Secure and energy-efficient interconnects for board-to-board communication

To meet the consistently increasing compuiaiion demand while reducing the energy footprint, future computing architectures need to consider parallelism. In this paradigm, compute nodes with massive number of cores are directly interconnected in one board by short-range optical connections. At the same time, high-speed wireless connections of up to 100 Gbps are used on demand between compute nodes of different boards. That hybrid design not only enables flexibility and energy efficiency but also opens up new research questions to obtain secure and energy-efficient interconnects in various areas, such as communications, routing, distributed storage and especially security. This paper summarizes the state-of-the-art research findings in those areas, presents a novel key distribution scheme and expands current evaluation platforms with a novel testbed design and realization, leveraging the maturity of virtualization technologies.

[1]  Eduard A. Jorswieck,et al.  Secrecy Outage in MISO Systems With Partial Channel Information , 2012, IEEE Transactions on Information Forensics and Security.

[2]  Bin Liu,et al.  GreenTE: Power-aware traffic engineering , 2010, The 18th IEEE International Conference on Network Protocols.

[3]  Fernando Pedone,et al.  Merlin: A Language for Provisioning Network Resources , 2014, CoNEXT.

[4]  Kwan-Wu Chin,et al.  Energy-aware traffic engineering with reliability constraint , 2015, Comput. Commun..

[5]  Wolfgang Lehner Pathways to servers of the future , 2012 .

[6]  Sebti Foufou,et al.  Towards bandwidth guaranteed energy efficient data center networking , 2015, Journal of Cloud Computing.

[7]  Wolfgang E. Nagel,et al.  Simulation models verification for resilient communication on a highly adaptive energy-efficient computer , 2016, SpringSim.

[8]  Anne Wolf,et al.  End-to-End Key Establishment with Physical Layer Key Generation and Specific Attacker Models , 2016 .

[9]  K. Jain,et al.  Practical Network Coding , 2003 .

[10]  Sabrina Engelmann,et al.  Robust Secret Sharing for End-to-End Key Establishment with Physical Layer Keys Under Active Attacks , 2017 .

[11]  Eduard A. Jorswieck,et al.  Global sum rate optimal resource allocation for non-regenerative 3-way relay channels , 2017, 2017 IEEE 17th International Conference on Ubiquitous Wireless Broadband (ICUWB).

[12]  João Barros,et al.  Lightweight Security for Network Coding , 2008, 2008 IEEE International Conference on Communications.

[13]  Xuemin Shen,et al.  P-Coding: Secure Network Coding against Eavesdropping Attacks , 2010, 2010 Proceedings IEEE INFOCOM.

[14]  Daniel Enrique Lucani,et al.  On network coded distributed storage: How to repair in a fog of unreliable peers , 2016, 2016 International Symposium on Wireless Communication Systems (ISWCS).

[15]  Rudolf Ahlswede,et al.  Network information flow , 2000, IEEE Trans. Inf. Theory.

[16]  Silvia Santini,et al.  Energy-Aware Coflow and Antenna Scheduling for Hybrid Server-Centric Data Center Networks , 2019, IEEE Transactions on Green Communications and Networking.

[17]  David Mazières,et al.  On-the-fly verification of rateless erasure codes for efficient content distribution , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[18]  Christian Engelmann,et al.  xSim: The extreme-scale simulator , 2011, 2011 International Conference on High Performance Computing & Simulation.

[19]  Matthias S. Müller,et al.  The Vampir Performance Analysis Tool-Set , 2008, Parallel Tools Workshop.

[20]  Eduard A. Jorswieck,et al.  Resource Allocation for Energy-Efficient 3-Way Relay Channels , 2014, IEEE Transactions on Wireless Communications.

[21]  Thierry Turletti,et al.  A Survey of Software-Defined Networking: Past, Present, and Future of Programmable Networks , 2014, IEEE Communications Surveys & Tutorials.

[22]  Joseph Mitola,et al.  Cognitive radio: making software radios more personal , 1999, IEEE Wirel. Commun..

[23]  Eduard A. Jorswieck,et al.  Instantaneous relaying for the 3-way relay channel with circular message exchanges , 2015, 2015 49th Asilomar Conference on Signals, Systems and Computers.

[24]  Alexandros G. Dimakis,et al.  Network Coding for Distributed Storage Systems , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[25]  Ami Marowka,et al.  Back to Thin-Core Massively Parallel Processors , 2011, Computer.

[26]  Aydin Sezgin,et al.  Multi-way Communications: An Information Theoretic Perspective , 2015, Found. Trends Commun. Inf. Theory.

[27]  Eduard A. Jorswieck,et al.  Energy Efficiency in MIMO Underlay and Overlay Device-to-Device Communications and Cognitive Radio Systems , 2015, IEEE Transactions on Signal Processing.

[28]  Randy H. Katz,et al.  A case for redundant arrays of inexpensive disks (RAID) , 1988, SIGMOD '88.

[29]  Baochun Li,et al.  How Practical is Network Coding? , 2006, 200614th IEEE International Workshop on Quality of Service.

[30]  Wolfgang E. Nagel,et al.  Modeling communication delays for network coding and routing for error-prone transmission , 2014, Third International Conference on Future Generation Communication Technologies (FGCT 2014).

[31]  Wolfgang E. Nagel,et al.  HAEC-SIM: a simulation framework for highly adaptive energy-efficient computing platforms , 2015, SimuTools.

[32]  Eduard A. Jorswieck,et al.  Energy Efficiency in Wireless Networks via Fractional Programming Theory , 2015, Found. Trends Commun. Inf. Theory.

[33]  Michael Wagner,et al.  Open Trace Format 2: The Next Generation of Scalable Trace Formats and Support Libraries , 2011, PARCO.

[34]  Dirk Schmidl,et al.  Score-P: A Joint Performance Measurement Run-Time Infrastructure for Periscope, Scalasca, TAU, and Vampir , 2011, Parallel Tools Workshop.

[35]  Eduard A. Jorswieck,et al.  Robust secure goodput for massive MIMO and optical fiber wiretap channels , 2017, 2017 IEEE 18th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC).

[36]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[37]  Jesús Labarta,et al.  Analyzing Scheduling Policies Using Dimemas , 1997, Parallel Comput..

[38]  Morten Videbæk Pedersen,et al.  Network Coding Parallelization Based on Matrix Operations for Multicore Architectures , 2015, 2015 IEEE International Conference on Ubiquitous Wireless Broadband (ICUWB).

[39]  Elke Franz,et al.  eSPOC: Enhanced Secure Practical Network Coding for Better Efficiency and Lower Latency , 2016, 2016 IEEE Globecom Workshops (GC Wkshps).

[40]  Laxmikant V. Kalé,et al.  Simulation-Based Performance Analysis and Tuning for a Two-Level Directly Connected System , 2011, 2011 IEEE 17th International Conference on Parallel and Distributed Systems.

[41]  Matthieu R. Bloch,et al.  Physical-Layer Security: From Information Theory to Security Engineering , 2011 .