Genetic programming-based pseudorandom number generator for wireless identification and sensing platform

Genetic programming-based pseudorandom number generator for wireless identification and sensing platform

The need for security in lightweight devices such as radio frequency identification tags is increasing anda pseudorandom number generator (PRNG) constitutes an essential part of the authentication protocols that providesecurity. The main aim of this research is to produce a lightweight PRNG for cryptographic applications in wirelessidentification and sensing platform family devices, and other related lightweight devices. This PRNG is produced withgenetic programming methods using entropy calculation as the fitness function, and it is tested with the NIST statisticaltest suite. Moreover, it satisfies the requirements of the EPCGen2 standards.

___

  • Smith JR, Sample AP, Powledge PS, Roy S, Mamishev A. A wirelessly-powered platform for sensing and computation. Lect Notes Comp Sci 2006; 495-506.
  • Sample A, Yeager D., Powledge P, Smith J. Design of a passively-powered, programmable sensing platform for UHF RFID systems. In: IEEE International Conference on RFID; 26–28 March 2007; Grapevine, TX, USA. New York, NY, USA: IEEE. pp. 149-156.
  • Chae HJ, Salajegheh M, Yeager DJ, Smith JR, Fu K. Maximalist cryptography and computation on the WISP UHF RFID tag. In: Smith JR, editor. Wirelessly Powered Sensor Networks and Computational RFID. New York, NY, USA: Springer, 2013. pp. 175-187.
  • Stipčević M, Koç ÇK. True random number generators. In: Koç ÇK, editor. Open Problems in Mathematics and Computational Science. Berlin, Germany: Springer, 2014. pp. 275-315.
  • Park SK, Miller KW. Random number generators: good ones are hard to find. Commun ACM 1988; 31: 1192-1201.
  • Bassham LE, Rukhin AL, Soto J, Nechvatal JR, Smid ME, Leigh SD, Levenson M, Vangel M, Heckert NA, Banks DL. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications. Gaithersburg, MD, USA: National Institute of Standards and Technology, 2010.
  • Barker E, Kelsey J. Recommendation for Random Number Generation Using Deterministic Random Bit Generators. NIST Special Publication 800-90A. Gaithersburg, MD, USA: NIST, 2014.
  • Turan MS, Barker E, Kelsey J, McKay KA, Baish ML, Boyle M. Recommendation for the entropy Sources Used for Random Bit Generation. NIST Special Publication 800-90B Second Draft. Gaithersburg, MD, USA: NIST, 2016.
  • Barker E, Kelsey J. Recommendation for Random Bit Generator (RBG) Constructions. NIST Special Publication 800-90C Second Draft. Gaithersburg, MD, USA: NIST, 2016.
  • Koza JR. Genetic programming as a means for programming computers by natural selection. Stat Comput 1994; 4: 87-112.
  • Koza JR. Genetically breeding populations of computer programs to solve problems in artificial intelligence. Proc Int C Tools Art 1990; 1: 819-827.
  • Koza JR. Evolving a computer program to generate random numbers using the genetic programming paradigm. In: Fourth International Conference on Genetic Algorithms; July 1991; San Diego, CA, USA. pp. 37-44.
  • Tomassini M, Sipper M, Zolla M, Perrenoud M. Generating high-quality random numbers in parallel by cellular automata. Future Gener Comp Sy 1999; 16: 291-305.
  • Chlumecky M, Buchtele J, Richta K. Application of random number generators in genetic algorithms to improve rainfall-runoff modelling. J Hydro 2017; 553: 350-355.
  • Çabuk UC, Aydın Ö, Dalkılıç G. A random number generator for lightweight authentication protocols: xorshiftR+. Turk J Electr Eng Co 2017; 25: 4818-4828.
  • Ibrahim A, Dalkılıç G. An advanced encryption standard powered mutual authentication protocol based on elliptic curve cryptography for RFID, proven on WISP. J Sensors 2017; 2017: 2367312.
  • Knežević K. Combinatorial optimization in cryptography. In: 40th International Convention on Information and Communication Technology, Electronics and Microelectronics; 22–26 May 2017; Opatija, Croatia. pp. 1324-1330.
  • Challa S, Wazid M, Das AK, Khan MK. Authentication protocols for implantable medical devices: taxonomy, analysis and future directions. IEEE Consum Electr Mag. 2018; 7: 57-65.
  • Hernández-Castro JC, Isasi P, Seznec A. On the design of state-of-the-art pseudorandom number generators by means of genetic programming. In: Congress on Evolutionary Computation; 19–23 June 2004; Portland, OR, USA. pp. 1510-1516.
  • Sıs M, Ríha Z. Faster randomness testing with the NIST statistical test suite. In: Fourth International Conference on Security, Privacy, and Applied Cryptography Engineering; 18–22 October 2014; Pune, India. pp. 272-284.
  • Peris-Lopez P, Hernandez-Castro JC, Estevez-Tapiador JM, Ribagorda A. LAMED - A PRNG for EPC Class-1 Generation-2 RFID specification. Comp Stand Inter 2009; 31: 88-97.
  • Khan FU, Bhatia S. A novel approach to genetic algorithm based cryptography. Int J Res Comp Sci 2012; 2: 2249-8265.
  • Leonard P, Jackson D. Efficient evolution of high entropy RNGs using single node genetic programming. In: Annual Conference on Genetic and Evolutionary Computation; 11–15 July 2015; Madrid, Spain. pp. 1071-1078.
  • Picek S, Sisejkovic D, Rozic V, Yang B, Jakobovic D, Mentens N. Evolving cryptographic pseudorandom number generators. Lect Notes Comp Sci 2016; 9921: 613-622.
  • Shannon CE. A mathematical theory of communication. Bell Syst Tech J 1948; 27: 396-399.
  • Miller BL, Goldberg DE. Genetic algorithms, tournament selection, and the effects of noise. P Soc Photo-Opt Ins 1995; 9: 193-212.
  • GS1. EPCTM Radio-Frequency Identity Protocols Generation-2 UHF RFID Specification for RFID Air Interface. Lawrenceville, NJ, USA: GS1 EPCglobal Inc., 2013.
  • Feldhofer M, Dominikus S, Wolkerstorfer J. Strong authentication for RFID systems using the AES algorithm. In: International Workshop on Cryptographic Hardware and Embedded Systems; 11–13 August 2004; Cambridge, MA, USA. pp. 357-370.
  • Özcanhan MH, Dalkılıç G. Mersenne twister-based RFID authentication protocol. Turk J Electr Eng Co 2015; 23: 231–254.