Research Article

QoSS Hierarchical NoC-Based Architecture for MPSoC Dynamic Protection

Table 5

Security efficacy.

Attack scenarioAuthentication efficacyAcces Control efficacy

Send critical information87%100%
Read critical information83%100%
Write not authorized areas100%100%
Nonexisting target100%100%
Repeated information89%100%
Communication target = source100%100%