Data security has become more crucial to individuals from all walks of life as a result of the current advancements in communication engineering and the widespread use of the internet. Numerous communication protocols with high levels of security are now in use. There are also critical management, user identity recognition, and secret image encoding, and random number requirements for various applications. Compared to figures that were shown to be pseudorandom, true random numbers offered more irregular number patterns in the form of codes with significant advances (PRNs). Sensitivity to initial circumstances, unpredictability, and periodicity are the hallmarks of chaos. These predictions line up with the development of TRN generating techniques in the chaotic sector. In order to provide a thorough assessment of chaos-based TRNGs, this overview research seeks to address these concerns. The formation of True Random Numbers depends on two types of chaotic systems: uninterrupted chaotic systems and separate time chaotic systems. To help researchers choose the ways and difficulties that best suit their requirements or goals, the fundamental procedures and difficulties are presented. The evaluation of existing methods emphasizes both their contributions, their significance to the subject. Additionally, consider TRNGs for this issue that are based on current-mode chaos in a portion of the research. Lastly, quantitative results are shown. Explanation of the results for the strategies outlined in the previous sentence once they have been put to use. Finally, the purpose of this study is to present some hypotheses for future research that may be more beneficial in various applications and lead to the creation of novel chaos-based TRNGs.