2020
DOI: 10.1109/access.2020.2972958
|View full text |Cite
|
Sign up to set email alerts
|

Random Number Generator Using Sensors for Drone

Abstract: In recent years, drones have been widely used in many areas such as farming, movie making, surveillance and delivery. So, there is a need to protect these drones against security attacks including hijacking, spying and theft of stored data through the utilization of security mechanisms. Cryptographic keys are needed to operate these security mechanisms, and they must be generated by using random number generators which create unpredictable and non-regenerable random numbers. However, existing random number gen… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
23
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 18 publications
(23 citation statements)
references
References 18 publications
0
23
0
Order By: Relevance
“…In experiment 10, we analyzed the performance and power consumption of the proposed solution. This kind of analyze was performed before in several papers [28,30,32]. A comparison with the results presented in these studies is difficult to achieve because both the throughput and power consumption are calculated relatively to full entropy bits generated and none of the studies presented use our entropy estimation methodology.…”
Section: Results Analysismentioning
confidence: 99%
See 3 more Smart Citations
“…In experiment 10, we analyzed the performance and power consumption of the proposed solution. This kind of analyze was performed before in several papers [28,30,32]. A comparison with the results presented in these studies is difficult to achieve because both the throughput and power consumption are calculated relatively to full entropy bits generated and none of the studies presented use our entropy estimation methodology.…”
Section: Results Analysismentioning
confidence: 99%
“…These aspects may rise doubts on the accuracy of the results obtained using other types of entropy estimation methodologies. In other papers [30][31][32][33], the authors chose to evaluate entropy after processing the raw data with different algorithms. By doing this, they can obtain overestimated values for entropy, depending on the statistical properties of the used algorithms.…”
Section: Results Analysismentioning
confidence: 99%
See 2 more Smart Citations
“…As a random key, a chaotic sequence can be used, which can produce same encryption effect as first time, and it cannot, in principle, be broken [5]. In the field of information security, chaotic encryption technology has thus been widely used, especially in the field of image encryption [6] [7]. The technology for image scrambling (shuffling) is to enhance the robustness of the hidden carrier by rearranging the matrix of the image pixel and removing the image matrix association [8].…”
Section: -Introductionmentioning
confidence: 99%