SlideShare a Scribd company logo
1 of 8
Download to read offline
International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.3, No.3,June 2013
DOI : 10.5121/ijcseit.2013.3304 33
Optimization of Latency of Temporal Key
Integrity Protocol (TKIP) Using Graph Theory
and Hardware Software Co-Design
Vilas V Deotare1
, Dinesh V Padole2
, Swati Shelke 3
GHRCE, Nagpur, India
vilasdeotare@gmail.com1
,dvpadole@gmail.com2
,swati.wani@gmail.com3
Abstract:
Temporal Key Integrity Protocol (TKIP) [1] encapsulation consists of multiple-hardware and software
block which can be implemented either software or hardware block or combination of both. This papers
aims to design the TKIP technique using graph theory and hardware software co-design for minimizing the
latency. Simulation results show the effectiveness of the presented technique over Hardware software co-
design.
Keywords:
ROBUST SECURITY NETWORK ASSOCIATION, WIRED EQUIVALENT PRIVACY, TKIP,HARDWARE
SOFTWARE CO-DESIGN.
1. INTRODUCTION
Cryptography is a part of communication used for higher security and it is done through different
algorithm in network communications. The importance of cryptography is in the field of
ecommerce and other network field. User can use same algorithm with a key of long sequence
and at the receiving end with the same key it is decrypted and the message of encrypted is
received. Key is always changes for higher security.
1.1 TKIP OVERVIEW
The TKIP is a cipher suite enhancing the WEP [1] protocol on pre-RSNA hardware. TKIP
modifies WEP as follows:
Figure 2 TKIP Block diagram
International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.3, No.3,June 2013
34
TKIP uses a cryptographic mixing function to combine a temporal key, the TA, and the TSC into
the WEP seed.
1.2 TKIP MIC[2]
Flaws in the IEEE 802.11 WEP [2] design cause it to fail to meet its goal of protecting data traffic
content from casual eavesdroppers. Among the most significant WEP flaws is the lack of a
mechanism to defeat message forgeries and other active attacks. To defend against active attacks,
TKIP includes a MIC, named Michael. This MIC offers only weak defenses against message
forgeries, but it constitutes the best that can be achieved with the majority of legacy hardware.
TKIP uses different MIC keys depending on the direction of the transfer.
1.3 HARDWARE/SOFTWARE DESIGN ALTERNATIVES
The SoPC-based approach [3] offers new design space alternatives to explore. It is possible to
consider design options that use software, dedicated custom hardware, or a mixture of both.
Software implementations require less development time, but in many cases, a general-purpose
processor will be too slow to perform all of the calculations using only software. To speed up the
system, some frequently executed functions can be implemented in hardware in an SoPC design
using the FPGA’s logic.
Figure 3 Flow of Hardware Software Codesign
SOPC hardware/software [3] design space tradeoffs as seen in Figure 4, for simple algorithms a
hardware solution offers faster computation times, but it offers less flexibility since the hardware
remains dedicated for that calculation and it may require a larger FPGA that consumes more
power and increases system cost. Potential SOPC applications to implement in hardware in this
region include pre-processing of real-time data with high sample rates, multimedia encoding and
decoding, low-level communication protocols, and digital signal processing algorithms such as
filters and FFTs. Hardware IP cores designed for FPGAs are available for many of these more
common functions such as encoders/decoders, communication protocols, filters, and FFTs. The
new hardware can also be designed using the traditional VHDL or Verilog FPGA synthesis tools.
As the size of the hardware needed for implementation of more complex algorithms increases, the
hardware starts to slow down, achieves diminishing performance levels, and becomes
increasingly more difficult for designers to implement. This occurs due to increasing numbers of
International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.3, No.3,June 2013
35
gate delays in logic circuits and increases in the distance and communication time needed to
transfer data values between hardware units. Pipelining and parallel processing techniques can be
used to extend the useable range of hardware solutions, especially for non-recursive algorithms
with a high degree of parallelism.[10] The system specification is divided Hardware/Software
Co-design into a set of smaller pieces, so-called granules (e.g. basic blocks).
The remaining part of the work is elaborated in different sections as; Section II presents a review
of related works. Section III describes the proposed mathematical model used for partitioning
algorithms. Section IV describes the details about SOPC of Altera. Section V describes the
parameters used in simulation and discusses the results. Finally, paper is concluded in section VII
with future work.
2. RELATED WORK
Hardware software partitioning technique is commonly used for system integration [4].The
different algorithms are commonly used to improve the performance. The validation is checked
on system on programmable chip and the results are verified [5]. But the mathematical treatment
on modular architecture is not defined. Based on mathematical modeling the advanced
optimization algorithm is applied to improve the performance.
3. PROPOSED MATHEMATICAL MODEL
The modular block of TKIP are considered and is differed from hardware and software latency is
considered as the unit value and based on each module is shown in the undirected graph. Initially
consider one subset as a hardware block based on that calculation of HO, SP & HP is made
through the algorithm. Using algorithm if it is proved that the selected subset HP is less than the
SP, the subset is used to implement in hardware or else the subset is implement in software or
using NIOS processor. An undirected simple graph G = (V,E), V = {q,. . . , un},
P1: HO, SO € R+ are given. Is there a P HW- SW partition so that HP <=HO and SP <=SO.
[3]
P2: HO € R+ is given. Find a P HW-SW partition so that HP<= HO and SP is minimal.
(Cost-constrained systems)
P3: SO € R+ is given. Find a P HW-SW partition so that SP<= SO and HP is minimal.
(Systems with hard real-time constraints) [3]
Figure 4 Complete Graph for a model
PRICE/WEIGHT
International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.3, No.3,June 2013
36
3.1 THEOREM 1. [3]
G = (V,E) , V = {v1,. . . ,Vn},
P is called a hardware-software (HW-SW) partition it is a bipartition of V: P = (VB,
VS)
Vs = V ,VH U VS =V and VH ∩ VS=Ф The crossing edges are: Ep
Hardware cost HP=∑ hi and software cost SP=∑ Si+∑ c(Vi, Vj)( , ) i.e. the
software cost and the communication cost.
3.2 PARTITIONING ALGORITHM BASED ON VERTICES OR NODES OF
THE BLOCK NOT EDGES
Procedure partition 1(n:integer
Price,weight[1..n]of integer
X[1..n]: of integer
Var best[1..n] of integer );
Var:SP,HP,W,P, V.price, v.weight, v.node,
u.node, total u.price;
Q :queue of node;
begin
Initialize(Q);
V.price=0;
v.weight=0;
v.node=0;
A=0;
total u.price=0;
HP=0;
Asssume P=10,K=W=10;
Accept the value from user Total u.node;
Select subset from a graph;
enqueue(Q,V); //subset is stored in a queue
while notempty queue do
dequeue(Q,v)
u.node=v.node+1;
u.weight=v.weight+w[u.node];//calculate price of selected subset
u.price=v.price+w[u.node]//calculate weight of selected subset
if u.weight<=w and u.profit>=k
SO=W
end;
for i 0 to totalu.node
A=A+total u.price[i];
HO=A-K;
for j=0 to node.selected subset
HP=HP+ total u.price[j];
If k<=(A-u.price) and (H0>=(HP <=SP))
best=X //subset is selected;
end;
International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.3, No.3,June 2013
37
3.3 SOFTWARE SPECIFICATIONS
Once bit file is downloaded into FPGA, there will be interface to the computer through RS232.
We will give the input data to the TKIP. Hardware will encrypt that data. Encrypted data will be
given to the decryption block. Decrypted data will be same as the input data which will be stored
in another file.
This way we will confirm the input data and decrypted data is same.
4. ALTERA’S SOPC BUILDER
The SOPC builder is used for developing the central processing unit or rather the architectural
block for the system. The NIOS II of Quartus is used to implement Michel of TKIP.
Figure 5 Snapshots of architecture using System on programmable chip
International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.3, No.3,June 2013
38
5 SIMULATION PARAMETERS FOR TKIP (MICHEL BLOCK)
Figure 6 Simulation Waveform of Hardware and software of TKIP Michel block
International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.3, No.3,June 2013
39
DE2 Board Clock
Frequency
Latency
TKIP Hardware
Proposed approach HW/SW
Codesign
40 MHz (25 ns) 10us (400 cycles) 8us (320 cycles)
The above results show how the performance is improved using co-design and graph theory.
6. ACKNOWLEDGEMENT
This work is supported by GHRCE and University of Pune.
7. CONCLUSION
In this paper we have introduced mathematical treatment and the algorithm to decide the block
usage in terms of hardware and software to get optimized latency.
REFERENCES
[1] IEEE Computer Society, Std 802.11i™-2004 pp43-56
[2] Yu-Tsang Chang1 “A Modularized FPGA-Based Embedded System Development Platform, (2010)
A Hardware/Software Co-specification Methodology Based Upon OpenMP “. Pp 1697-
1702,International Conference on Electronic Computer Technology The Application of Genetic
Algorithm in Embedded System Hardware-software Partitioning Shijue Zheng,Yan Zhang
[3] Peter Arato, Sandor Juhasz, 201th Adam Mann, Andras Orban, David Papp “Hardware-software
partitioning in embedded system design” pp 197-202,WISP 2003, Budapest, Hungnry 4-6
September, 2003.
[4] Yi Zou Zhenquan Zhuang Huanhuan Chen “HW-SW Partitioning Based on Genetic Algorithm” pp
627-633,0-7803-55 15-2/04, 02004 IEEE
[5] Andreas Gerstlauer, Member, IEEE, Christian Haubelt, Member, IEEE, Andy D. Pimentel, Senior
Member, IEEE “Electronic System-Level Synthesis Methodologies ”IEEE Transactions On
Computer-Aided Design Of Integrated Circuits And Systems, Vol. 28, No. 10, October 2009
International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.3, No.3,June 2013
40
AUTHORS
Mr. Vilas V. Deotare completed Engineering from University of Pune. Post Graduation
from BAMU Aurangabad. He is pursuing Doctorate from Nagpur University (India). He is
a member of Professional bodies like ISTE, His Research of Interest in VLSI and D
evelopment of algorithms in VLSI.
Mr. Dinesh Padole completed Engineering from RTM Nagpur, Post Graduation from
CEDTI Aurangabad & awarded as Doctorate from RTM Nagpur University. He is
associated with Various professional societies like Member IEEE, life member ISTE and
CSI. His re search interest includes Multiprocessor /Multi-core systems, Embedded System
Design. He worked as reviewer & Chaired technical sessions for several International
conferences at India and abroad.
Miss Swati Shelke completed Engineering from University of Pune. She is pursuing Post
Graduation from BAMU University of Pune. Her research I nterest in VLSI.

More Related Content

What's hot

Secure Checkpointing Approach for Mobile Environment
Secure Checkpointing Approach for Mobile EnvironmentSecure Checkpointing Approach for Mobile Environment
Secure Checkpointing Approach for Mobile Environmentidescitation
 
A new dynamic speech encryption algorithm based on Lorenz chaotic map over in...
A new dynamic speech encryption algorithm based on Lorenz chaotic map over in...A new dynamic speech encryption algorithm based on Lorenz chaotic map over in...
A new dynamic speech encryption algorithm based on Lorenz chaotic map over in...IJECEIAES
 
IRJET- E-Commerce Website using Skyline Queries
IRJET-  	  E-Commerce Website using Skyline QueriesIRJET-  	  E-Commerce Website using Skyline Queries
IRJET- E-Commerce Website using Skyline QueriesIRJET Journal
 
Image transmission in wireless sensor networks
Image transmission in wireless sensor networksImage transmission in wireless sensor networks
Image transmission in wireless sensor networkseSAT Publishing House
 
EEL4851writeup.doc
EEL4851writeup.docEEL4851writeup.doc
EEL4851writeup.docbutest
 
Application of machine learning and cognitive computing in intrusion detectio...
Application of machine learning and cognitive computing in intrusion detectio...Application of machine learning and cognitive computing in intrusion detectio...
Application of machine learning and cognitive computing in intrusion detectio...Mahdi Hosseini Moghaddam
 
Introduction to differential power analysis - Rambus
Introduction to differential power analysis - RambusIntroduction to differential power analysis - Rambus
Introduction to differential power analysis - RambusRambus
 
Calibration of Deployment Simulation Models - A Multi-Paradigm Modelling Appr...
Calibration of Deployment Simulation Models - A Multi-Paradigm Modelling Appr...Calibration of Deployment Simulation Models - A Multi-Paradigm Modelling Appr...
Calibration of Deployment Simulation Models - A Multi-Paradigm Modelling Appr...Daniele Gianni
 
Power Analysis Attacks
Power Analysis AttacksPower Analysis Attacks
Power Analysis AttacksLee Stewart
 
Hardware/Software Co-Design for Efficient Microkernel Execution
Hardware/Software Co-Design for Efficient Microkernel ExecutionHardware/Software Co-Design for Efficient Microkernel Execution
Hardware/Software Co-Design for Efficient Microkernel ExecutionMartin Děcký
 
Using K-Nearest Neighbors and Support Vector Machine Classifiers in Personal ...
Using K-Nearest Neighbors and Support Vector Machine Classifiers in Personal ...Using K-Nearest Neighbors and Support Vector Machine Classifiers in Personal ...
Using K-Nearest Neighbors and Support Vector Machine Classifiers in Personal ...IJCSIS Research Publications
 
Optimization of image compression and ciphering based on EZW techniques
Optimization of image compression and ciphering based on EZW techniquesOptimization of image compression and ciphering based on EZW techniques
Optimization of image compression and ciphering based on EZW techniquesTELKOMNIKA JOURNAL
 
An area and power efficient on chip communication architectures for image enc...
An area and power efficient on chip communication architectures for image enc...An area and power efficient on chip communication architectures for image enc...
An area and power efficient on chip communication architectures for image enc...eSAT Publishing House
 
Implementation of Cryptography Architecture with High Secure Core
Implementation of Cryptography Architecture with High Secure CoreImplementation of Cryptography Architecture with High Secure Core
Implementation of Cryptography Architecture with High Secure CoreIJMER
 
Hardware Implementation of Algorithm for Cryptanalysis
Hardware Implementation of Algorithm for CryptanalysisHardware Implementation of Algorithm for Cryptanalysis
Hardware Implementation of Algorithm for Cryptanalysisijcisjournal
 
Microkernels in the Era of Data-Centric Computing
Microkernels in the Era of Data-Centric ComputingMicrokernels in the Era of Data-Centric Computing
Microkernels in the Era of Data-Centric ComputingMartin Děcký
 
A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...
A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...
A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...sipij
 

What's hot (19)

Secure Checkpointing Approach for Mobile Environment
Secure Checkpointing Approach for Mobile EnvironmentSecure Checkpointing Approach for Mobile Environment
Secure Checkpointing Approach for Mobile Environment
 
Ku3419461949
Ku3419461949Ku3419461949
Ku3419461949
 
A new dynamic speech encryption algorithm based on Lorenz chaotic map over in...
A new dynamic speech encryption algorithm based on Lorenz chaotic map over in...A new dynamic speech encryption algorithm based on Lorenz chaotic map over in...
A new dynamic speech encryption algorithm based on Lorenz chaotic map over in...
 
IRJET- E-Commerce Website using Skyline Queries
IRJET-  	  E-Commerce Website using Skyline QueriesIRJET-  	  E-Commerce Website using Skyline Queries
IRJET- E-Commerce Website using Skyline Queries
 
40520130101005
4052013010100540520130101005
40520130101005
 
Image transmission in wireless sensor networks
Image transmission in wireless sensor networksImage transmission in wireless sensor networks
Image transmission in wireless sensor networks
 
EEL4851writeup.doc
EEL4851writeup.docEEL4851writeup.doc
EEL4851writeup.doc
 
Application of machine learning and cognitive computing in intrusion detectio...
Application of machine learning and cognitive computing in intrusion detectio...Application of machine learning and cognitive computing in intrusion detectio...
Application of machine learning and cognitive computing in intrusion detectio...
 
Introduction to differential power analysis - Rambus
Introduction to differential power analysis - RambusIntroduction to differential power analysis - Rambus
Introduction to differential power analysis - Rambus
 
Calibration of Deployment Simulation Models - A Multi-Paradigm Modelling Appr...
Calibration of Deployment Simulation Models - A Multi-Paradigm Modelling Appr...Calibration of Deployment Simulation Models - A Multi-Paradigm Modelling Appr...
Calibration of Deployment Simulation Models - A Multi-Paradigm Modelling Appr...
 
Power Analysis Attacks
Power Analysis AttacksPower Analysis Attacks
Power Analysis Attacks
 
Hardware/Software Co-Design for Efficient Microkernel Execution
Hardware/Software Co-Design for Efficient Microkernel ExecutionHardware/Software Co-Design for Efficient Microkernel Execution
Hardware/Software Co-Design for Efficient Microkernel Execution
 
Using K-Nearest Neighbors and Support Vector Machine Classifiers in Personal ...
Using K-Nearest Neighbors and Support Vector Machine Classifiers in Personal ...Using K-Nearest Neighbors and Support Vector Machine Classifiers in Personal ...
Using K-Nearest Neighbors and Support Vector Machine Classifiers in Personal ...
 
Optimization of image compression and ciphering based on EZW techniques
Optimization of image compression and ciphering based on EZW techniquesOptimization of image compression and ciphering based on EZW techniques
Optimization of image compression and ciphering based on EZW techniques
 
An area and power efficient on chip communication architectures for image enc...
An area and power efficient on chip communication architectures for image enc...An area and power efficient on chip communication architectures for image enc...
An area and power efficient on chip communication architectures for image enc...
 
Implementation of Cryptography Architecture with High Secure Core
Implementation of Cryptography Architecture with High Secure CoreImplementation of Cryptography Architecture with High Secure Core
Implementation of Cryptography Architecture with High Secure Core
 
Hardware Implementation of Algorithm for Cryptanalysis
Hardware Implementation of Algorithm for CryptanalysisHardware Implementation of Algorithm for Cryptanalysis
Hardware Implementation of Algorithm for Cryptanalysis
 
Microkernels in the Era of Data-Centric Computing
Microkernels in the Era of Data-Centric ComputingMicrokernels in the Era of Data-Centric Computing
Microkernels in the Era of Data-Centric Computing
 
A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...
A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...
A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...
 

Similar to Optimization of latency of temporal key Integrity protocol (tkip) using graph theory And hardware software co-design

PERFORMING AN EXPERIMENTAL PLATFORM TO OPTIMIZE DATA MULTIPLEXING
PERFORMING AN EXPERIMENTAL PLATFORM TO OPTIMIZE DATA MULTIPLEXINGPERFORMING AN EXPERIMENTAL PLATFORM TO OPTIMIZE DATA MULTIPLEXING
PERFORMING AN EXPERIMENTAL PLATFORM TO OPTIMIZE DATA MULTIPLEXINGijesajournal
 
Hardware simulation for exponential blind equal throughput algorithm using sy...
Hardware simulation for exponential blind equal throughput algorithm using sy...Hardware simulation for exponential blind equal throughput algorithm using sy...
Hardware simulation for exponential blind equal throughput algorithm using sy...IJECEIAES
 
An octa core processor with shared memory and message-passing
An octa core processor with shared memory and message-passingAn octa core processor with shared memory and message-passing
An octa core processor with shared memory and message-passingeSAT Journals
 
A novel implementation of
A novel implementation ofA novel implementation of
A novel implementation ofcsandit
 
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...IJCNCJournal
 
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...IJCNCJournal
 
HW/SW Partitioning Approach on Reconfigurable Multimedia System on Chip
HW/SW Partitioning Approach on Reconfigurable Multimedia System on ChipHW/SW Partitioning Approach on Reconfigurable Multimedia System on Chip
HW/SW Partitioning Approach on Reconfigurable Multimedia System on ChipCSCJournals
 
Transfer of ut information from fpga through ethernet interface
Transfer of ut information from fpga through ethernet interfaceTransfer of ut information from fpga through ethernet interface
Transfer of ut information from fpga through ethernet interfaceeSAT Publishing House
 
Applications of Fuzzy Logic in Image Processing – A Brief Study
Applications of Fuzzy Logic in Image Processing – A Brief StudyApplications of Fuzzy Logic in Image Processing – A Brief Study
Applications of Fuzzy Logic in Image Processing – A Brief StudyComputer Science Journals
 
Basic signal processing system design on fpga using lms based adaptive filter
Basic signal processing system design on fpga using lms based adaptive filterBasic signal processing system design on fpga using lms based adaptive filter
Basic signal processing system design on fpga using lms based adaptive filtereSAT Journals
 
FPGA based Efficient Interpolator design using DALUT Algorithm
FPGA based Efficient Interpolator design using DALUT AlgorithmFPGA based Efficient Interpolator design using DALUT Algorithm
FPGA based Efficient Interpolator design using DALUT Algorithmcscpconf
 
FPGA based Efficient Interpolator design using DALUT Algorithm
FPGA based Efficient Interpolator design using DALUT AlgorithmFPGA based Efficient Interpolator design using DALUT Algorithm
FPGA based Efficient Interpolator design using DALUT Algorithmcscpconf
 
UNIT 1 SONCA.pptx
UNIT 1 SONCA.pptxUNIT 1 SONCA.pptx
UNIT 1 SONCA.pptxmohan134666
 
STUDY ON EMERGING APPLICATIONS ON DATA PLANE AND OPTIMIZATION POSSIBILITIES
STUDY ON EMERGING APPLICATIONS ON DATA  PLANE AND OPTIMIZATION POSSIBILITIES STUDY ON EMERGING APPLICATIONS ON DATA  PLANE AND OPTIMIZATION POSSIBILITIES
STUDY ON EMERGING APPLICATIONS ON DATA PLANE AND OPTIMIZATION POSSIBILITIES ijdpsjournal
 

Similar to Optimization of latency of temporal key Integrity protocol (tkip) using graph theory And hardware software co-design (20)

PERFORMING AN EXPERIMENTAL PLATFORM TO OPTIMIZE DATA MULTIPLEXING
PERFORMING AN EXPERIMENTAL PLATFORM TO OPTIMIZE DATA MULTIPLEXINGPERFORMING AN EXPERIMENTAL PLATFORM TO OPTIMIZE DATA MULTIPLEXING
PERFORMING AN EXPERIMENTAL PLATFORM TO OPTIMIZE DATA MULTIPLEXING
 
Hardware simulation for exponential blind equal throughput algorithm using sy...
Hardware simulation for exponential blind equal throughput algorithm using sy...Hardware simulation for exponential blind equal throughput algorithm using sy...
Hardware simulation for exponential blind equal throughput algorithm using sy...
 
M04302093096
M04302093096M04302093096
M04302093096
 
An octa core processor with shared memory and message-passing
An octa core processor with shared memory and message-passingAn octa core processor with shared memory and message-passing
An octa core processor with shared memory and message-passing
 
A novel implementation of
A novel implementation ofA novel implementation of
A novel implementation of
 
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
 
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
 
HW/SW Partitioning Approach on Reconfigurable Multimedia System on Chip
HW/SW Partitioning Approach on Reconfigurable Multimedia System on ChipHW/SW Partitioning Approach on Reconfigurable Multimedia System on Chip
HW/SW Partitioning Approach on Reconfigurable Multimedia System on Chip
 
Transfer of ut information from fpga through ethernet interface
Transfer of ut information from fpga through ethernet interfaceTransfer of ut information from fpga through ethernet interface
Transfer of ut information from fpga through ethernet interface
 
FPGA IMPLEMENTATION OF APPROXIMATE SOFTMAX FUNCTION FOR EFFICIENT CNN INFERENCE
FPGA IMPLEMENTATION OF APPROXIMATE SOFTMAX FUNCTION FOR EFFICIENT CNN INFERENCEFPGA IMPLEMENTATION OF APPROXIMATE SOFTMAX FUNCTION FOR EFFICIENT CNN INFERENCE
FPGA IMPLEMENTATION OF APPROXIMATE SOFTMAX FUNCTION FOR EFFICIENT CNN INFERENCE
 
PID2143641
PID2143641PID2143641
PID2143641
 
Applications of Fuzzy Logic in Image Processing – A Brief Study
Applications of Fuzzy Logic in Image Processing – A Brief StudyApplications of Fuzzy Logic in Image Processing – A Brief Study
Applications of Fuzzy Logic in Image Processing – A Brief Study
 
H04425053
H04425053H04425053
H04425053
 
Co question 2008
Co question 2008Co question 2008
Co question 2008
 
Basic signal processing system design on fpga using lms based adaptive filter
Basic signal processing system design on fpga using lms based adaptive filterBasic signal processing system design on fpga using lms based adaptive filter
Basic signal processing system design on fpga using lms based adaptive filter
 
FPGA based Efficient Interpolator design using DALUT Algorithm
FPGA based Efficient Interpolator design using DALUT AlgorithmFPGA based Efficient Interpolator design using DALUT Algorithm
FPGA based Efficient Interpolator design using DALUT Algorithm
 
FPGA based Efficient Interpolator design using DALUT Algorithm
FPGA based Efficient Interpolator design using DALUT AlgorithmFPGA based Efficient Interpolator design using DALUT Algorithm
FPGA based Efficient Interpolator design using DALUT Algorithm
 
UNIT 1 SONCA.pptx
UNIT 1 SONCA.pptxUNIT 1 SONCA.pptx
UNIT 1 SONCA.pptx
 
J044084349
J044084349J044084349
J044084349
 
STUDY ON EMERGING APPLICATIONS ON DATA PLANE AND OPTIMIZATION POSSIBILITIES
STUDY ON EMERGING APPLICATIONS ON DATA  PLANE AND OPTIMIZATION POSSIBILITIES STUDY ON EMERGING APPLICATIONS ON DATA  PLANE AND OPTIMIZATION POSSIBILITIES
STUDY ON EMERGING APPLICATIONS ON DATA PLANE AND OPTIMIZATION POSSIBILITIES
 

Recently uploaded

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 

Recently uploaded (20)

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 

Optimization of latency of temporal key Integrity protocol (tkip) using graph theory And hardware software co-design

  • 1. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.3, No.3,June 2013 DOI : 10.5121/ijcseit.2013.3304 33 Optimization of Latency of Temporal Key Integrity Protocol (TKIP) Using Graph Theory and Hardware Software Co-Design Vilas V Deotare1 , Dinesh V Padole2 , Swati Shelke 3 GHRCE, Nagpur, India vilasdeotare@gmail.com1 ,dvpadole@gmail.com2 ,swati.wani@gmail.com3 Abstract: Temporal Key Integrity Protocol (TKIP) [1] encapsulation consists of multiple-hardware and software block which can be implemented either software or hardware block or combination of both. This papers aims to design the TKIP technique using graph theory and hardware software co-design for minimizing the latency. Simulation results show the effectiveness of the presented technique over Hardware software co- design. Keywords: ROBUST SECURITY NETWORK ASSOCIATION, WIRED EQUIVALENT PRIVACY, TKIP,HARDWARE SOFTWARE CO-DESIGN. 1. INTRODUCTION Cryptography is a part of communication used for higher security and it is done through different algorithm in network communications. The importance of cryptography is in the field of ecommerce and other network field. User can use same algorithm with a key of long sequence and at the receiving end with the same key it is decrypted and the message of encrypted is received. Key is always changes for higher security. 1.1 TKIP OVERVIEW The TKIP is a cipher suite enhancing the WEP [1] protocol on pre-RSNA hardware. TKIP modifies WEP as follows: Figure 2 TKIP Block diagram
  • 2. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.3, No.3,June 2013 34 TKIP uses a cryptographic mixing function to combine a temporal key, the TA, and the TSC into the WEP seed. 1.2 TKIP MIC[2] Flaws in the IEEE 802.11 WEP [2] design cause it to fail to meet its goal of protecting data traffic content from casual eavesdroppers. Among the most significant WEP flaws is the lack of a mechanism to defeat message forgeries and other active attacks. To defend against active attacks, TKIP includes a MIC, named Michael. This MIC offers only weak defenses against message forgeries, but it constitutes the best that can be achieved with the majority of legacy hardware. TKIP uses different MIC keys depending on the direction of the transfer. 1.3 HARDWARE/SOFTWARE DESIGN ALTERNATIVES The SoPC-based approach [3] offers new design space alternatives to explore. It is possible to consider design options that use software, dedicated custom hardware, or a mixture of both. Software implementations require less development time, but in many cases, a general-purpose processor will be too slow to perform all of the calculations using only software. To speed up the system, some frequently executed functions can be implemented in hardware in an SoPC design using the FPGA’s logic. Figure 3 Flow of Hardware Software Codesign SOPC hardware/software [3] design space tradeoffs as seen in Figure 4, for simple algorithms a hardware solution offers faster computation times, but it offers less flexibility since the hardware remains dedicated for that calculation and it may require a larger FPGA that consumes more power and increases system cost. Potential SOPC applications to implement in hardware in this region include pre-processing of real-time data with high sample rates, multimedia encoding and decoding, low-level communication protocols, and digital signal processing algorithms such as filters and FFTs. Hardware IP cores designed for FPGAs are available for many of these more common functions such as encoders/decoders, communication protocols, filters, and FFTs. The new hardware can also be designed using the traditional VHDL or Verilog FPGA synthesis tools. As the size of the hardware needed for implementation of more complex algorithms increases, the hardware starts to slow down, achieves diminishing performance levels, and becomes increasingly more difficult for designers to implement. This occurs due to increasing numbers of
  • 3. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.3, No.3,June 2013 35 gate delays in logic circuits and increases in the distance and communication time needed to transfer data values between hardware units. Pipelining and parallel processing techniques can be used to extend the useable range of hardware solutions, especially for non-recursive algorithms with a high degree of parallelism.[10] The system specification is divided Hardware/Software Co-design into a set of smaller pieces, so-called granules (e.g. basic blocks). The remaining part of the work is elaborated in different sections as; Section II presents a review of related works. Section III describes the proposed mathematical model used for partitioning algorithms. Section IV describes the details about SOPC of Altera. Section V describes the parameters used in simulation and discusses the results. Finally, paper is concluded in section VII with future work. 2. RELATED WORK Hardware software partitioning technique is commonly used for system integration [4].The different algorithms are commonly used to improve the performance. The validation is checked on system on programmable chip and the results are verified [5]. But the mathematical treatment on modular architecture is not defined. Based on mathematical modeling the advanced optimization algorithm is applied to improve the performance. 3. PROPOSED MATHEMATICAL MODEL The modular block of TKIP are considered and is differed from hardware and software latency is considered as the unit value and based on each module is shown in the undirected graph. Initially consider one subset as a hardware block based on that calculation of HO, SP & HP is made through the algorithm. Using algorithm if it is proved that the selected subset HP is less than the SP, the subset is used to implement in hardware or else the subset is implement in software or using NIOS processor. An undirected simple graph G = (V,E), V = {q,. . . , un}, P1: HO, SO € R+ are given. Is there a P HW- SW partition so that HP <=HO and SP <=SO. [3] P2: HO € R+ is given. Find a P HW-SW partition so that HP<= HO and SP is minimal. (Cost-constrained systems) P3: SO € R+ is given. Find a P HW-SW partition so that SP<= SO and HP is minimal. (Systems with hard real-time constraints) [3] Figure 4 Complete Graph for a model PRICE/WEIGHT
  • 4. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.3, No.3,June 2013 36 3.1 THEOREM 1. [3] G = (V,E) , V = {v1,. . . ,Vn}, P is called a hardware-software (HW-SW) partition it is a bipartition of V: P = (VB, VS) Vs = V ,VH U VS =V and VH ∩ VS=Ф The crossing edges are: Ep Hardware cost HP=∑ hi and software cost SP=∑ Si+∑ c(Vi, Vj)( , ) i.e. the software cost and the communication cost. 3.2 PARTITIONING ALGORITHM BASED ON VERTICES OR NODES OF THE BLOCK NOT EDGES Procedure partition 1(n:integer Price,weight[1..n]of integer X[1..n]: of integer Var best[1..n] of integer ); Var:SP,HP,W,P, V.price, v.weight, v.node, u.node, total u.price; Q :queue of node; begin Initialize(Q); V.price=0; v.weight=0; v.node=0; A=0; total u.price=0; HP=0; Asssume P=10,K=W=10; Accept the value from user Total u.node; Select subset from a graph; enqueue(Q,V); //subset is stored in a queue while notempty queue do dequeue(Q,v) u.node=v.node+1; u.weight=v.weight+w[u.node];//calculate price of selected subset u.price=v.price+w[u.node]//calculate weight of selected subset if u.weight<=w and u.profit>=k SO=W end; for i 0 to totalu.node A=A+total u.price[i]; HO=A-K; for j=0 to node.selected subset HP=HP+ total u.price[j]; If k<=(A-u.price) and (H0>=(HP <=SP)) best=X //subset is selected; end;
  • 5. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.3, No.3,June 2013 37 3.3 SOFTWARE SPECIFICATIONS Once bit file is downloaded into FPGA, there will be interface to the computer through RS232. We will give the input data to the TKIP. Hardware will encrypt that data. Encrypted data will be given to the decryption block. Decrypted data will be same as the input data which will be stored in another file. This way we will confirm the input data and decrypted data is same. 4. ALTERA’S SOPC BUILDER The SOPC builder is used for developing the central processing unit or rather the architectural block for the system. The NIOS II of Quartus is used to implement Michel of TKIP. Figure 5 Snapshots of architecture using System on programmable chip
  • 6. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.3, No.3,June 2013 38 5 SIMULATION PARAMETERS FOR TKIP (MICHEL BLOCK) Figure 6 Simulation Waveform of Hardware and software of TKIP Michel block
  • 7. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.3, No.3,June 2013 39 DE2 Board Clock Frequency Latency TKIP Hardware Proposed approach HW/SW Codesign 40 MHz (25 ns) 10us (400 cycles) 8us (320 cycles) The above results show how the performance is improved using co-design and graph theory. 6. ACKNOWLEDGEMENT This work is supported by GHRCE and University of Pune. 7. CONCLUSION In this paper we have introduced mathematical treatment and the algorithm to decide the block usage in terms of hardware and software to get optimized latency. REFERENCES [1] IEEE Computer Society, Std 802.11i™-2004 pp43-56 [2] Yu-Tsang Chang1 “A Modularized FPGA-Based Embedded System Development Platform, (2010) A Hardware/Software Co-specification Methodology Based Upon OpenMP “. Pp 1697- 1702,International Conference on Electronic Computer Technology The Application of Genetic Algorithm in Embedded System Hardware-software Partitioning Shijue Zheng,Yan Zhang [3] Peter Arato, Sandor Juhasz, 201th Adam Mann, Andras Orban, David Papp “Hardware-software partitioning in embedded system design” pp 197-202,WISP 2003, Budapest, Hungnry 4-6 September, 2003. [4] Yi Zou Zhenquan Zhuang Huanhuan Chen “HW-SW Partitioning Based on Genetic Algorithm” pp 627-633,0-7803-55 15-2/04, 02004 IEEE [5] Andreas Gerstlauer, Member, IEEE, Christian Haubelt, Member, IEEE, Andy D. Pimentel, Senior Member, IEEE “Electronic System-Level Synthesis Methodologies ”IEEE Transactions On Computer-Aided Design Of Integrated Circuits And Systems, Vol. 28, No. 10, October 2009
  • 8. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.3, No.3,June 2013 40 AUTHORS Mr. Vilas V. Deotare completed Engineering from University of Pune. Post Graduation from BAMU Aurangabad. He is pursuing Doctorate from Nagpur University (India). He is a member of Professional bodies like ISTE, His Research of Interest in VLSI and D evelopment of algorithms in VLSI. Mr. Dinesh Padole completed Engineering from RTM Nagpur, Post Graduation from CEDTI Aurangabad & awarded as Doctorate from RTM Nagpur University. He is associated with Various professional societies like Member IEEE, life member ISTE and CSI. His re search interest includes Multiprocessor /Multi-core systems, Embedded System Design. He worked as reviewer & Chaired technical sessions for several International conferences at India and abroad. Miss Swati Shelke completed Engineering from University of Pune. She is pursuing Post Graduation from BAMU University of Pune. Her research I nterest in VLSI.