Configuration and extension of embedded processors to optimize IPSec protocol execution

Nachiketh R. Potlapally, Srivaths Ravi, Anand Raghunathan, Ruby B. Lee, Niraj K. Jha

Research output: Contribution to journalArticlepeer-review

7 Scopus citations

Abstract

Security protocols, such as IPSec and SSL, are being increasingly deployed in the context of networked embedded systems. The resource-constrained nature of embedded systems and, in particular, the modest capabilities of embedded processors make it challenging to achieve satisfactory performance while executing security protocols. A promising approach for improving performance in embedded systems is to use application-specific instruction set processors that are designed based on configurable and extensible processors. In this paper, we perform a comprehensive performance analysis of the IPSec protocol on a state-of-the-art configurable and extensible embedded processor (Xtensa from Tensilica Inc.). We present performance profiles of a lightweight embedded IPSec implementation running on the Xtensa processor, and examine in detail the various factors that contribute to the processing latencies, including cryptographic and protocol processing. In order to improve the efficiency of IPSec processing on embedded devices, we then study the impact of customizing an embedded processor by synergistically 1) configuring architectural parameters, such as instruction and data cache sizes, processor-memory interface width, write buffers, etc., and 2) extending the base instruction set of the processor using custom instructions for both cryptographic and protocol processing. Our experimental results demonstrate that upto 3.2 × speedup in IPSec processing is possible over a popular embedded IPSec software implementation.

Original languageEnglish (US)
Pages (from-to)605-609
Number of pages5
JournalIEEE Transactions on Very Large Scale Integration (VLSI) Systems
Volume15
Issue number5
DOIs
StatePublished - May 2007

All Science Journal Classification (ASJC) codes

  • Software
  • Hardware and Architecture
  • Electrical and Electronic Engineering

Keywords

  • Configurability
  • Embedded processors
  • Embedded security
  • Embedded systems
  • Extensibility
  • IPsec
  • Performance
  • Security protocols

Fingerprint

Dive into the research topics of 'Configuration and extension of embedded processors to optimize IPSec protocol execution'. Together they form a unique fingerprint.

Cite this