skip to main content
10.1145/1868630.1868646acmconferencesArticle/Chapter ViewAbstractPublication PagesmswimConference Proceedingsconference-collections
research-article

A TRNG exploiting multi-source physical data

Published: 20 October 2010 Publication History

Abstract

In recent years, the considerable progress of miniaturization and the consequent increase of the efficiency of digital circuits has allowed a great diffusion of the wireless sensor network technology. This has led to the growth of applications and protocols for applying these networks to several scenarios, such as the military one, where it is essential to deploy security protocols in order to prevent opponents from accessing the information exchanged among sensor nodes. This paper analyzes security issues of data processed by the WSN and describes a system able to generate sequences of random numbers, which can be used by security algorithms and protocols. The proposed True Random Number Generator (TRNG) exploits measurements obtained from sensor nodes, in order to allow every node to produce random data upon request, without involving a trusted third party. The proposed TRNG behavior has been tested by carrying out the NIST tests, and the obtained experimental results indicate the high degree of randomness of the produced numbers.

References

[1]
A. Francillon, C. Castelluccia, and P. INRIA. TinyRNG: A cryptographic random number generator for wireless sensors network nodes. In Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks and Workshops, 2007. WiOpt 2007. 5th International Symposium on, pages 1--7. Citeseer, 2007.
[2]
M. Jakobsson, E. Shriver, B. Hillyer, and A. Juels. A practical secure physical random bit generator. In Proceedings of the 5th ACM Conference on Computer and Communications Security, page 111. ACM, November 1998.
[3]
B. Jun and P. Kocher. The Intel random number generator. Cryptography Research Inc. white paper, April 1999.
[4]
C. Karlof, N. Sastry, and D. Wagner. Tinysec: A link layer security architecture for wireless sensor networks. In Proceedings of the 2nd international conference on Embedded networked sensor systems, pages 162--175. ACM, November 2004.
[5]
A. Lalomia, G. L. Re, and M. Ortolani. A hybrid framework for soft real-time wsn simulation. In 13th IEEE/ACM International Symposium on Distributed Simulation and Real Time Applications, October 2009.
[6]
P. Levis, N. Lee, M. Welsh, and D. Culler. Tossim: Accurate and scalable simulation of entire tinyos applications. In the First ACM Conference on Embedded Networked Sensor Systems (SenSys 2003). ACM, November 2003.
[7]
L. B. Oliveira, D. Aranha, E. Morais, F. Daguano, J. Lípez, and R. Dahab. Tinytate: Identity-based encryption for sensor networks. website: http://eprint.iacr.org/2007/020.pdf, 2007.
[8]
A. Rukhin, J. Soto, J. Nechvatal, M. Smid, E. Barker, S. Leigh, M. Levenson, M. Vangel, D. Banks, A. Heckert, J. Dray, and S. Vo. A statistical test suite for random and pseudorandom number generators for cryptographic applications. Storming Media, 2001.
[9]
C. Shannon. Communication theory of secrecy systems. MD Computing, 15(1):57--64, 1998.
[10]
W. Stallings. Cryptography and Network Security (4th Edition). Prentice Hall, 2006.
[11]
M. Stipčević and B. Rogina. Quantum random number generator based on photonic emission in semiconductors. Review of Scientific Instruments, 78:045104, 2007.

Cited By

View all
  • (2017)Shortening the security parameters in lightweight WSN applications for IoT - lessons learned2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)10.1109/PERCOMW.2017.7917637(636-641)Online publication date: Mar-2017
  • (2017)Smart key generation for smart cities2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT)10.1109/CIACT.2017.7977278(1-5)Online publication date: Feb-2017
  • (2017)A Lightweight Pseudorandom Number Generator for Securing the Internet of ThingsIEEE Access10.1109/ACCESS.2017.27741055(27800-27806)Online publication date: 2017
  • Show More Cited By

Index Terms

  1. A TRNG exploiting multi-source physical data
          Index terms have been assigned to the content through auto-classification.

          Recommendations

          Comments

          Information & Contributors

          Information

          Published In

          cover image ACM Conferences
          Q2SWinet '10: Proceedings of the 6th ACM workshop on QoS and security for wireless and mobile networks
          October 2010
          118 pages
          ISBN:9781450302753
          DOI:10.1145/1868630
          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Sponsors

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          Published: 20 October 2010

          Permissions

          Request permissions for this article.

          Check for updates

          Author Tags

          1. network security
          2. random number generator
          3. wireless sensor networks

          Qualifiers

          • Research-article

          Conference

          MSWiM '10
          Sponsor:

          Acceptance Rates

          Q2SWinet '10 Paper Acceptance Rate 16 of 54 submissions, 30%;
          Overall Acceptance Rate 46 of 131 submissions, 35%

          Contributors

          Other Metrics

          Bibliometrics & Citations

          Bibliometrics

          Article Metrics

          • Downloads (Last 12 months)13
          • Downloads (Last 6 weeks)1
          Reflects downloads up to 08 Mar 2025

          Other Metrics

          Citations

          Cited By

          View all
          • (2017)Shortening the security parameters in lightweight WSN applications for IoT - lessons learned2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)10.1109/PERCOMW.2017.7917637(636-641)Online publication date: Mar-2017
          • (2017)Smart key generation for smart cities2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT)10.1109/CIACT.2017.7977278(1-5)Online publication date: Feb-2017
          • (2017)A Lightweight Pseudorandom Number Generator for Securing the Internet of ThingsIEEE Access10.1109/ACCESS.2017.27741055(27800-27806)Online publication date: 2017
          • (2017)A Review of Cryptographically Secure PRNGs in Constrained Devices for the IoTInternational Joint Conference SOCO’17-CISIS’17-ICEUTE’17 León, Spain, September 6–8, 2017, Proceeding10.1007/978-3-319-67180-2_65(672-682)Online publication date: 23-Aug-2017
          • (2016)Design and Implementation of Warbler Family of Lightweight Pseudorandom Number Generators for Smart DevicesACM Transactions on Embedded Computing Systems10.1145/280823015:1(1-28)Online publication date: 20-Feb-2016
          • (2016)Toward Sensor-Based Random Number Generation for Mobile and IoT DevicesIEEE Internet of Things Journal10.1109/JIOT.2016.25726383:6(1189-1201)Online publication date: Dec-2016
          • (2015)Secure random number generation in wireless sensor networksConcurrency and Computation: Practice & Experience10.1002/cpe.331127:15(3842-3862)Online publication date: 1-Oct-2015
          • (2013)Secure true random number generator in WLAN/LANProceedings of the 6th International Conference on Security of Information and Networks10.1145/2523514.2527098(331-335)Online publication date: 26-Nov-2013
          • (2011)Secure random number generation in wireless sensor networksProceedings of the 4th international conference on Security of information and networks10.1145/2070425.2070453(175-182)Online publication date: 14-Nov-2011

          View Options

          Login options

          View options

          PDF

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          Figures

          Tables

          Media

          Share

          Share

          Share this Publication link

          Share on social media