IP Core Circuit in FPGA Based on Complex Network and Its Security Analysis

Peizheng Yang

Article ID: 1172
Vol 5, Issue 1, 2022

VIEWS - 484 (Abstract) 217 (PDF)

Abstract


With the development of technology, IC has entered the era of VLSI. The internal circuit network structure is gradually complex, and the external threats are more and more.We can abstract the circuit in FPGA into complex network .Then characteristic is studied and the invulnerability is measured to optimize the circuit.


Keywords


FPGA; Complex Network; Invulnerability

Full Text:

PDF


References


1. Zhao ZQ. FPGA chip design and its application (in Chinese). Electronic Technology & Software Engineering 2018; (21):77.

2. Li ZJ, Zhang YF, Wang J, Lai JM. A survey of FPGA design for AI era (in Chinese). Journal of Semiconductors 2020; 41(2):16-21.

3. Lu CY, Lu DH. Technology and development trend of FPGA. Microelectronic Technology 2003; 31(1): 5-7.

4. Li B. Method for evaluating the damage resistance and node importance of complex networks (in Chinese). Xidian University 2013. doi: 10.7666/d.D364676.

5. Zhang K, Tan GX, Zhuang KC, Zhao RS. Research review on invulnerability mesure of complex network, Computer Era 2010; (05).

6. Newport KT, Varshney PK. Design of survivable communications networks under performance constraints. IEEE Transactions on Reliabity 1991; 40(4): 433-440. doi: 10.1109/24.93764.

7. Nie TY, Ma JY, Gao JX. The importance analysis of characteristic parameters in characterizing complex networks of integrated circuits. Information Technology and Information 2019; (1): 98-102. doi: 10. 3969/j. issn. 1672-9528. 2019. 01. 029.

8. Holme P, Kim BJ, Yong CN, Han SK. Attack vulnerability of complex networks. Physical Review E 2002; 65(5): 056109. doi: 10.1103/PhysRevE.65.056109.

9. Newport KT. Incorporating survivability considerations directly into the network design process. Proceedings of IEEE Mil-com 1990; 215-220.

10. Yuan RK, Meng XR, Li MX, Wen XX. Evaluation method for network invulnerability based on node importance. Fire Control & Command Control 2012; 37(10): 40-42. doi: 10.3969/j.issn.1002-0640.2012.10.010.

11. Zhao XL, Xu H, Xue JF, Song TL, Hu JJ, Yan HZ. Research on network system vulnerability detection method based on complex network. Journal of Cyber Security 2019; 4(1): 39-52. doi: 10.19363/J.cnki.cn10-1380/tn.2019.01.04




DOI: https://doi.org/10.24294/csma.v2i1.1172

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

Creative Commons License

This site is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.