Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2014
2014
2018
2018

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 3 publications
0
3
0
Order By: Relevance
“…They use an 8‐bit clock as random seed generator and the 8‐bit CRC of the received packets to implement rekeying. In principle, the method could be resilient to combined attacks as the randomness comes from different physical sources; however, the work in showed that such generator suffers of many design flaws. First of all, under clock tampering attack, the sequence restarts each three time steps; that is, RN ( t ) = RN ( t + 3 * m ) for any m ∈ Z and the generator becomes completely predictable; the authors propose to rekey the method every 10 time steps, but a blackhole attack and radio tampering force the generator to remain within its three values forever.…”
Section: Comparison Against Other Trngsmentioning
confidence: 99%
“…They use an 8‐bit clock as random seed generator and the 8‐bit CRC of the received packets to implement rekeying. In principle, the method could be resilient to combined attacks as the randomness comes from different physical sources; however, the work in showed that such generator suffers of many design flaws. First of all, under clock tampering attack, the sequence restarts each three time steps; that is, RN ( t ) = RN ( t + 3 * m ) for any m ∈ Z and the generator becomes completely predictable; the authors propose to rekey the method every 10 time steps, but a blackhole attack and radio tampering force the generator to remain within its three values forever.…”
Section: Comparison Against Other Trngsmentioning
confidence: 99%
“…In a related work [14], an 8-bit PRNG (i-Beam sensor) has initially been proposed that xored the current value of the time with a key, reaching a throughput of 400Mbps. However, this PRNG has revealed to have a short period, as described in [15]. TinyRNG [16] is another PRNG that combines two cipher blocks based on chaining message authentication code (CBC-MAC) and on counter mode (CTR), where the first one aims to extract the transmission of bit errors on the network as randomness sources to reseed the second cipher key.…”
Section: Introductionmentioning
confidence: 99%
“…,109, 120, 107, 126, 125, 112, 103, 114, 116, 118, 123, 98, 121, 96, 79, 78, 111, 124, 75, 122, 97, 108, 71, 100, 117, 101, 115, 66, 113,64, 127, 90, 89, 94, 83, 91, 81, 92, 95, 84, 87, 85, 82, 86, 80, 88, 77, 76, 93, 72, 74, 106, 105, 104, 69, 102, 68, 70, 99, 67, 73,65,55,58,57,44, 187, 186,49,60, 119,52,37,53,35,54, 177,56,45,62,61,40,59,10,9, 168, 167, 166,36,38, 163, 162,41,48,23,28,13,24, 155,30,29,16,21, 150,20,22,27,19, 145,17, 143, 142,15,14,43,11,1,12,39,4,7, 132,2,34, 0, 128] F2[223, 190, 249, 254, 243, 186, 233, 252, 183, 182, 247, 228, 242, 226,...…”
mentioning
confidence: 99%