Anti-eavesdropping coding method based on fountain code coding

An encoding method and fountain encoding technology are applied in the field of wireless transmission security and can solve the problems of low security against eavesdropping and encryption

Inactive Publication Date: 2019-07-26
LIAONING UNIVERSITY OF TECHNOLOGY
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present invention provides an anti-tapping coding method based on fountain code coding, which solves the problem of low security of anti-tapping encryption in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-eavesdropping coding method based on fountain code coding
  • Anti-eavesdropping coding method based on fountain code coding
  • Anti-eavesdropping coding method based on fountain code coding

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] The technical solutions of the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the present invention. Obviously, the described embodiments are part of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts shall fall within the protection scope of the present invention.

[0018] It should be understood that the technical solutions of the embodiments of the present invention can be applied to various communication systems, for example, Global Mobile Communications (GSM) system, Code Division Multiple Access (CDMA) system, Wideband Code Division Multiple Access (CDMA) system, General Packet Wireless Service (GPRS), Long Term Evolution (LTE) system, LTE Frequency Division Duplex (FDD) system, LTE Time Division Duplex (TDD), Universal M...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an anti-eavesdropping coding method based on fountain code coding. The method comprises the following steps: a sending end receives a random binary code sent and broadcasted by a receiving end; the sending end determines a matrix p1, the degree of which is 1; a matrix p2 is determined according to a transfer fountain code distribution function; a fountain coding matrix p is determined according to the matrix p1 and the matrix p2; the fountain coding matrix p is multiplied by k symbols of an information source to obtain fountain codes; and the random binary code and the fountain codes are subjected to exclusive-or operation to obtain coded information and the coded information is sent to the receiving end. According to the anti-eavesdropping coding method based on fountain code coding, the method is based on an information fountain code coding method and combines with noise signals; and when a receiver recovers information source information, it is hard for an eavesdropper to recover codes of all information due to randomness of a noise channel, so that error symbol rate in the speech receiving channel is high, eavesdropping fails and a purpose of safety communication is achieved.

Description

technical field [0001] The invention relates to the field of wireless transmission security, in particular to an anti-eavesdropping coding method based on fountain code coding. Background technique [0002] Voice communication plays an important role in wireless communication. Due to the broadcast characteristics of wireless communication, voice communication can be eavesdropped by any node within the transmission range, and is more vulnerable to the threat of eavesdropping. Data interception and malicious use will be a huge threat to wireless communication. threat. [0003] The traditional anti-eavesdropping technology mainly adds a confidentiality agreement in the communication network layer, and its password design is the focus of wireless security research. [0004] However, the traditional computing security model mainly relies on the computing power of the attacker. With the rapid development of computer technology, the cryptographic system of communication can be com...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04K1/02H04L1/00
CPCH04K1/02H04L1/0056
Inventor 牛芳琳刘政孟云霄韩斌
Owner LIAONING UNIVERSITY OF TECHNOLOGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products