We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

A New Approach to Design Programmable Secure Network Interface Card

by Darshana Hooda, Parvinder Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 62 - Number 8
Year of Publication: 2013
Authors: Darshana Hooda, Parvinder Singh
10.5120/10102-4751

Darshana Hooda, Parvinder Singh . A New Approach to Design Programmable Secure Network Interface Card. International Journal of Computer Applications. 62, 8 ( January 2013), 33-36. DOI=10.5120/10102-4751

@article{ 10.5120/10102-4751,
author = { Darshana Hooda, Parvinder Singh },
title = { A New Approach to Design Programmable Secure Network Interface Card },
journal = { International Journal of Computer Applications },
issue_date = { January 2013 },
volume = { 62 },
number = { 8 },
month = { January },
year = { 2013 },
issn = { 0975-8887 },
pages = { 33-36 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume62/number8/10102-4751/ },
doi = { 10.5120/10102-4751 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:11:15.969878+05:30
%A Darshana Hooda
%A Parvinder Singh
%T A New Approach to Design Programmable Secure Network Interface Card
%J International Journal of Computer Applications
%@ 0975-8887
%V 62
%N 8
%P 33-36
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper, Secure Network Interface Card (SNIC) Architecture is proposed, to provide secure video communication without extra overhead on host processor of receiver. PROM based security model is developed & its integration with Network Interface is described. The approach adopted here to design SNIC, is based on remote reference passing. In this approach PROM is integrated to NIC to serve as security buffer where data values are to be placed at memory locations using some mathematical mapping which establishes relation between location reference and data. Sender generates respective location reference(at receiver's security buffer) corresponding to the each data byte of video stream. For reference creation, respective reverse mathematical mapping is used. In this, security is achieved at MAC layer at receivers end.

References
  1. T-210-CX 10GbE Protocol engine with TCP offload.
  2. Adaptec iSCSI ASA-7211C gigabit Ethernet adapter.
  3. 3 Com secure copper NIC, 3CR 990B.
  4. D. Dalessandro and P. Wyck off. " A performance analysis of the ammasso RDMA enabled Ethernet adapter and its iWARP API. In proceedings of RAIT workshop, Sep 2005.
  5. D. L. Perry, "VHDL", Tata Mcgraw Hill Edition, 4th Edition, 2002.
  6. C. Maxfield, " The design warrior guide to FPGAs" Elsevier, 2004.
  7. H. Peter Hofstee " Power Efficient processor Architecture and the cell processor. " In proceedings of the 11th International symposium on High Performance computer Architecture, 2005.
  8. Suchita Kamble, N. N. Mhala, " Controller For Network Interface Card on FPGA" In International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Vol. -2, Issue-3, July-2012
  9. Jeffrey Shafer and Scott Rixner, " A Reconfigurable and Programmable Gigabit Ethernet Network Interface Card. " In Rice University-Technical Report TREE0611.
  10. Fuwen Liu, Hartmut Koenig, "A Survey of Video Encryption algorithms, Computers&Security 29(2010)
Index Terms

Computer Science
Information Sciences

Keywords

SNIC NIC Encryption Decryption Memory security module PROM Remote References