In recent years, the considerable progress of miniaturization and the consequent increase of the e ciency of digital circuits has allowed a great di usion of the wireless sensor network technology. This has led to the growth of applications and protocols for applying these networks to several scenarios, such as the military one, where it is essential to deploy security protocols in order to prevent opponents from accessing the information exchanged among sensor nodes. This paper analyzes security issues of data processed by the WSN and describes a system able to generate sequences of random numbers, which can be used by security algorithms and protocols. The proposed True Random Number Generator (TRNG) exploits measurements obtained from sensor nodes, in order to allow every node to produce random data upon request, without involving a trusted third party. The proposed TRNG behavior has been tested by carrying out the NIST tests, and the obtained experimental results indicate the high degree of randomness of the produced numbers.

Gaglio, V., De Paola, A., Ortolani, M., Lo Re, G. (2010). A TRNG Exploiting Multi-Source Physical Data. In Proceedings of the 6th ACM workshop on QoS and security for wireless and mobile networks (pp.82-89). New York : ACM [10.1145/1868630.1868646].

A TRNG Exploiting Multi-Source Physical Data

DE PAOLA, Alessandra;ORTOLANI, Marco;LO RE, Giuseppe
2010-01-01

Abstract

In recent years, the considerable progress of miniaturization and the consequent increase of the e ciency of digital circuits has allowed a great di usion of the wireless sensor network technology. This has led to the growth of applications and protocols for applying these networks to several scenarios, such as the military one, where it is essential to deploy security protocols in order to prevent opponents from accessing the information exchanged among sensor nodes. This paper analyzes security issues of data processed by the WSN and describes a system able to generate sequences of random numbers, which can be used by security algorithms and protocols. The proposed True Random Number Generator (TRNG) exploits measurements obtained from sensor nodes, in order to allow every node to produce random data upon request, without involving a trusted third party. The proposed TRNG behavior has been tested by carrying out the NIST tests, and the obtained experimental results indicate the high degree of randomness of the produced numbers.
ott-2010
6th ACM workshop on QoS and security for wireless and mobile networks (Q2SWinet'10)
Bodrum, Turkey
October 20–21, 2010
2010
8
Gaglio, V., De Paola, A., Ortolani, M., Lo Re, G. (2010). A TRNG Exploiting Multi-Source Physical Data. In Proceedings of the 6th ACM workshop on QoS and security for wireless and mobile networks (pp.82-89). New York : ACM [10.1145/1868630.1868646].
Proceedings (atti dei congressi)
Gaglio, V; De Paola, A; Ortolani, M; Lo Re, G
File in questo prodotto:
File Dimensione Formato  
A TRNG Exploiting Multi-Source Physical Data.pdf

Solo gestori archvio

Descrizione: articolo principale + front matter + indice
Dimensione 1.72 MB
Formato Adobe PDF
1.72 MB Adobe PDF   Visualizza/Apri   Richiedi una copia

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/10447/53335
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 2
  • ???jsp.display-item.citation.isi??? 6
social impact