A Review of Cryptographically Secure PRNGs in Constrained Devices for the IoT

被引:4
|
作者
Beatriz Orue, Amalia [1 ]
Hernandez Encinas, Luis [1 ]
Fernandez, Veronica [1 ]
Montoya, Fausto [1 ]
机构
[1] Spanish Natl Res Council, CSIC, Inst Phys & Informat Technol ITEFI, Madrid, Spain
关键词
Internet of things; Lightweight cryptography; Pseudorandom number generator; Constrained devices; NUMBER GENERATOR;
D O I
10.1007/978-3-319-67180-2_65
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this work we show a deep review of lightweight random and pseudorandom number generators designed for constrained devices such as wireless sensor networks and RFID tags along with a study of Trifork pseudorandom number generator for constrained devices.
引用
收藏
页码:672 / 682
页数:11
相关论文
共 50 条
  • [1] Validation of IoT secure communication gateway for constrained devices
    Peniak, Peter
    Bubenikova, Emilia
    [J]. 2019 24TH INTERNATIONAL CONFERENCE ON APPLIED ELECTRONICS (AE), 2019, : 117 - 121
  • [2] Secure Communications for Resource-Constrained IoT Devices†
    Taha, Abd-Elhamid M.
    Rashwan, Abdulmonem M.
    Hassanein, Hossam S.
    [J]. SENSORS, 2020, 20 (13) : 1 - 18
  • [3] Cryptographically generated addresses for constrained devices
    Castelluccia, C
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2004, 29 (3-4) : 221 - 232
  • [4] Cryptographically Generated Addresses for Constrained Devices*
    Claude Castelluccia
    [J]. Wireless Personal Communications, 2004, 29 : 221 - 232
  • [5] A Secure Communication System for Constrained IoT Devices-Experiences and Recommendations
    Goworko, Michal
    Wytrebowicz, Jacek
    [J]. SENSORS, 2021, 21 (20)
  • [6] SECURE IOT DEVICES
    Shah, Agam
    [J]. MECHANICAL ENGINEERING, 2019, 141 (03) : 19 - 19
  • [7] Multiple-Layer Image Encryption Utilizing Fractional-Order Chen Hyperchaotic Map and Cryptographically Secure PRNGs
    Alexan, Wassim
    Alexan, Nader
    Gabr, Mohamed
    [J]. FRACTAL AND FRACTIONAL, 2023, 7 (04)
  • [8] Enabling Secure Data Exchange through the IOTA Tangle for IoT Constrained Devices
    Carelli, Alberto
    Palmieri, Andrea
    Vilei, Antonio
    Castanier, Fabien
    Vesco, Andrea
    [J]. SENSORS, 2022, 22 (04)
  • [9] Cryptographically Secure Computation
    Shen, Emily
    Varia, Mayank
    Cunningham, Robert K.
    Vesey, W. Konrad
    [J]. COMPUTER, 2015, 48 (04) : 78 - 81
  • [10] Secure Firmware Updates for Constrained IoT Devices Using Open Standards: A Reality Check
    Zandberg, Koen
    Schleiser, Kaspar
    Acosta, Francisco
    Tschofenig, Hannes
    Baccelli, Emmanuel
    [J]. IEEE ACCESS, 2019, 7 : 71907 - 71920