<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Construction of a Stable System of Interaction of IoT Devices in a Smart Home using a Generator of Pseudo- random Numbers⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Svitlana Poperehnyak</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oleh Bakaiev</string-name>
          <email>oleg.bakaiev@gmail.com</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Yurii Shevchuk</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>DataArt</institution>
          ,
          <addr-line>3530 Carol Ln, Northbrook, 60062 Illinois</addr-line>
          ,
          <country country="US">USA</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Institute of Software Systems of NAS of Ukraine</institution>
          ,
          <addr-line>40 Academician Glushkov ave., 03187 Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute</institution>
          ,”
          <addr-line>37 Beresteiskyi ave., 03056 Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>349</fpage>
      <lpage>362</lpage>
      <abstract>
        <p>The article examines the areas of application of the Internet of Things, provides their classification, and considers various approaches to the categorization of IoT areas. The main attention in the work is paid to the functioning of the “Smart Home” system, its advantages and disadvantages are highlighted. In the paper, a detailed analysis of existing and promising solutions for using a pseudo-random number generator in IoT devices is carried out and the use of a pseudo-random number generator in IoT devices in a smart home is substantiated. The use of a pseudo-random number generator helps to solve the problem of resource management and simultaneous access to resources. For example, with a large number of devices in the network (lighting, cameras, sensors), randomly selected time intervals for data transmission can avoid conflicts and achieve network load balance, reducing the probability of overloading. The work presented a scheme for describing the interaction of devices, sensors, and the central control unit in a smart home with a generator of pseudo-random numbers. An improved mathematical model of the functioning of the smart home system was proposed. The model of the optimization problem proposed in the work is focused on improving the information transfer process by introducing an artificial delay, which allows to reduce the number of errors and increases the speed of data transfer. The created model takes into account the resource limitations of the pseudo-random number generator, which allows for its efficient operation with limited resources. The paper proposes the concept of building a stable system of interaction of IoT devices in a smart home, which is based on the use of a high-quality generator of pseudo-random numbers, which ensures the security of data transmission in the network and, if necessary, creates a random delay in data transmission, which can be useful for prevention of conflicts during data transmission between sensors.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Internet of Things</kwd>
        <kwd>IoT devices</kwd>
        <kwd>smart home</kwd>
        <kwd>pseudorandom number generator</kwd>
        <kwd>devices with limited computing resources</kwd>
        <kwd>mathematical model</kwd>
        <kwd>multi-criteria analysis</kwd>
        <kwd>personal data protection</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>The Internet of Things (IoT) has rapidly evolved, enabling seamless communication between
interconnected devices across various domains, including healthcare, industrial automation, smart
cities, and home automation. Among these, the Smart Home concept has gained significant
attention due to its potential to enhance convenience, security, and energy efficiency. However, as
the number of connected devices in a smart home increases, challenges related to resource
management, data transmission efficiency, and network stability become more pronounced.</p>
      <p>
        One of the critical challenges in IoT-based smart home systems is simultaneous access to
resources, where multiple devices—such as lighting systems, security cameras, and environmental
sensors—compete for bandwidth, leading to potential data conflicts and network congestion [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. To
address this issue, the implementation of a pseudo-random number generator (PRNG) has emerged
as an effective solution for optimizing communication protocols, managing resource allocation, and
enhancing data security.
      </p>
      <p>
        In addition, this study incorporates multi-criteria optimization methods to select the most
effective information security measures in IoT-based smart home systems [
        <xref ref-type="bibr" rid="ref2 ref3 ref4">2–4</xref>
        ]. The optimization
process considers three key criteria: effectiveness (encryption speed, reliability, and attack
detection capabilities), cost (hardware expenses, energy consumption, and computational
resources), and compatibility with resource-constrained IoT devices. These methods are applied to
optimize encryption algorithms, authentication mechanisms, and secure communication channels
while minimizing resource consumption.
      </p>
    </sec>
    <sec id="sec-2">
      <title>2. Overview of the subject area of application</title>
      <sec id="sec-2-1">
        <title>2.1. Fields of application of IoT</title>
        <p>Let’s look at the different types of fields that can benefit from the Internet of Things revolution. An
outline of typical and potential fields, including health care, intelligent energy, intelligent
automotive industry, industrial automation, etc., is shown in Fig. 1.</p>
        <p>
          The areas of IoT were classified differently depending on the scope of functions, the number of
devices required for deployment in comparison with reliability, the level of use, and other
indicators [
          <xref ref-type="bibr" rid="ref5 ref6 ref7">5–7</xref>
          ], which are shown in Table 1.
        </p>
        <p>
          Among the wide range of IoT use cases, the market is moving towards two key categories,
namely mass IoT and critical IoT [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ]. In mass IoT, a large number of low-cost, low-power devices
typically emit a small amount of latency-free data. Devices need to send reports to the cloud
regularly, so they need a smooth connection and good coverage.
Applications of the mass Internet of Things include the smart home, intelligent agriculture, asset
management, and smart metering. In contrast, mission-critical IoT applications have very high
requirements for reliability, availability, and low latency.
        </p>
        <p>Depending on the scope of use and adaptation of the relevant IoT sphere, they are divided into
four levels of applications: infrastructure level, organizational level, individual level, and complex
level. At the infrastructure level, areas such as smart cities, smart energy, smart tourism, and others
are located where they, in turn, can create a new level of the ecosystem. Industrial Internet,
intelligent agriculture, retail trade, and others belong to the organizational level since such
programs are designed to automate the work of the organization.</p>
        <sec id="sec-2-1-1">
          <title>Realtime</title>
        </sec>
        <sec id="sec-2-1-2">
          <title>Realtime</title>
        </sec>
        <sec id="sec-2-1-3">
          <title>Realtime</title>
        </sec>
        <sec id="sec-2-1-4">
          <title>Realtime</title>
        </sec>
        <sec id="sec-2-1-5">
          <title>Intermittent</title>
        </sec>
        <sec id="sec-2-1-6">
          <title>Intermittent</title>
        </sec>
        <sec id="sec-2-1-7">
          <title>Realtime</title>
        </sec>
        <sec id="sec-2-1-8">
          <title>Realtime</title>
          <p>
            IoT industry
Smart Home [
            <xref ref-type="bibr" rid="ref8">8</xref>
            ]
Smart City [
            <xref ref-type="bibr" rid="ref9">9</xref>
            ]
Smart Energy
IoT Automotive
Remote surgery
          </p>
        </sec>
        <sec id="sec-2-1-9">
          <title>Retail Wearable Remote consultancy Stream data Gaming, AR, and VR Stream/Massive data</title>
        </sec>
        <sec id="sec-2-1-10">
          <title>Smart Agriculture</title>
        </sec>
        <sec id="sec-2-1-11">
          <title>Historical data</title>
          <p>Industrial Internet</p>
        </sec>
        <sec id="sec-2-1-12">
          <title>Stream/Massive data</title>
          <p>Tactile Internet</p>
        </sec>
        <sec id="sec-2-1-13">
          <title>Stream</title>
          <p>It is quite obvious that applications that fall under the individual level category include smart
homes, games, wearable devices, and so on.</p>
          <p>Several fields have a broader scope and can encompass all levels, including medicine and
healthcare, automotive, education, and others. Table 1 presents a focused categorization of various
IoT domains, while Table 2 highlights the characteristics of these well-established IoT areas.
However, several fields have a wider scope and can cover all levels, such as medicine and
healthcare, automotive, education, and others, see Table 1, which shows a one-sided categorization
of different IoT fields, while Table 2 shows the characteristics of these already known areas of IoT.</p>
        </sec>
        <sec id="sec-2-1-14">
          <title>Data type</title>
        </sec>
        <sec id="sec-2-1-15">
          <title>Feedback</title>
        </sec>
        <sec id="sec-2-1-16">
          <title>Stream/Historical data Realtime</title>
        </sec>
        <sec id="sec-2-1-17">
          <title>Stream/Massive data</title>
        </sec>
        <sec id="sec-2-1-18">
          <title>Realtime</title>
        </sec>
        <sec id="sec-2-1-19">
          <title>Stream/Massive data</title>
        </sec>
        <sec id="sec-2-1-20">
          <title>Stream data</title>
        </sec>
        <sec id="sec-2-1-21">
          <title>Stream/Massive data Realtime/ Intermittent 1 ms – 10 mins</title>
          <p>










</p>
        </sec>
      </sec>
      <sec id="sec-2-2">
        <title>2.2. Smart Home</title>
        <p>A “smart home” is a modern type of residential building, organized for people to live with the help
of automation and high-tech devices. A “smart” house should be understood as a system that
ensures safety, comfort, and resource-saving for all users.</p>
        <p>
          A smart home based on the Internet of Things uses both local (but limited) storage and
processing devices (for example, a gateway or concentrator) and cloud infrastructure [
          <xref ref-type="bibr" rid="ref10 ref11">10, 11</xref>
          ]. As
peripheral computing increases, performance is expected to improve significantly as operations do
not require large computing resources. The gain will be in delays, load balancing, traffic reduction,
and progressive resource utilization.
        </p>
        <p>The “Smart Home” system has pros and cons that can play an important role in the installation
of the system, let’s consider them. Similar to other devices, the Smart Home system offers several
advantages that make it worth installing. These include:</p>
        <p>Security. The system provides comprehensive control over the premises, sending
notifications in case of unauthorized access. In emergencies, the Smart Home system will
attempt to prevent incidents, such as fires.</p>
        <p>Easy to use. The entire system is managed through a single device, typically a mobile
phone.</p>
        <p>Flexible settings. The system allows you to tailor device settings to your preferences and
modify their functions as needed. You can also add new devices to the system at any time.
Economy. A smart home helps lower utility bills by automatically turning off devices that
aren’t in use. This reduces the load on the electrical grid and decreases energy
consumption. Savings can be as high as 40% on lighting and 30% on heating.</p>
        <p>Automation. The majority of household items can be integrated into the Smart Home
system, allowing for automated control. This significantly saves time.</p>
        <p>Design. All system components, including buttons, thermostats, sensors, sockets, and
switches, feature a modern aesthetic that seamlessly complements any interior.</p>
        <p>The concept of “Smart home” means that housing must be equipped and designed so that all the
services present, with optimal service organization, can interact with each other without great
costs and complications. However, the “Smart Home” system also has its drawbacks, such as:
Price. Although the system primarily consists of basic sensors and cameras, its price is quite
high. It typically takes at least five years to recoup the investment in a Smart Home system.
Difficulty in designing the system. A significant lack of qualified specialists in the field of
electronics, programming, and design is considered a problem. Also lack high technical
capabilities and experience.</p>
        <p>Service. Like any equipment, the system can malfunction. When this occurs, only
experienced technicians can resolve the issue, and finding such professionals can be
challenging. Additionally, the failure of one component can affect the operation of other
connected devices.</p>
        <p>Limited resources. Limited resources of IoT devices mean that these devices have limited
capabilities in terms of computing power, memory, and power consumption. This can
significantly limit their ability to process data and interact with other devices in the IoT
network.</p>
        <p>Security issues. This issue is identified in the following manner: an increase in the number
of connected devices indicates that it can increase the risk of hacking and cyber-attacks on
the system, which leads to the leakage of the owner’s confidential information and taking
control of another person.</p>
        <p>Installation. The system is conductive, so it should be installed either immediately during
the repair or before it.</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Using a generator of pseudorandom numbers in IoT devices</title>
      <sec id="sec-3-1">
        <title>3.1. Justification of the use of a generator of pseudorandom numbers in IoT devices in a Smart Home</title>
        <p>Pseudorandom number generators (PRNGs) are essential components for ensuring the security and
efficient interaction of Internet of Things (IoT) devices in a smart home. The justification for their
use can be divided into several key aspects:
1. Data Security and Encryption: Encryption is required to ensure the confidentiality and
integrity of data transmitted between IoT devices. PRNGs are utilized to generate
cryptographic keys that secure data against unauthorized access.
2. Authentication and identity verification: For smart devices to interact reliably, they must go
through an authentication process. PRNGs help generate one-time passwords, tokens, or
hash values, which ensure reliable authentication of devices, preventing unauthorized
access.
3. Load distribution and synchronization: A smart home consists of many devices that can
work simultaneously. To effectively manage the load and prevent conflicts when accessing
network resources, PRNGs can be used to distribute the time or sequence of tasks
performed by devices, reducing the risk of network overload.
4. Imitation and simulation of random events: In some cases, smart homes may need to
simulate random events. For example, the accidental switching on of the light or a
temperature change creates the effect of the presence of people to scare off potential
thieves. PRNGs provide such random changes in the operation of devices.</p>
        <p>Thus, pseudo-random number generators play a key role in the safe, efficient, and adaptive
operation of IoT devices in a smart home.</p>
      </sec>
      <sec id="sec-3-2">
        <title>3.2. Analysis of existing and prospective solutions for the use of pseudorandom number generators in IoT devices</title>
        <p>The main goal of the analysis of existing and promising solutions for the use of pseudorandom
number generators in IoT devices is to study the effectiveness and productivity of software
implementations of selected algorithms for generating pseudorandom numbers and bit sequences
for building systems as part of the IoT. Recently, many review publications have been published
that address the use of various pseudorandom number generation (PRNG) and bit sequence
generation (PBSG) techniques in IoT systems [12]. Most of them deal with the basic aspects of
using PRNG for various cryptographic purposes.</p>
        <p>The work [13] considers various methods of obtaining random numbers, as well as the
prospects of their use for IoT systems. The main emphasis is on algorithms suitable for software
implementation as part of embedded software or operating systems for IoT. Special attention is
paid to the cryptographic security of the proposed solutions. The article [14] provides a detailed
analysis of problems in IoT systems that require the use of random number generators. For each
problem, the most suitable solution is offered, in connection with which the authors analyze and
evaluate in detail various methods of obtaining random and pseudo-random numbers. The
performed review can be used as a recommendation and a starting point when choosing or
developing a random number generator for a specific task for systems with limited resources. Some
reviews are dedicated to analyzing the use of PRNG and PBSG only from the point of view of
cryptography and cyber security. For instance, in [15], the authors conducted a comprehensive
review of literature focused on the development, selection, and application of pseudorandom
number generators in embedded systems with specific constraints, including IoT devices, wireless
sensor network (WSN) nodes, and radio frequency identification (RFID) devices. The article [16]
offers a review of the primary methods for generating pseudo-random numbers and their
applications in cybersecurity. It analyzes the characteristics of these methods and their uses,
particularly in cryptographic protection, cybersecurity, and within IoT systems. The methods for
assessing the quality of source sequences and numbers are examined, along with descriptions of
the primary software tools available for this purpose.</p>
        <p>Many studies have proposed practical implementations of generators for use in embedded
systems. For example, in [17], an undemanding pseudo-random number generator Arrow, which
belongs to the family of Trifork generators, is proposed. This generator is based on two
interconnected Lagging Fibonacci Generators (LFGs) with internal intermixing. The authors
suggest that it applies to a broad range of tasks in the IoT domain. The study [18] describes two
types of pseudorandom number generators: one utilizing the Bloom-Bloom-Shub (BBS) method and
the other combining Xorshift with congruent generation and permutation of pseudorandom
numbers. One option is proposed to be used for general-purpose purposes, while the other is for
IoT devices under strictly power-constrained conditions. Hardware implementations of both
methods based on FPGA programmable logic showed acceptable characteristics in terms of power
consumption and performance. However, it may not be appropriate to use FPGA as the main
platform in every IoT system. Also, the development of systems using programmable logic chips
requires special qualifications from the developer and is quite expensive.</p>
        <p>The article [19] describes a practical method of implementing a random number generator based
on available and inexpensive components. The generator is built according to a combined scheme,
where the hardware part is responsible for the formation of the entropy source based on digitized
images of unpredictable signals from the environment, and the software part performs additional
data processing of the entropy source. The authors do not provide data on the results of the
synthesis and modeling of the proposed scheme, nor do they conduct at least a statistical
evaluation of the generated sequence.</p>
        <p>Sometimes it is suggested to use quite complex and even exotic methods to build generators. For
instance, the article [20] explores the method for constructing de Braine sequence generators using
shift registers with nonlinear feedback. The method proposed by the authors makes it possible to
synthesize generators of pseudorandom numbers with sequences of maximum length for a given
bit rate of the shift register. The scheme described in the work allows you to obtain a generator but
does not provide any verification of the results of its operation or assessment of the cryptographic
reliability of the proposed solution. In the article [21], a method of constructing a generator of
pseudorandom numbers based on chaotic mappings is proposed. The quality of the obtained
random sequence is further improved by applying the modulo-reduction function and verified by a
set of mathematical and statistical tests. The encryption algorithm uses the proposed
pseudorandom number generator for the secure transmission of color images received by end devices in
the IoT network using the MQTT protocol over wireless communication channels and the Internet.</p>
        <p>In this work, the method of testing pseudo-random sequences of short length based on
twodimensional statistics was used, and the criterion for testing a bit sequence of short length, which
differs from the existing simultaneous use of several tests, which allows to obtain a more accurate
result [22, 23].</p>
      </sec>
      <sec id="sec-3-3">
        <title>3.3. Optimization of personal data protection in resilient IoT systems based on pseudo-random number generators</title>
        <p>The modern development of information technologies, in particular cyber-physical systems and the
Internet of Things (IoT), necessitates the improvement of methods for protecting personal data. In
wartime, this problem becomes even more urgent, as cybersecurity threats increase both due to the
intensification of cyberattacks and the complication of the functioning of critical infrastructures.</p>
        <p>The use of pseudo-random number generators to optimize the protection of personal data
allows the development of effective approaches to ensuring the confidentiality, integrity, and
availability of personal data while optimizing the use of resources and increasing the system’s
resistance to external threats.
During wartime, the need to protect information from unauthorized access, interception,
substitution, or analysis of traffic is especially increasing. IoT systems, which are widely used in
smart homes, are vulnerable to attacks due to:


</p>
        <p>Insufficient level of data encryption in communication channels.</p>
        <p>Lack of effective device authentication mechanisms.</p>
        <p>The ability to analyze traffic and predict device interaction.</p>
        <p>Since a smart home is an integrated network of IoT devices, the issue of protecting the personal
data of its users becomes critically important. In this context, the use of multi-criteria optimization
methods allows you to find a balance between the effectiveness of protection, performance, and
cost of system implementation.</p>
        <p>One of the key elements of protecting personal data in a smart home is the cryptographic
security of communications between IoT devices. However, traditional PRNGs may have certain
limitations, in particular, a low level of entropy or significant consumption of resources of IoT
devices. This creates the need to optimize the choice of random number generation methods, which
is consistent with multi-criteria optimization approaches.</p>
        <p>The current research question is optimizing the protection of IoT systems using a multi-criteria
approach. The analysis conducted allows us to conclude that the following approaches can be used
to improve the security system of a smart home:</p>
        <p>Optimization of pseudo-random number generation algorithms:






</p>
        <p>Analysis of PRNG resistance to cryptanalytic attacks.</p>
        <p>Selection of PRNG with high entropy and low resource consumption.</p>
        <p>Using adaptive algorithms that change generation parameters depending on the network
status.</p>
        <p>The balance between performance and protection level.</p>
        <p>Choosing encryption algorithms with minimal load on IoT devices.</p>
        <p>Optimizing the frequency of cryptographic key updates depending on the level of threats.
Reducing communication costs by dynamically changing the structure of the IoT device
network.</p>
        <p>Adapting the system to wartime conditions:</p>
        <p>Developing algorithms for backup key storage in case of system failure.</p>
        <p>Using fault-tolerant communication mechanisms that allow maintaining the functionality
of the IoT network in difficult conditions.</p>
        <p>Integration of intrusion detection methods and analysis of abnormal device behavior.
Using multi-criteria optimization to build IoT networks allows:






</p>
        <p>Optimize personal data protection algorithms, ensuring their reliability even in difficult
conditions.</p>
        <p>Create an effective pseudo-random number generation system that provides dynamic and
stable protection of IoT device communications.</p>
        <p>Balance the level of cryptographic protection with the resource capabilities of IoT devices,
which is critically important for a smart home.</p>
        <p>Ensure the flexibility and adaptability of the IoT network, which will allow it to function
even in conditions of external threats and changes in resource availability.
Thus, the use of multi-criteria optimization in building secure and resilient IoT networks
contributes to the creation of an effective personal data protection system that meets the
challenges of the modern world, particularly in wartime conditions.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Presentation of the main material</title>
      <sec id="sec-4-1">
        <title>4.1. Definition of the problem</title>
        <p>A smart home system utilizes various devices and sensors to offer convenient and efficient
management of home environments. However, challenges can arise during its development and
usage, leading to a range of potential issues.</p>
        <p>One of the challenges faced by smart homes is data security. Given that these systems collect
extensive information about the homeowner, including their schedule, habits, and personal details,
it is essential to ensure that this data remains secure from unauthorized access. Employing a
pseudorandom number generator for encryption can help safeguard this information and prevent
unauthorized disclosure.</p>
        <p>Another problem can be the unstable operation of the system. Since a smart home uses
many different devices and sensors, it can encounter problems related to incorrect connections,
equipment malfunctions, or interference between devices. Introducing an artificial delay can help
reduce the load on the system and ensure more stable operation.</p>
        <p>Resource Constraints: Many IoT devices have limited resources, such as low memory or
battery power. This can lead to data retention, device reliability, and performance issues.</p>
        <p>We will consider in detail such a drawback as the limited resources of IoT devices. Resource
limitations of IoT devices mean that these devices have limited capabilities in terms of computing
power, memory, and power consumption. This can significantly limit their ability to process data
and interact with other devices in the IoT network.</p>
        <p>In a smart home, where there are dozens and sometimes hundreds of different devices, limited
resources can become a serious problem. For example, if sensors have limited memory, they may
not store enough data for further analysis. If their computing power is limited, they may not have
enough power to perform complex algorithms.</p>
        <p>Random number generators can address this issue by enabling IoT devices to produce random
numbers for various functions, such as generating encryption keys and delaying data transmission.
This approach helps lower computational costs for data processing and enhances the security of
data transmission. However, it’s important to consider that limited device resources may result in
high computational demands for generating numerous random numbers, potentially impacting
overall system performance.</p>
        <p>Network congestion can be affected by the location of the pseudorandom number generator.</p>
        <p>The location of the pseudorandom number generator can vary based on the specific design of
the smart home system and its requirements for security and performance.</p>
        <p>The generator of pseudo-random numbers is usually located in the central control device. It is
used to generate random sequences of numbers, which are then used to generate a random data
transfer delay between sensors. The sensors receive commands from the central control device to
collect and transmit data, and they perform these tasks according to the specified parameters.</p>
      </sec>
      <sec id="sec-4-2">
        <title>4.2. Algorithm of interaction between sensors, generator of pseudorandom numbers, central control device, and IoT</title>
        <p>If the generator of pseudo-random numbers is placed in the central control device, it can be easily
controlled and provide a sufficient level of security. However, this can increase the load on the
central device and reduce the speed of interaction with the sensors.</p>
        <p>If the generator is embedded within the sensors, it can alleviate the load on the central device
and enable quicker interaction with the sensors. However, this approach may compromise system
security, as the sensors could become more susceptible to malicious attacks.
The interaction algorithm between the sensors, the generator of pseudo-random numbers, the
central control device, and IoT devices will be presented in the form of the following steps:
1. Sensors read data and transmit them to the central control device.
2. A pseudo-random number generator generates random numbers.
3. The central control device uses random numbers to generate random delays in data
transmission between sensors and IoT devices.
4. IoT devices execute commands from the central control device and send reports about their
status and executed commands to the central control device.
5. The central control device analyzes the reports from IoT devices and makes decisions on
further management of the system.
6. The central control device sends commands to IoT devices and sets data transmission
delays between sensors and IoT devices using random numbers generated by a
pseudorandom number generator.</p>
        <p>Let’s consider in more detail the components and interaction shown in Fig. 2:




</p>
        <p>Different types of sensors (for example, motion sensors, temperature sensors, humidity
sensors, smoke sensors, gas sensors, etc.) monitor the state of individual rooms or devices.
Each sensor is connected to a local node (Node), which can be, for example, a
microcontroller with a built-in Wi-Fi or Bluetooth network, or a specialized device for data
collection (for example, a Zigbee or Z-Wave hub).</p>
        <p>Local nodes are connected to a network hub (Gateway), which can be built into the central
control device or be a separate device. A gateway is used to collect data from local nodes
and transfer them to the central control device.</p>
        <p>The central control device, which acts as the brain of the system, is a centralized place for
collecting, analyzing, and processing data from various devices and sensors. This device
may have a built-in pseudo-random number generator to provide random data transmission
delays between sensors. Also, programs and control algorithms can be installed on the
central device, which allows you to control various devices depending on the data received
from the sensors.</p>
        <p>Users can receive information about the status of various systems and devices in a smart
home through mobile devices.
The generator of pseudo-random numbers can be placed both on the sensors and on the central
control device. The central control device can vary based on the specific system but is generally
considered the “brain” of a smart home. It processes data from sensors and makes decisions
regarding the management of home devices and systems.</p>
        <p>In Fig. 2, each sensor transmits data to a central control device, which processes this data and
makes decisions about managing IoT devices in the home. The generator of pseudo-random
numbers can be located both on the sensors and on the central control device and is used in
operation to ensure the randomness of the data transfer delay between the sensors.</p>
        <p>If we consider the idea of using a generator of pseudo-random numbers proposed in this paper
to ensure a random delay in data transmission between sensors, then the scheme of such
interaction is as follows (Fig. 3):
1. A pseudorandom number generator (PRNG) produces random numbers.
2. The central control device generates random time intervals using PRNG and transmits them
to the sensors.
3. Each sensor takes a random time interval and uses it to delay data transmission to the
central control device.
4. After the delay, the sensor transmits data to the central control device.
5. The central control device processes the received data and takes appropriate actions.</p>
        <p>In the given diagram (Fig. 3) of the interaction, a generator of pseudo-random numbers is used
to generate random time intervals, which are used to delay data transmission between sensors.
This helps to provide a random delay in data transmission, which can be useful in preventing data
conflicts between sensors operating in the Internet of Things network.</p>
      </sec>
      <sec id="sec-4-3">
        <title>4.3. Features of the proposed model</title>
        <p>There are different mathematical models to describe the interaction of devices, sensors, and a
central control unit in a Smart Home with a generator of pseudo-random numbers. One of them is
a model based on stochastic processes and information theory.</p>
        <p>Some leading scientists in their research use the theory of stochastic processes to describe the
interaction of management and control systems [24]. Another approach is to model the smart home
as a multi-agent system, where each device or sensor is a separate agent with its characteristics and
functionality. In such a model, agents can interact with each other and with the central control unit
using special protocols and algorithms [25]. Some models utilize a system of differential equations
to describe the dynamics of a smart home and its components. A special issue of the journal [26]
covers recent developments in dynamical systems and differential equations, including their
applications in control systems, artificial intelligence, and other areas relevant to smart homes.
Prominent researchers in this field utilize systems of differential equations in their studies to model
the dynamics of various devices and components within a smart home [27, 28].
However, the existing mathematical models of the interaction of devices, sensors, and the central
control unit in a smart home with a generator of pseudo-random numbers are usually focused on
ensuring optimal control and comfort in the home, as well as improving the quality of the
interaction of devices and systems in a smart home. However, these models usually do not take
into account the possibility of introducing an artificial delay to improve the information transfer
process.</p>
      </sec>
      <sec id="sec-4-4">
        <title>4.4. An improved mathematical model of the functioning of the smart home system</title>
        <p>Let’s examine an enhanced mathematical model for the operation of a smart home system, which,
unlike existing models, incorporates artificial delays to optimize the information transmission
process.</p>
        <p>One of the main functions of a smart home is the interaction of sensors to collect data about the
state of the premises and control their condition. To ensure the security and efficient operation of
the system, pseudo-random number generators are used to generate unique sensor identifiers and
random data transmission delays to avoid network conflicts.</p>
        <p>A mathematical model of the interaction of sensors in a smart home using a pseudorandom
number generator can be described as follows: suppose we have N sensors in a smart home, і each
sensor sends data to the central device at a time interval of Ti (in seconds). To avoid network
congestion, we want to randomly delay sending data from each sensor for a certain amount of
time.</p>
        <p>
          To do this, we can use a pseudo-random number generator to obtain a random delay Ri for each
sensor. A pseudorandom number generator can generate numbers from the range [
          <xref ref-type="bibr" rid="ref1">0,1</xref>
          ] with a
uniform distribution.
        </p>
        <p>
          Then we can randomly delay sending data from each sensor for a time corresponding to Ri ∙ T i.
That is, the delay in sending data from each sensor can be calculated using the following formula:
Delayi= Ri ∙ T i ,
(1)
where Delayi is a random delay for the ith sensor, Ri is a random number from the range [
          <xref ref-type="bibr" rid="ref1">0,1</xref>
          ], and
T i is the time interval between sending data for the ith sensor.
        </p>
        <p>Therefore, each sensor sends its data to a central device with a random delay, which can help
avoid network congestion and ensure an even flow of data.</p>
        <p>The model of sensor interaction in a smart home using a pseudorandom number generator can
be described as follows:
1. Each sensor has a unique identifier that is generated using a pseudo-random number.
2. Sensors periodically read data about the state of the premises and generate a random data
transmission delay.
3. A pseudo-random number generator is used to ensure an even distribution of data
transmission delays and avoid network collisions.
4. The data collected by the sensors are transmitted to the central system, which analyzes and
monitors the condition of the premises.</p>
        <p>Mathematically, the interaction process between sensors, devices, the central control unit, and
the pseudorandom number generator can be represented by a system of equations and inequalities,
where:
1. Sensors transmit data about the state of various systems of the house (temperature,
humidity, movement, etc.) to the central control unit.</p>
        <p>The central control unit receives data from sensors and sends control signals to devices in
the house (lighting, air conditioners, heating, etc.) to maintain the set parameters in a
comfortable mode for the residents of the house.</p>
        <p>The generator of pseudo-random sequences is used to create random delays in the
transmission of control signals to prevent resonance phenomena in the system.</p>
        <p>Mathematically, this can be described as follows. Let sensors be denoted by і, sensors by j, and
then
xi (t ) }vectors of states in time t .</p>
        <p>y j (t )


</p>
        <p>Maximum data transfer rate, which is set by the maximum data transfer rate over the
network.</p>
        <p>Minimum artificial delay, which is set by the minimum possible delay in sending data from
the sensors to the central control system.</p>
        <p>The maximum artificial delay is set by the maximum permissible delay of data transmission
from the sensors to the central control system.</p>
        <p>The following formulas can be used to introduce constraints to the problem:
where ma xtb is the maximum number of transmitted bits; mi nad is the minimum possible data
transfer delay; maxad is the maximum permissible data transmission delay.</p>
        <p>The proposed optimization model belongs to the class of linear programming problems. Based
on the conducted research, it was established that the optimal method of solving this problem is
the use of the simplex method.
Sensors
transmit
information
to
the
central
control
unit
in
the
form
x (t )=( x1 (t ) , x2 (t ) , … xn (t )) , where n is the number of sensors in the house.</p>
        <p>The central control unit receives a signal and generates a vector of control signals
u (t )=(u1 (t ) , u2 (t ) , … um (t )), where m is the number of devices in the house.</p>
        <p>Each device receives a control signal u (t ) and generates a state vector y j (t ).</p>
        <p>Let f j be the processing function of the state vector y j (t ) for each device. Then the general
state vector y (t )=[ f 1 ( y1 (t )) , f 2 ( y2 (t )) , f 3 ( y3 (t )) , … f n ( yn (t ))] , where n is the number of
devices in the house.</p>
        <p>If the goal is to improve the process of information transmission by introducing an artificial
delay, then the objective function and the system of constraints can be as follows:</p>
        <p>Target function: Improving the quality of information transmission due to the introduction of
an artificial delay. To do this, you can use the cost function, which takes into account the number
of transmitted bits and the artificial delay:</p>
        <p>min f ( x )=w1 ∙ tb + w2 ∙ ad ,
where tb is the number of transmitted bits; ad—artificial delay; w1 and w2 are weights for
transmitted bits and artificial delay, respectively.</p>
        <p>The restrictions system includes the following parameters:
tb ≤ ma xtb ,
ad ≥ mi nad , ,
ad ≤ maxad .
(2)
(3)
(4)
Building a stable system of interaction of IoT devices in a smart home based on a pseudo-random
number generator provides a high level of security, adaptability, and efficiency. Data protection,
effective resource management, and resistance to various cyber-attacks are achieved thanks to the
use of PRNG.</p>
        <p>The model of the optimization problem proposed in the work is focused on improving the
process of information transmission by introducing an artificial delay, which allows to reduce the
number of errors and increases the speed of data transmission. Also, the created model takes into
account limitations on the resources of the generator of pseudorandom numbers, which allows to
ensure its effective operation with limited resources.</p>
        <p>Thus, this model is more complex and focused on a specific goal, which allows you to achieve
better results in improving the process of information transfer and the effectiveness of the
generator of pseudo-random numbers with a limited resource.</p>
        <p>Declaration on Generative AI
While preparing this work, the authors used the AI programs Grammarly Pro to correct text
grammar and Strike Plagiarism to search for possible plagiarism. After using this tool, the authors
reviewed and edited the content as needed and took full responsibility for the publication’s content.
[12] A. Zuev, D. Karaman, Software implementation of specialized algorithms for generating
pseudorandom numbers on embedded systems platforms, Control Navig. Commun. Syst. 4
(2023) 85–90.
[13] P. Kietzmann, et al., A guideline on pseudorandom number generation (PRNG) in the IoT,</p>
        <p>ACM Computing Surveys (CSUR) 54(6) (2020) 1–38.
[14] K. Seyhan, S. Akleylek, Classification of random number generator applications in IoT: A
comprehensive taxonomy, J. Inf. Secur. Appl. 71 (2022) 103–365.
[15] A. B. Orue, et al., A review of cryptographically secure PRNGs in constrained devices for the</p>
        <p>IoT, in: Advances in Intelligent Systems and Computing, vol. 649, 2017, 672–682.
[16] M. A. Khomik, O. I. Harasymchuk, Application of generators of pseudo-random numbers and
sequences in cyber security, methods of their construction and quality assessment, Ukrainian
Sci. J. Inf. Secur. 25(3) (2023) 147–159. doi:10.18372/2410-7840.25.17940
[17] A. Orue, et al., A lightweight pseudorandom number generator for securing the Internet of</p>
        <p>Things, in: IEEE Access, vol. 5, 2017, 27800–27806.
[18] B. Paul, et al., Design and implementation of low-power high-throughput PRNGs for security
applications, in: 32nd Int. Conf. on VLSI Design and 18th Int. Conf. on Embedded Systems
(VLSID), 2019, 535–536.
[19] S. Popereshnyak, A. Raichev, The development and testing of lightweight pseudorandom
number generators, in: 16th International Conference on Computer Sciences and Information
Technologies (CSIT), 2021, 137–140.
[20] M. Miroschnyk, et al., Practical methods for de Bruijn sequences generation using non-linear
feedback shift registers, in: 14th Int. Conf. on Advanced Trends in Radioelecrtronics,
Telecommunications and Computer Eng., 2018, 1157–1161.
[21] D. A. Trujillo-Toledo, et al., Real-time RGB image encryption for IoT applications using
enhanced sequences from chaotic maps, Chaos, Solitons &amp; Fractals 153(2) (2021).
doi:10.1016/j.chaos.2021.111506
[22] V. Masol, S. Popereshnyak, Joint distribution of some statistics of random bit sequences,</p>
        <p>Cybern. Syst. Anal. 57(1) (2021) 139–145.
[23] V. Masol, S. Popereshnyak, Checking the randomness of bits disposition in local segments of
the (0, 1)-sequence, Cybern. Syst. Anal. 56(3) (2020) 513–520.
[24] S. Gao, G. Tang, Stochastic optimal control of networked control systems with control packet
dropouts, Control Theor. Technol. (2021) 2139–2156.
[25] B.-Q. Huang, Y.-L. Song, X.-C. Chen, Multi-agent Systems for smart home control: A review of</p>
        <p>Applications and challenges, Sensors 17(9) (2017) 21–35.
[26] Advances in Dynamical Systems, Differential equations, and their applications. URL:
https://www.mdpi.com/journal/mathematics/special_issues/Dyn_Syst_Differ_Equ
[27] S. Fortmann-Roe, G. Bellinger, The mathematics of modeling: Differential equations and
system dynamics, systems thinking &amp; modelling. URL:
https://realkm.com/2017/11/28/themathematics-of-modeling-differential-equations-and-system-dynamics-systems-thinkingmodelling-series/
[28] Mathematical modeling of dynamic systems. URL:
https://skedbooks.com/books/controlsystems-1/mathematical-modeling-of-dynamic-systems/#google_vignette</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>V.</given-names>
             
            <surname>Sokolov</surname>
          </string-name>
          , et al.,
          <article-title>Method for increasing the various sources data consistency for IoT sensors</article-title>
          ,
          <source>in: IEEE 9th International Conference on Problems of Infocommunications, Science and Technology (PICST)</source>
          (
          <year>2023</year>
          )
          <fpage>522</fpage>
          -
          <lpage>526</lpage>
          . doi:
          <volume>10</volume>
          .1109/PICST57299.
          <year>2022</year>
          .10238518
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>O.</given-names>
             
            <surname>Bahatskyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
             
            <surname>Bahatskyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Sokolov</surname>
          </string-name>
          ,
          <article-title>Smart home subsystem for calculating the quality of public utilities</article-title>
          ,
          <source>in: Cybersecurity Providing in Information and Telecommunication Systems</source>
          , vol.
          <volume>3421</volume>
          ,
          <year>2023</year>
          ,
          <fpage>168</fpage>
          -
          <lpage>173</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>V.</given-names>
             
            <surname>Zhebka</surname>
          </string-name>
          , et al.,
          <article-title>Methodology for predicting failures in a smart home based on machine learning methods</article-title>
          ,
          <source>in: Cybersecurity Providing in Information and Telecommunication Systems, CPITS</source>
          , vol.
          <volume>3654</volume>
          ,
          <year>2024</year>
          ,
          <fpage>322</fpage>
          -
          <lpage>332</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>V.</given-names>
             
            <surname>Zhebka</surname>
          </string-name>
          , et al.,
          <article-title>Methods for predicting failures in a smart home</article-title>
          ,
          <source>in: Digital Economy Concepts and Technologies Workshop</source>
          , vol.
          <volume>3665</volume>
          ,
          <year>2024</year>
          ,
          <fpage>70</fpage>
          -
          <lpage>78</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>Y.</given-names>
             
            <surname>Lu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
             
            <surname>Papagiannidis</surname>
          </string-name>
          ,
          <string-name>
            <surname>E.</surname>
          </string-name>
           Alamanos,
          <article-title>Internet of things: A systematic review of the business literature from the user and organisational perspectives</article-title>
          ,
          <source>Technol. Forecast. Soc. Ch</source>
          .
          <volume>136</volume>
          (
          <year>2018</year>
          )
          <fpage>285</fpage>
          -
          <lpage>297</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>B. L. R.</given-names>
            <surname>Stojkoska</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
             V. 
            <surname>Trivodaliev</surname>
          </string-name>
          ,
          <article-title>A review of internet of things for smart home: Challenges and solutions</article-title>
          ,
          <source>J. Clean. Prod</source>
          .
          <volume>140</volume>
          (
          <year>2017</year>
          )
          <fpage>1454</fpage>
          -
          <lpage>1464</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>A. A.</given-names>
             
            <surname>Zaidan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
             B. 
            <surname>Zaidan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
             
            <surname>Qahtan</surname>
          </string-name>
          ,
          <article-title>A survey on communication components for IoT-based technologies in smart homes</article-title>
          ,
          <source>Telecommun. Syst</source>
          .
          <volume>69</volume>
          (
          <issue>1</issue>
          ) (
          <year>2018</year>
          )
          <fpage>1</fpage>
          -
          <lpage>25</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>B.</given-names>
             
            <surname>Zhurakovskyi</surname>
          </string-name>
          , et al.,
          <article-title>Secured remote update protocol in IoT data exchange system</article-title>
          ,
          <source>in: Workshop on Cybersecurity Providing in Information and Telecommunication Systems</source>
          , vol.
          <volume>3421</volume>
          (
          <year>2023</year>
          )
          <fpage>67</fpage>
          -
          <lpage>76</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>M.</given-names>
             
            <surname>Moshenchenko</surname>
          </string-name>
          , et. al.,
          <article-title>Optimization algorithms of smart city wireless sensor network control, in: Cybersecurity Providing in Information and Telecommunication Systems II</article-title>
          , vol.
          <volume>3188</volume>
          (
          <year>2021</year>
          )
          <fpage>32</fpage>
          -
          <lpage>42</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>S.</surname>
          </string-name>
           Adapa,
          <article-title>Indian smart cities and cleaner production initiatives integrated framework and recommendations</article-title>
          ,
          <source>J. Clean. Prod</source>
          .
          <volume>172</volume>
          (
          <year>2018</year>
          )
          <fpage>3351</fpage>
          -
          <lpage>3366</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>A. H. Alavi</surname>
          </string-name>
          , et al.,
          <article-title>Internet of things-enabled smart cities: State-of-the-art and future trends</article-title>
          ,
          <source>Measurement</source>
          <volume>129</volume>
          (
          <year>2018</year>
          )
          <fpage>589</fpage>
          -
          <lpage>606</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>