Proceedings of the 1st International Conference on Artificial Intelligence, Communication, IoT, Data Engineering and Security, IACIDS 2023, 23-25 November 2023, Lavasa, Pune, India

Research Article

Secure Group Communication Implementation and Analysis of Various Routing Techniques

Download74 downloads
  • @INPROCEEDINGS{10.4108/eai.23-11-2023.2343180,
        author={Thamarai Selvan M and Karthikeyan  S and Parthasarathy  G},
        title={Secure Group Communication Implementation and Analysis of Various Routing Techniques},
        proceedings={Proceedings of the 1st International Conference on Artificial Intelligence, Communication, IoT, Data Engineering and Security, IACIDS 2023, 23-25 November 2023, Lavasa, Pune, India},
        publisher={EAI},
        proceedings_a={IACIDS},
        year={2024},
        month={3},
        keywords={h-noc agka ibaagka fifo router},
        doi={10.4108/eai.23-11-2023.2343180}
    }
    
  • Thamarai Selvan M
    Karthikeyan S
    Parthasarathy G
    Year: 2024
    Secure Group Communication Implementation and Analysis of Various Routing Techniques
    IACIDS
    EAI
    DOI: 10.4108/eai.23-11-2023.2343180
Thamarai Selvan M1,*, Karthikeyan S2, Parthasarathy G3
  • 1: Assistant Professor, Department of Electronics and Communication system, Sri Ramakrishna College of Arts & Science (Autonomous), Coimbatore 641006, India
  • 2: Assistant Professor, Department of Electronics and Communication systems, KG College of Arts and Science, Coimbatore 641035, India
  • 3: Assistant Professor, Department of Electronics, PSG College of Arts and Science, Coimbatore 641014, India
*Contact email: thamaraiselvan@srcas.ac.in

Abstract

This paper intricately examines the in-area overhead efficiency of Network-on-Chip (NoC) architecture, specifically employing the reconfigurable swapping router technique. Additionally, it explores the performance of the First In First Out (FIFO) routing technique within a secure group communication framework, introducing a one-round dynamic Identity-Based Authenticated Group Key Agreement (IBAAGKA) protocol. The Hardware NoC (H-NoC) design at the Register-Transfer Level (RTL) is analyzed for simulated area performance, revealing superior metrics in terms of area utilization, delay, and global request handling. The proposed H-NoC technique ensures a high level of basic execution, while the IBAAGKA protocol, implemented using the FIFO approach, guarantees secure communication without the key escrow issue. The introduced security protocols, characterized by independent key establishment, demonstrate efficiency with fewer rounds, offering robust protection against unauthorized decryption.