scholarly journals A Novel True Random Number Generator in Near Field Communication as Memristive Wireless Power Transmission

J ◽  
2021 ◽  
Vol 4 (4) ◽  
pp. 764-783
Author(s):  
Colin Sokol Kuka ◽  
Yihua Hu ◽  
Quan Xu ◽  
James Chandler ◽  
Mohammed Alkahtani

The security of powering systems has been a major problem over the last decade, leading to an increased interest in wireless power and data transfer. In this research paper, a new inductive Wireless Power Transfer (WPT) circuit topology has been used. In traditional WPT circuits, the inverters are used to produce an oscillation for the transmitter coils. The classic WPT system includes intrinsic energy dissipation sources due to the use of switches, necessitating the need of an extra control circuit to ensure proper switching time. Furthermore, they have limited data encryption capabilities. As a result, an unique WPT system based on memristors has been developed, eliminating the need for switches. Furthermore, because this novel topology communicates a synchronised chaotic behaviour, it becomes highly beneficial. This circuit may be used in Near Field Communication (NFC), where chaotic true random numbers (TRNG) can be generated to increase security. The results of simulations indicate the functioning of the Memristor-based WPT (M-WPT) and its ability to generate random numbers. We experimentally proved the chaotic behaviour of the circuit and statistically demonstrated the development of the TRNG, using an Arduino board and the Chua circuit to build the M-WPT circuit.

2015 ◽  
Vol 25 (30) ◽  
pp. 4761-4767 ◽  
Author(s):  
Jeonghyun Kim ◽  
Anthony Banks ◽  
Zhaoqian Xie ◽  
Seung Yun Heo ◽  
Philipp Gutruf ◽  
...  

Author(s):  
Jayapandian N.

The main objective of this chapter is to discuss various security threats and solution in business transactions. The basic working principle and theoretical background of near field communication (NFC) technology is discussed. A component of NFC communication section is to be discussed on various NFC operation modes and RFID tags. NFC technology is used in various fields such as electronic toll collection and e-payment collection for shopping. This device-to-device payment system is facing major security issues. This NFC communication data is transferred from one terminal to another terminal by using short-range radio frequency. Data hackers try to access this radio frequency and attack the business transaction. This hybrid encryption algorithm is used to solve business transaction data security issues. This chapter deals with both key encryption and data encryption processes.


Sign in / Sign up

Export Citation Format

Share Document