VHDL Programming for Secure True Random Number Generators in IoT Security

Authors

  • Kazi Kutubuddin Sayyad Liyakat

Keywords:

IoT, Malicious, Security, True random number generator, VHDL

Abstract

Internet of Things (IoT) is rapidly expanding, connecting billions of devices and generating vast amounts of data. This interconnectedness, while offering unprecedented opportunities, presents a significant challenge: security. Protecting sensitive IoT data from malicious actors requires robust cryptographic solutions, and at the heart of these solutions lays a reliable source of randomness: the True Random Number Generator (TRNG). Traditional Pseudo-Random Number Generators (PRNGs), while efficient, are deterministic and therefore predictable, making them vulnerable to attacks. TRNGs, on the other hand, leverage physical phenomena to generate truly unpredictable sequences. This article explores the implementation of TRNGs using Very High-Speed Integrated Circuit Hardware Description Language (VHDL), highlighting its potential to bolster security in resource-constrained IoT devices. As the IoT continues to permeate our lives, security remains a paramount concern. VHDL provides a powerful platform for implementing TRNGs that can significantly enhance the security of IoT devices. By leveraging the flexibility and hardware optimization capabilities of VHDL, developers can create robust and efficient TRNG designs that meet the unique challenges of the IoT ecosystem. Embracing VHDL-based TRNGs is a critical step towards building a more secure and trustworthy future for the Internet of Things. Future research directions include exploring novel noise sources, developing more efficient post-processing techniques, and designing TRNGs that are inherently resistant to various attacks.

References

M. Jadhav and P. M. Nerkar, “FPGA-based finger vein recognition system for personal verification,” International Journal of Engineering Research and General Science, vol. 3, no. 4, Jan. 2015. Available at: https://www.pnrsolution.org/Datacenter/Vol3/Issue4/205.pdf

S. Kulkarni, P. M. Nerkar, “Retina image decomposition using variational mode decomposition", International Research Journal of Engineering and Technology, vol 5, no. 6, June 2018. Available at: https://www.irjet.net/archives/V5/i6/IRJET-V5I6471.pdf

S. B. Khadake, S. Kawade, S. V. Moholkar, and M. M. Pawar, “A review of 6G technologies and its advantages over 5G technology,” Techno-societal 2022, Springer International Publishing, pp. 1043–1051, Sep. 2023, doi: https://doi.org/10.1007/978-3-031-34644-6_107

V. J. Patil, S. B. Khadake, D. A. Tamboli, H. M. Mallad, S. M. Takpere and V. A. Sawant, "Review of AI in power electronics and drive systems," 2024 3rd International Conference on Power Electronics and IoT Applications in Renewable Energy and its Control (PARC), Mathura, India, 2024, pp. 94-99, doi: https://doi.org/10.1109/parc59193.2024.10486488

V. J. Patil, S. B. Khadake, D. A. Tamboli, H. M. Mallad, S. M. Takpere and V. A. Sawant, "A Comprehensive Analysis of Artificial Intelligence Integration in Electrical Engineering," 2024 5th International Conference on Mobile Computing and Sustainable Informatics (ICMCSI), Lalitpur, Nepal, 2024, pp. 484-491, doi: https://doi.org/10.1109/ICMCSI61536.2024.00076

S. S. Magar, A. S. Sugandhi, S. H. Pawar, S. B. Khadake, and H. M. Mallad, “Harnessing wind vibration, a novel approach towards electric energy generation - Review,” International Journal of Advanced Research in Science, Communication and Technology, vol. 4, no. 2, pp. 73–82, Oct. 2024, doi: https://doi.org/10.48175/ijarsct-19811

K. K. Sayyad Liyakat, S. B. Khadake, A. B. Chounde, A. A. Suryagan, M. H. M. and M. R. Khadatare, "AI-Driven-IoT(AIIoT) Based Decision Making System for High-Blood Pressure Patient Healthcare Monitoring," 2024 International Conference on Sustainable Communication Networks and Application (ICSCNA), Theni, India, 2024, pp. 96-102, doi: https://doi.org/10.1109/ICSCNA63714.2024.10863954

K. Sayyad, AI-Powered-IoT (AIIoT)-based decision-making system for BP patient’s healthcare monitoring: KSK approach for BP patient healthcare monitoring., Recent Theories and Applications for Multi-Criteria Decision-Making, pp. 205-238. Available at: https://doi.org/10.4018/979-8-3693-6502-1.ch008

K. Sayyad, AI-powered IoT (AI IoT) for decision-making in smart agriculture: KSK approach for smart agriculture. In S. Hai-Jew (Ed.), Enhancing Automated Decision-Making Through AI, pp. 67-96. IGI Global Scientific Publishing. https://doi.org/10.4018/979-8-3693-6230-3.ch003

K. Sayyad, KK approach to increase resilience in the internet of things: A T-cell security concept, Analyzing Privacy and Security Difficulties in Social Media: New Challenges and Solutions (pp. 87-120). IGI Global Scientific Publishing. https://doi.org/10.4018/979-8-3693-9491-5.ch005

Published

2025-03-27

How to Cite

Kazi Kutubuddin Sayyad Liyakat. (2025). VHDL Programming for Secure True Random Number Generators in IoT Security. Research & Review: Electronics and Communication Engineering, 38–47. Retrieved from https://matjournals.net/engineering/index.php/RRECE/article/view/1573