Cart (Loading....) | Create Account
Close category search window

Reconfigurable security protection system based on NetFPGA and embedded soft-core technology

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Kai Zhang ; Inst. of Inf. Sci., Beijing Jiaotong Univ., Beijing, China ; Xiaoming Ding ; Ke Xiong ; Yunting Zhao

There are many problems in traditional network security and PC security protection systems, such as insecurity, inflexibility and so on, whether they are implemented by software or hardware. To solve the problems, this paper presents a reconfigurable security protection system on the basis of NetFPGA platform and embedded soft-core technology. This system consists of two subsystems, one is implemented on the NetFPGA for the subnet protection and the other is implemented on DE2 board to protect the terminal, in which NetFPGA is used to achieve packet filtering in hardware, immunity from ARP attacks in hardware, flow monitoring and transmitting with hardware acceleration, and DE2 board is used to realize AES/DES encryption modules in hardware. Moreover, the USB virus can be isolated effectively by the subsystem designed on DE2. To further enhance performance, security and flexibility of our system, including both the subnet protection subsystem and the terminal protection subsystem, we introduce two types of remote reconfigurable design method, by which administrator is able to reconfigure the two subsystems for both the software and the hardware logical circuits via any authorized devices. Extensive experiments show that all the functions of the blocks of the designed system are valid and the designed system is feasible.

Published in:

Computer Design and Applications (ICCDA), 2010 International Conference on  (Volume:5 )

Date of Conference:

25-27 June 2010

Need Help?

IEEE Advancing Technology for Humanity About IEEE Xplore | Contact | Help | Terms of Use | Nondiscrimination Policy | Site Map | Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest professional association for the advancement of technology.
© Copyright 2014 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.