DC ElementWertSprache
dc.contributor.authorKietzmann, Peter-
dc.contributor.authorSchmidt, Thomas C.-
dc.contributor.authorWählisch, Matthias-
dc.date.accessioned2021-03-31T15:21:13Z-
dc.date.available2021-03-31T15:21:13Z-
dc.date.issued2021-07-13-
dc.identifier.issn0360-0300en_US
dc.identifier.urihttp://hdl.handle.net/20.500.12738/10763-
dc.description.abstractRandom numbers are an essential input to many functions on the Internet of Things (IoT). Common use cases of randomness range from low-level packet transmission to advanced algorithms of artificial intelligence as well as security and trust, which heavily rely on unpredictable random sources. In the constrained IoT, though, unpredictable random sources are a challenging desire due to limited resources, deterministic real-time operations, and frequent lack of a user interface. In this paper, we revisit the generation of randomness from the perspective of an IoT operating system (OS) that needs to support general purpose or crypto-secure random numbers. We analyse the potential attack surface, derive common requirements, and discuss the potentials and shortcomings of current IoT OSs. A systematic evaluation of current IoT hardware components and popular software generators based on well-established test suits and on experiments for measuring performance give rise to a set of clear recommendations on how to build such a random subsystem and which generators to use.en_US
dc.description.sponsorshipBundesministerium für Bildung und Forschungen_US
dc.language.isoen_USen_US
dc.publisherAssociation for Computing Machineryen_US
dc.relation.ispartofACM computing surveysen_US
dc.subjectComputer Scienceen_US
dc.subjectCryptography and Securityen_US
dc.subject.ddc004: Informatiken_US
dc.titleA Guideline on Pseudorandom Number Generation (PRNG) in the IoTen_US
dc.typeArticleen_US
tuhh.container.endpage112:38en_US
tuhh.container.issue4en_US
tuhh.container.startpage112:1en_US
tuhh.container.volume56en_US
tuhh.oai.showtrueen_US
tuhh.publication.instituteFakultät Technik und Informatiken_US
tuhh.publication.instituteDepartment Informatiken_US
tuhh.publisher.doi10.1145/3453159-
tuhh.publisher.urlhttp://arxiv.org/abs/2007.11839v2-
tuhh.relation.ispartofseriesnumberarticle number : 112. Printversion erscheint: Jul-2022. Preprint: http://arxiv.org/abs/2007.11839v2. Verlagsversion: https://doi.org/10.1145/3453159.en_US
tuhh.type.opus(wissenschaftlicher) Artikel-
dc.relation.projectVerbundprojekt: Privacy-Integrated design and Validation in the constrained IoT - PIVOT; Teilvorhaben: Eingebettete Sicherheit für Inhaltsprojekteen_US
dc.type.casraiJournal Article-
dc.type.diniarticle-
dc.type.driverarticle-
dc.type.statusinfo:eu-repo/semantics/publishedVersionen_US
dcterms.DCMITypeText-
item.creatorGNDKietzmann, Peter-
item.creatorGNDSchmidt, Thomas C.-
item.creatorGNDWählisch, Matthias-
item.fulltextNo Fulltext-
item.creatorOrcidKietzmann, Peter-
item.creatorOrcidSchmidt, Thomas C.-
item.creatorOrcidWählisch, Matthias-
item.grantfulltextnone-
item.cerifentitytypePublications-
item.languageiso639-1en_US-
item.openairecristypehttp://purl.org/coar/resource_type/c_6501-
item.openairetypeArticle-
crisitem.author.deptDepartment Informatik-
crisitem.author.deptDepartment Informatik-
crisitem.author.orcid0000-0002-0956-7885-
crisitem.author.parentorgFakultät Technik und Informatik-
crisitem.author.parentorgFakultät Technik und Informatik-
crisitem.project.funderBundesministerium für Bildung und Forschung-
Enthalten in den Sammlungen:Publications without full text
Zur Kurzanzeige

Seitenansichten

108
checked on 27.12.2024

Google ScholarTM

Prüfe

HAW Katalog

Prüfe

Volltext ergänzen

Feedback zu diesem Datensatz


Alle Ressourcen in diesem Repository sind urheberrechtlich geschützt.