International audienceAbstract— Wireless Sensors Network (WSN) security is a major concern and many new protocols are being designed. Most of these protocols rely on cryptography, and therefore, require a Cryptographic Pseudo-Random Number Generator (CPRNG). However, designing an effcient and secure CPRNG for wireless sensor networks is not trivial since most of the common source of randomness used by standard CPRNGs are not present on a wireless sensor node. We present TinyRNG, a CPRNG for wireless sensor nodes. Our generator uses the received bit errors as one of the sources of randomness. We show that transmission bit errors on a wireless sensor network are a very good source of randomness. We demonstrate that these errors are randomly d...
Although the intrinsic variability in nanoelectronic devices has been a major obstacle and has preve...
Wireless sensor networks (WSNs) are distributed collections of sensors with limited capabilities for...
The authors wish to thanks the anonymous reviewers for their valuable comments for the improvement o...
The increasing adoption of wireless sensor networks as a flexible and inexpensive tool for the most ...
Cryptographic Pseudorandom Number Generators (CPRNG) play a very crucial role in Internet of Things ...
Wireless Sensor Networks (WSNs) are a promising technology with applications in many areas such as e...
In recent years, the considerable progress of miniaturization and the consequent increase of the e ...
Data tracking and hacking is especially dangerous in modern defence forces where classified data tra...
Data tracking and hacking is especially dangerous in modern defence forces where classified data tra...
The future security of Internet of Things is a key concern in the cyber-security field. One of the k...
This thesis presents a novel approach for generating truly random num- bers in 5G wireless communica...
This article belongs to the Section Internet of ThingsToday, medical equipment or general-purpose de...
The importance of random number generators (RNGs) to various computing applications is well understo...
This work presents a brute-force attack on an elliptic curve cryptosystem implemented on UC Berkley\...
Key management is at the heart of cryptography system designs, enabling and ensuring the overall sec...
Although the intrinsic variability in nanoelectronic devices has been a major obstacle and has preve...
Wireless sensor networks (WSNs) are distributed collections of sensors with limited capabilities for...
The authors wish to thanks the anonymous reviewers for their valuable comments for the improvement o...
The increasing adoption of wireless sensor networks as a flexible and inexpensive tool for the most ...
Cryptographic Pseudorandom Number Generators (CPRNG) play a very crucial role in Internet of Things ...
Wireless Sensor Networks (WSNs) are a promising technology with applications in many areas such as e...
In recent years, the considerable progress of miniaturization and the consequent increase of the e ...
Data tracking and hacking is especially dangerous in modern defence forces where classified data tra...
Data tracking and hacking is especially dangerous in modern defence forces where classified data tra...
The future security of Internet of Things is a key concern in the cyber-security field. One of the k...
This thesis presents a novel approach for generating truly random num- bers in 5G wireless communica...
This article belongs to the Section Internet of ThingsToday, medical equipment or general-purpose de...
The importance of random number generators (RNGs) to various computing applications is well understo...
This work presents a brute-force attack on an elliptic curve cryptosystem implemented on UC Berkley\...
Key management is at the heart of cryptography system designs, enabling and ensuring the overall sec...
Although the intrinsic variability in nanoelectronic devices has been a major obstacle and has preve...
Wireless sensor networks (WSNs) are distributed collections of sensors with limited capabilities for...
The authors wish to thanks the anonymous reviewers for their valuable comments for the improvement o...