首页> 外文期刊>Sustainable Computing >AWARe-Wi: A jamming-aware reconfigurable wireless interconnection using adversarial learning for multichip systems
【24h】

AWARe-Wi: A jamming-aware reconfigurable wireless interconnection using adversarial learning for multichip systems

机译:意识到:使用对多频性系统进行对抗学习的干扰感知的可重新配置无线互连

获取原文
获取原文并翻译 | 示例
           

摘要

Performance of the compute-intensive multichip platforms such as micro-servers and embedded systems are limited by the latency and power hungry chip-to-chip interconnections. Millimeter wave (mm-wave) wireless interconnection networks have emerged as an energy-efficient and low-latency solution for such multichip system communication. We refer such multichip systems with in-package mm-wave wireless interconnect as Wireless Network-in-Package (WiNiP). Despite providing performance enhancements, wireless channel, being an unguided medium, introduces potential security vulnerabilities inherited from traditional wireless networks such as jamming induced Denial-of-Service (DoS) and eavesdropping. Securing the systems against such induced threats often introduce large overheads and performance penalties. To address these challenges, we propose a WiNiP architecture that reuses the in-built Design for Testability (DFT) hardware for securing against external and Hardware Trojans (HT) induced internal attacks. The proposed architecture is capable of securing against adversaries with a reconfigurable wireless interconnection (AWARe-Wi). We deploy machine learning (ML) classifier to detect the threats. In addition, for a robust threat detection, we introduce an Adversarial ML (AML) based approach in this work. To enable sustainable multichip communication in such systems even under jamming attack from both internal and external attackers, we design a reconfigurable Medium Access Control (MAC) and a suitable communication protocol. The simulation results show that, the ML and AML classifiers can achieve an accuracy of 99.87% and 95.95% respectively for attack detection while the proposed WiNiP can sustain chip-to-chip communication even under persistent jamming attack with an average 1.44? and 1.56? degradation in latency for internal and external attacks respectively for application-specific traffic patterns.
机译:诸如微服务器和嵌入式系统之类的计算密集型多芯片平台的性能受到延迟和功率饥饿的芯片到Chip互连的限制。毫米波(MM波)无线互连网络已成为这种多频性系统通信的节能和低延迟解决方案。我们将这种多芯片系统引用了包装内部MM波无线互连作为无线网络包装(WinIP)。尽管提供了性能增强功能,但无线通道是一种无导体介质,请介绍从传统无线网络继承的潜在的安全漏洞,如干扰引起的拒绝服务(DOS)和窃听。保护系统对抗这种诱导的威胁通常会引入大量的开销和绩效处罚。为了解决这些挑战,我们提出了一种WinIP架构,可重用用于确保外部和硬件特洛伊木马(HT)引起的内部攻击的内置测试的内置设计所提出的架构能够与可重新配置的无线互连(知识Wi)防止对手。我们部署机器学习(ML)分类器以检测威胁。此外,对于稳健的威胁检测,我们在这项工作中引入了基于对抗的ML(AML)的方法。即使在来自内部和外部攻击者的干扰攻击下,在这些系统中启用可持续的多芯片通信,我们设计可重构的媒体访问控制(MAC)和合适的通信协议。仿真结果表明,ML和AML分类器分别可以分别达到99.87%和95.95%的准确性,而攻击检测,即使在平均1.44的持续干扰攻击下,所提出的WINIP也可以维持芯片到芯片通信?和1.56?分别用于特定于应用程序的流量模式的内部和外部攻击延迟的劣化。

著录项

获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号