DOI QR코드

DOI QR Code

Utilisation of IoT Systems as Entropy Source for Random Number Generation

  • Oguzhan ARSLAN (Mehmet Akif Ersoy University, Institute of Science and Technology, Computer Engineering) ;
  • Ismail KIRBAS (Mehmet Akif Ersoy University, Institute of Science and Technology, Computer Engineering)
  • Received : 2024.04.05
  • Published : 2024.04.30

Abstract

Using random numbers to represent uncertainty and unpredictability is essential in many industries. This is crucial in disciplines like computer science, cryptography, and statistics where the use of randomness helps to guarantee the security and dependability of systems and procedures. In computer science, random number generation is used to generate passwords, keys, and other security tokens as well as to add randomness to algorithms and simulations. According to recent research, the hardware random number generators used in billions of Internet of Things devices do not produce enough entropy. This article describes how raw data gathered by IoT system sensors can be used to generate random numbers for cryptography systems and also examines the results of these random numbers. The results obtained have been validated by successfully passing the FIPS 140-1 and NIST 800-22 test suites.

Keywords

Acknowledgement

This study was supported by Burdur Mehmet Akif Ersoy University Scientific Research Projects Commission. Number 0800-YL-21.

References

  1. N. Gozuacik. "Parent Based Routing Algorithm for RPL Used in IoT Networks." MSc Thesis, Istanbul Technical University, Istanbul, Turkiye (2015).
  2. M. Conti, A. Dehghantanha, K. Franke, and S. Watson. "Internet of Things security and forensics: Challenges and opportunities." Future Generation Computer Systems 78, (2018): 544-546. https://doi.org/10.1016/j.future.2017.07.060
  3. A. I. Sunny, A. Zhao, L. Li, and S. Kanteh Sakiliba. "Low-Cost IoT-Based Sensor System: A Case Study on Harsh Environmental Monitoring." Sensors 21, no.1 (2021): 214.
  4. Y. Yalman and I. Erturk. "The Use of Steganography in Ensuring Personal Information Security." uNAK Existence in the Information Age "Opportunities and Threats" Symposium 2, no. 2 (2016): 215.
  5. E. Atar, O. K. Ersoy, and L. Ozyilmaz. "Hybrid Data Compression and Optical Cryptography with Steep Matching Search Method." Journal of the Faculty of Engineering and Architecture of Gazi University 32, no. 1 (2017): 139-147.
  6. M. Yilmaz and S. Balli. "Development of an Intelligent Selection System for the Use of Data Encryption Algorithms." International Journal of Information Security Engineering 2, no. 2 (2016): 18-28.
  7. F. Maqsood, M. Ahmed, M. Mumtaz Ali, and M. Ali Shah. "Cryptography: A Comparative Analysis for Modern Techniques." International Journal of Advanced Computer Science and Applications 8, no. 6 (2017).
  8. O. G. Abood, S. Guirguis, and S. K. Guirguis. "A Survey on Cryptography Algorithms," International Journal of Scientific and Research Publications 8, no. 7 (2018).
  9. A. Coskun and u. ulker. "Development of a Cryptography Algorithm for National Information Security and Reliability Determination Against Letter Frequency Analysis." Journal of Information Technology 6, no. 2 (2013): 31.
  10. V. Tavas. "Random Number Generators Suitable for Integration." PHd Thesis, Istanbul Technical University, Istanbul, Turkiye (2011).
  11. A. S. Demirkol. "Adc Based Random Number Generator with Chaotic Oscillator Input." PHd Thesis, Istanbul Technical University, Istanbul, Turkiye (2007).
  12. M. Huang, Z. Chen, Y. Zhang, and H. Guo. "A Phase Fluctuation Based Practical Quantum Random Number Generator Scheme with Delay-Free Structure." Applied Sciences 10, no. 7 (2020): 2431.
  13. D. Yosunlu and E. Avaroglu. "Investigation of Post Processing Algorithms." Journal of Computer Science and Technology 1, no. 2 (2020): 66-73.
  14. E. A. Luengo, M. B. L. Cerna, L. J. G. Villalba, D. Hurley-Smith, and J. Hernandez-Castro. "Critical Analysis of Hypothesis Tests in Federal Information Processing Standard (140-2)." Entropy 24, no. 5 (2022): 613.
  15. F. Ozkaynak. "Cryptological Random Number Generators." Turkey Informatics Foundation Journal of Science and Engineering 8, no. 2, (2016): 37-45.
  16. Rehman, A. U., Hussain, M., Idress, M., Munawar, A., Attique, M., Anwar, F., and Ahmad, M. "E-cultivation using the IoT with Adafruit cloud." International Journal of Advance and applied Sciences 7, no. 9 (2020): 75-82.
  17. H. ucgun, F. Gombeci, U. Yuzgec, and N. Yalcin. "Real-time Indoor Air Quality Monitoring System with IoT Based Platform." Bilecik Seyh Edebali University Journal of Science and Technology 7, no. 1 (2020): 370-381.
  18. U. Ansari, A. K. Chaudhary, and S. Verma. "True Random Number Generator (TRNG) Using Sensors for Low Cost IoT Applications." 2022 International Conference on Communication, Computing and Internet of Things (IC3IoT), (2022): 1-6.
  19. Y. Genc and S. Arslan Tuncer, "Human Movements Based True Random Number Generation." Bitlis Eren University Journal of Science and Technology 8, no. 1 (2019): 261-269.
  20. S. N. Yasar, F. Ceren Dikici, E. Tanyildizi, and E. Karakose. "Design of a Generator Based on Middle Square and SHA3 Algorithm for Randomisation Requirements in Science and Engineering Studies." Firat University Journal of Science and Technology 33, no. 1 (2021): 81-91.
  21. I. Te Chen. "Random numbers generated from audio and video sources." Mathematical problems in engineering. (2013).
  22. T. Etem and T. Kaya. "Trivium-Linear Conjugate Generator Based Bit Generation for Image Encryption." Firat University Journal of Engineering Science 32, no. 1, (2020): 287-294.
  23. F. Ozkaynak, H. I. Ozdemir, and A. B. Ozer. "Cryptographic random number generator for mobile devices." 2015 23rd Signal Processing Communication Application Conference, (2015): 1733-1736.
  24. Z. E. Sezgin. "Tesla Coil." Maltepe University, (2021).