Research Article
QoSS Hierarchical NoC-Based Architecture for MPSoC Dynamic Protection
Table 5
Security efficacy.
| Attack scenario | Authentication efficacy | Acces Control efficacy |
| Send critical information | 87% | 100% | Read critical information | 83% | 100% | Write not authorized areas | 100% | 100% | Nonexisting target | 100% | 100% | Repeated information | 89% | 100% | Communication target = source | 100% | 100% |
|
|