{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,18]],"date-time":"2026-01-18T22:45:31Z","timestamp":1768776331257,"version":"3.49.0"},"reference-count":27,"publisher":"MDPI AG","issue":"19","license":[{"start":{"date-parts":[[2019,9,24]],"date-time":"2019-09-24T00:00:00Z","timestamp":1569283200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>As transmissions of data between mobile and embedded devices in multi-access edge computing (MEC) increase, data must be protected, ensuring confidentiality and integrity. These issues are usually solved with cryptographic algorithms systems, which utilize a random number generator to create seeds and keys randomly. Their role in cryptography is so important that they need to be generated securely. In this paper, a true random number generator (TRNG) utilizing FM radio signals as a source is proposed. The proposed method can generate random numbers with high entropy, increased by at least 118% and up to 431% compared to existing generators.<\/jats:p>","DOI":"10.3390\/s19194130","type":"journal-article","created":{"date-parts":[[2019,9,25]],"date-time":"2019-09-25T03:51:18Z","timestamp":1569383478000},"page":"4130","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["True Random Number Generator (TRNG) Utilizing FM Radio Signals for Mobile and Embedded Devices in Multi-Access Edge Computing"],"prefix":"10.3390","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1477-7569","authenticated-orcid":false,"given":"Kyungroul","family":"Lee","sequence":"first","affiliation":[{"name":"R&amp;BD Center for Security and Safety Industries (SSI), Soonchunhyang University, Asan, Chungnam 31538, Korea"}]},{"given":"Manhee","family":"Lee","sequence":"additional","affiliation":[{"name":"Laboratory of High Performance and Secure Computing, Department of Computer Engineering, Hannam University, Daejeon 34430, Korea"}]}],"member":"1968","published-online":{"date-parts":[[2019,9,24]]},"reference":[{"key":"ref_1","unstructured":"(2019, March 24). A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications, Available online: http:\/\/nvlpubs.nist.gov\/nistpubs\/Legacy\/SP\/nistspecialpublication800-22r1a.pdf."},{"key":"ref_2","unstructured":"(2019, March 24). Recommendation for the Entropy Sources Used for Random Bit Generation, Available online: https:\/\/csrc.nist.gov\/csrc\/media\/publications\/sp\/800-90b\/draft\/documents\/sp800-90b_second_draft.pdf."},{"key":"ref_3","unstructured":"Davies, D.W., and Price, W.L. (1989). Security for Computer Networks: An Introduction to Data Security in Teleprocessing and Electronic Funds Transfer, John Wiley & Sons. [2nd ed.]."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"12838","DOI":"10.1109\/ACCESS.2018.2799682","article-title":"TRNG (True Random Number Generator) Method Using Visible Spectrum for Secure Communication on 5G Network","volume":"6","author":"Lee","year":"2018","journal-title":"IEEE Access"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1080\/0161-119191865812","article-title":"The Efficient Generation of Cryptographic Confusion Sequences","volume":"15","author":"Ritter","year":"1991","journal-title":"Cryptologia"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"850","DOI":"10.1137\/0213053","article-title":"How to Generate Cryptographically Strong Sequences of Pseudo-Random Bits","volume":"13","author":"Blum","year":"1984","journal-title":"SIAM J. Comput."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Hennebert, C., Hicham, H., and Cedric, L. (2014, January 23\u201326). The entropy of wireless statistics. Proceedings of the European Conference on Networks and Communications, Bologna, Italy.","DOI":"10.1109\/EuCNC.2014.6882689"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Hennebert, C., Hicham, H., and Cedric, L. (2013, January 17\u201319). Entropy harvesting from physical sensors. Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks, Budapest, Hungary.","DOI":"10.1145\/2462096.2462122"},{"key":"ref_9","unstructured":"Yoo, T., and Yeom, Y. (2015, January 22). Using GPU as Hardware Random Number Generator. Proceedings of the GPU Technology Conference, Seoul, South Korea. Available online: https:\/\/docs.huihoo.com\/gputechconf\/gtc2015\/posters\/P5292-Using-GPU-as-Hardware-Random-Number-Generator.pdf."},{"key":"ref_10","unstructured":"Jun, B., and Kocher, P. (2019, March 24). The Intel Random Number Generator. Available online: http:\/\/www.csshl.net\/sites\/default\/files\/downloadable\/crypto\/intelRNG.pdf."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"615","DOI":"10.1109\/81.847868","article-title":"A noise-based IC random number generator for applications in cryptography","volume":"47","author":"Petrie","year":"2000","journal-title":"IEEE Trans. Circuits Syst. I Fundam. Theory Appl."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"403","DOI":"10.1109\/TC.2003.1190581","article-title":"A high-speed oscillator-based truly random number source for cryptographic applications on a smart card IC","volume":"52","author":"Bucci","year":"2003","journal-title":"IEEE Trans. Comput."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Bagini, V., and Bucci, M. (1999, January 12\u201313). A design of reliable true random number generator for cryptographic applications. Proceedings of the Conference on Cryptographic Hardware and Embedded Systems, Worcester, MA, USA.","DOI":"10.1007\/3-540-48059-5_18"},{"key":"ref_14","unstructured":"Dichtl, M., and Janssen, N. (2000, January 13). A high quality physical random number generator. Proceedings of the Sophia Antipolis Forum Microelectronics, Sophia Antipolis, France."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Guler, U., Ergun, S., and Dundar, G. (2010, January 12\u201315). A Digital IC Random Number Generator with Logic Gates Only. Proceedings of the IEEE International Conference on Electronics, Circuits, and Systems, Athens, Greece.","DOI":"10.1109\/ICECS.2010.5724498"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1109\/TC.2007.250627","article-title":"A provably secure true random number generator with built-in tolerance to active attacks","volume":"56","author":"Sunar","year":"2010","journal-title":"IEEE Trans. Comput."},{"key":"ref_17","unstructured":"Dichtl, M., and Golic, J.D. (2007, January 10\u201313). High speed true random number generation with logic gates only. Proceedings of the International Workshop on Cryptographic Hardware and Embedded Systems, Vienna, Austria."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Wold, K., and Petrovic, S. (2011, January 13\u201315). Behavioral Model of TRNG Based on Oscillator Rings Implemented in FPGA. Proceedings of the IEEE International Symposium on Design and Diagnostics of Electronic Circuits & Systems, Cottbus, Germany.","DOI":"10.1109\/DDECS.2011.5783072"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"617","DOI":"10.1049\/el:19920389","article-title":"Simple binary random number generator","volume":"28","author":"Bellido","year":"1992","journal-title":"Electron. Lett."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Epstein, M., Hars, L., Krasinski, R., Rosner, M., and Zheng, H. (2003, January 8\u201310). Design and implementation of a true random number generator based on digital circuit artifacts. Proceedings of the Cryptographic Hardware and Embedded Systems, Cologne, Germany.","DOI":"10.1007\/978-3-540-45238-6_13"},{"key":"ref_21","unstructured":"Vasyltsov, I., Hambardzumyan, E., Kim, Y., and Karpinskyy, B. (2008, January 10\u201313). Fast digital TRNG based on metastable ring oscillator. Proceedings of the International Workshop on Cryptographic Hardware and Embedded Systems, Washington, DC, USA."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Suresh, V.B., and Burleson, W.P. (2010, January 13\u201314). Entropy extraction in metastability-based TRNG. Proceedings of the IEEE International Symposium on Hardware-Oriented Security and Trust, Anaheim, CA, USA.","DOI":"10.1109\/HST.2010.5513099"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"988","DOI":"10.1049\/el.2010.0893","article-title":"Ultra-lightweight true random number generators","volume":"46","author":"Qu","year":"2010","journal-title":"Electron. Lett."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"793","DOI":"10.1109\/TSP.2004.839924","article-title":"Embeddable adc-based true random number generator for cryptographic applications exploiting nonlinear signal processing and chaos","volume":"53","author":"Callegari","year":"2005","journal-title":"IEEE Trans. Signal Process."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1016\/j.aeue.2006.05.006","article-title":"Truly random number generators based on a non-autonomous chaotic oscillator","volume":"61","author":"Ergun","year":"2007","journal-title":"Int. J. Electron. Commun."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3064006","article-title":"Efficient Multi-Factor User Authentication Protocol with Forward Secrecy for Real-Time Data Access in WSNs","volume":"1","author":"Wang","year":"2019","journal-title":"ACM Trans. Cyber Phys. Syst."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"4081","DOI":"10.1109\/TII.2018.2834351","article-title":"Measuring Two-Factor Authentication Schemes for Real-Time Data Access in Industrial Wireless Sensor Networks","volume":"14","author":"Wang","year":"2018","journal-title":"IEEE Trans. Ind. Inform."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/19\/19\/4130\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T13:23:38Z","timestamp":1760189018000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/19\/19\/4130"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9,24]]},"references-count":27,"journal-issue":{"issue":"19","published-online":{"date-parts":[[2019,10]]}},"alternative-id":["s19194130"],"URL":"https:\/\/doi.org\/10.3390\/s19194130","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,9,24]]}}}