A Review of Cryptographically Secure PRNGs in Constrained Devices for the IoT

被引:4
|
作者
Beatriz Orue, Amalia [1 ]
Hernandez Encinas, Luis [1 ]
Fernandez, Veronica [1 ]
Montoya, Fausto [1 ]
机构
[1] Spanish Natl Res Council, CSIC, Inst Phys & Informat Technol ITEFI, Madrid, Spain
关键词
Internet of things; Lightweight cryptography; Pseudorandom number generator; Constrained devices; NUMBER GENERATOR;
D O I
10.1007/978-3-319-67180-2_65
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this work we show a deep review of lightweight random and pseudorandom number generators designed for constrained devices such as wireless sensor networks and RFID tags along with a study of Trifork pseudorandom number generator for constrained devices.
引用
收藏
页码:672 / 682
页数:11
相关论文
共 50 条
  • [21] Cryptographically secure identity certificates
    Kirovski, D
    Jojic, N
    [J]. 2004 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOL V, PROCEEDINGS: DESIGN AND IMPLEMENTATION OF SIGNAL PROCESSING SYSTEMS INDUSTRY TECHNOLOGY TRACKS MACHINE LEARNING FOR SIGNAL PROCESSING MULTIMEDIA SIGNAL PROCESSING SIGNAL PROCESSING FOR EDUCATION, 2004, : 413 - 416
  • [22] A Secure Secret Key-Sharing System for Resource-Constrained IoT Devices using MQTT
    Noguchi, Taku
    Nakagawa, Masato
    Yoshida, Masami
    Ramonet, Alberto Gallegos
    [J]. 2022 24TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT): ARITIFLCIAL INTELLIGENCE TECHNOLOGIES TOWARD CYBERSECURITY, 2022, : 147 - +
  • [23] DECENT: Secure and fine-grained data access control with policy updating for constrained IoT devices
    Huang, Qinlong
    Wang, Licheng
    Yang, Yixian
    [J]. WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2018, 21 (01): : 151 - 167
  • [24] DECENT: Secure and fine-grained data access control with policy updating for constrained IoT devices
    Qinlong Huang
    Licheng Wang
    Yixian Yang
    [J]. World Wide Web, 2018, 21 : 151 - 167
  • [25] Secure IoT Devices for the Maintenance of Machine Tools
    Tedeschi, Stefano
    Mennen, Jorn
    Tapoglou, Nikolaos
    Roy, Rajkumar
    [J]. PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE IN THROUGH-LIFE ENGINEERING SERVICES, 2017, 59 : 150 - 155
  • [26] Identification of trusted IoT devices for secure delegation
    Khalil, Ushna
    Ahmad, Adnan
    Abdel-Aty, Abdel-Haleem
    Elhoseny, Mohamed
    Abo El-Soud, Mohamed W.
    Zeshan, Furkh
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2021, 90
  • [27] Secure Connection Assistance Architecture for IoT Devices
    Mori, Mika
    Sueda, Yoshiko
    Aihara, Masao
    [J]. 2016 22ND IEEE INTERNATIONAL SYMPOSIUM ON LOCAL AND METROPOLITAN AREA NETWORKS (IEEE LANMAN), 2016,
  • [28] Protection Profile Bricks for Secure IoT Devices
    de la Piedra, Antonio
    Collado, Raphael
    [J]. 2020 IEEE INTERNATIONAL CONFERENCE ON INTERNET OF THINGS AND INTELLIGENCE SYSTEM (IOTAIS), 2021, : 8 - 13
  • [29] Secure and Efficient Control Transfer for IoT Devices
    Wang, Zhi
    Ding, Han
    Han, Jinsong
    Zhao, Jizhong
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
  • [30] IRIS: An embedded secure boot for IoT devices
    Cano-Quiveu, G.
    Ruiz-de-Clavijo-Vazquez, P.
    Bellido, M. J.
    Juan-Chico, J.
    Viejo-Cortes, J.
    [J]. INTERNET OF THINGS, 2023, 23