首页 | 官方网站   微博 | 高级检索  
     

面向可重构扫描网络的锁定隔离安全结构
引用本文:刘军,王亭亭,任福继.面向可重构扫描网络的锁定隔离安全结构[J].计算机辅助设计与图形学学报,2021,33(3):356-362.
作者姓名:刘军  王亭亭  任福继
作者单位:合肥工业大学计算机与信息学院人工智能学院 合肥 230601;合肥工业大学计算机与信息学院人工智能学院 合肥 230601;合肥工业大学计算机与信息学院人工智能学院 合肥 230601;Graduate School of Advanced Technology & Science, University of Tokushima Tokushima 7708502
摘    要:为使可重构扫描网络免受未经授权的访问、恶意仪器对传输数据的窜改和嗅探3种安全攻击的影响,提出了锁定隔离安全结构.该结构首先把彼此不具有安全威胁的仪器分成一组,通过控制隔离信号实现组与组之间的单独访问,以防止恶意仪器对传输数据的窜改和嗅探.然后通过使用锁段插入位保护关键的仪器,只有扫描网络中处于特定位置的多个键值被设置成特定值(0,1序列)时锁段插入位才能打开,能加大未经授权访问的难度.此外,为解决仪器分组多导致硬件开销大和布线困难的问题,提出了仪器分组算法,根据仪器间的安全关系构建无向图,然后对无向图求极大独立集,能有效地减少仪器分组数.在ITC 02基准电路上的实验结果表明,与国际上同类方法相比,所提的安全结构打开锁段插入位所需要的时间增大了7倍,在面积、功耗和布线上的平均减少百分比分别为3.81%,9.02%和4.55%.

关 键 词:可重构扫描网络  安全攻击  隔离信号  锁段插入位

Lock Isolation Security Architecture for Reconfigurable Scanning Networks
Liu Jun,Wang Tingting,Ren Fuji.Lock Isolation Security Architecture for Reconfigurable Scanning Networks[J].Journal of Computer-Aided Design & Computer Graphics,2021,33(3):356-362.
Authors:Liu Jun  Wang Tingting  Ren Fuji
Affiliation:(School of Computer Science and Information Engineering,School of Artificial Intelligence,Hefei University of Technology,Hefei 230601;Graduate School of Advanced Technology&Science,University of Tokushima,Tokushima 7708502)
Abstract:To protect the reconfigurable scanning network from the influence of unauthorized access,tampering of transmitted data by malicious instruments and sniffing,a lock isolation security structure is proposed.Firstly,the presented structure divides the instruments without security threat to each other into one group,and the groups can be accessed one by one via the isolated signals,which can prevent malicious instruments tampering and sniffing transmitted data.Secondly,the key instruments are protected by the lock segment insertion bit.The lock segment insertion bit can only be opened when multiple key values at specific positions are set to specific values(0,1 sequence),which can increase the difficulty of unauthorized access.Besides,to reduce the hardware overhead,and the difficulty of place and route caused by excessive instrument groups,instrument grouping algorithm is proposed.The proposed algorithm firstly constructs an undirected graph based on the security relationship among instruments.Then the maximal independent sets of the undirected are obtained.In this way,the number of instrument groups is reduced greatly.Compared to other similar methodologies,the experimental results conducted on ITC 02 benchmark circuits show that the time consumption for opening the locking segment insertion bit of the proposed security structure increased by 7 times,and the average percentage reduction of area,power consumption and wire length is 3.81%,9.02%and 4.55%,respectively.
Keywords:reconfigurable scan network  security attacks  isolated signal  lock segment insert bit
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号