71,104,219,277,325,362],"attackers":[72],"or":[73],"internal":[74,106,243,275,312],"hardware":[75],"Trojans.":[76],"In":[77,176,214,238],"this":[78],"article,":[79],"we":[80,139,222,245],"propose":[81,246],"mechanism":[83,248],"make":[85],"secure":[92,201,232],"against":[93],"persistent":[94,166,181,212,324],"jamming-based":[95],"denial-of-service":[96],"(DoS)":[97],"attacks":[98,110,272],"eavesdropping":[100],"(ED)":[101],"both":[103,274,308],"attackers.":[107,278],"Persistent":[108],"jamming":[109,167,182,326],"on":[111,262,286],"will":[116],"cause":[117],"interference":[118],"duration":[124],"of":[125,149,179,211,217,241,268,283,299,307,322,335,342,348,360],"attack":[127,168,193,285,328],"resulting":[128],"errors":[130,151],"contiguous":[132],"bits,":[133],"known":[134],"burst":[136,150,174],"errors.":[137,175],"Therefore,":[138],"use":[140],"burst-error":[142],"correction":[143],"code":[144],"monitor":[146],"rate":[148],"received":[152],"deploy":[158,223],"machine-learning":[160],"(ML)":[161],"classifier":[162],"detect":[164],"distinguish":[170],"it":[171],"random":[173],"event":[178,216,306],"attack,":[183,221,364],"alternate":[184],"routing":[185],"strategies":[186],"are":[187,317,355,367],"proposed":[188,260],"avoid":[190],"DoS":[192,269,287,309,327],"medium,":[197],"so":[198],"that":[199,347],"can":[204],"be":[205],"sustained":[206],"even":[207],"presence":[210,267,321,359],"jamming.":[213],"ED":[220,271,311,363],"low-latency":[225],"lightweight":[227],"scrambling":[229,353],"method":[230],"channel.":[237],"case":[240],"ED,":[244],"identify":[250],"attacker":[252],"prevent":[254],"attack.":[256],"We":[257],"evaluate":[258],"techniques":[261],"On":[279],"average,":[281],"99.87%":[282],"detection":[288],"was":[289],"achieved":[290],"chosen":[293],"ML":[294],"classifier.":[295],"A":[296],"degradation":[298],"<;":[300],"3%":[301],"is":[302],"experienced":[303],"attacks.":[313],"The":[314],"disabled":[318],"security,":[330],"therefore":[331],"eliminating":[332],"advantages":[334],"interconnections":[338],"making":[339],"performance":[341],"comparable":[345],"NoC.":[351],"Although":[352],"overheads":[354,366],"incurred":[356],"minimized":[368],"by":[369],"adopting":[370],"simple":[371],"XOR-based":[372],"encoding":[373],"decoding.":[375]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":8},{"year":2021,"cited_by_count":10},{"year":2020,"cited_by_count":6},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
