Method for ensuring wireless data transmission by using fountain code-based symmetrical encryption

A wireless data, symmetric encryption technology, applied in digital transmission systems, security devices, transmission systems, etc., can solve the problems of large feedback load, poor information transmission security, eavesdropping, etc., achieve small feedback load, improve security, design reasonable effect

Active Publication Date: 2017-11-17
XI AN JIAOTONG UNIV
View PDF4 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Compared with traditional wired communication networks, the openness of wireless communication networks makes the secure transmission of data more difficult to achieve, because eavesdroppers can easily eavesdrop on the information transmitted between wireless terminals
In order to obtain confidentiality, traditional encryption technology usually adopts symmetric encryption or asymmetric encryption technology in the upper layer protocol, but in dynamic wireless network, traditional encryption technology faces some problems such as key distribution in symmetric encryption and asymmetric encryption in asymmetric encryption. High computational complexity, which limits the usage scenarios of traditional encryption technology to a certain extent
[0003] Fountain code is a rate-free erasure code, mainly including LT code and Raptor code. In the existing technology, it is easy to be eavesdropped by eavesdroppers in the process of wireless data transmission using fountain code. The security of information transmission poor
In some existing schemes that use fountain codes to realize secure wireless data transmission, whenever the legal receiver receives a fountain code packet, it will send a feedback signal to the legal sender, so the feedback load is relatively large

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for ensuring wireless data transmission by using fountain code-based symmetrical encryption
  • Method for ensuring wireless data transmission by using fountain code-based symmetrical encryption
  • Method for ensuring wireless data transmission by using fountain code-based symmetrical encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The present invention is described in further detail below in conjunction with accompanying drawing:

[0023] refer to figure 1 , as a rateless erasure code, fountain code mainly includes LT code and Raptor code. The legitimate sender uses fountain codes for encoding, and each fountain code encoding packet is obtained by XORing randomly selected different source data packets. The legal receiving end can only successfully decode and restore the data after receiving enough fountain code encoding packets, and the legal sending end stops the fountain code encoding and the sending of the encoding packets only after receiving the feedback that the legal receiving end has completed decoding and data recovery . This means that when the legal receiver can receive enough Fountain Code encoding packets before the eavesdropper and complete Fountain Code decoding and data recovery, then the security of the transmitted data can be guaranteed.

[0024] The key idea of ​​the present...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses a method for ensuring wireless data transmission by using fountain code-based symmetrical encryption. The method comprises the following steps that: 1) K encrypted source data packets are obtained; 2) fountain code encoding packets are obtained, the serial numbers and encoding information of the fountain code encoding packets are interposed into the headers of the fountain code encoding packets; 3) when a legitimate receiving end successfully completes fountain code decoding according to the received fountain code encoding packets, and restores the encrypted source data packets, the legitimate receiving end constructs a serial number set V according to the serial numbers of all the currently-received fountain code encoding packets; 4) a legitimate transmitting end performs XOR encryption on a random bit sequence k by using fountain code encoding packet data corresponding to all serial numbers in the serial number set V so as to obtain an encrypted random bit sequence k'; and 5) the legitimate receiving end decrypts the encrypted random bit sequence k' to obtain the random bit sequence k, and then decrypts the encrypted source data packets according to the random bit sequence k to obtain original data streams. With the method adopted, the security of wireless data transmission can be effectively improved, and the feedback load of the legitimate receiving end can be decreased.

Description

technical field [0001] The invention belongs to the technical field of wireless communication, and relates to a method for realizing symmetric encryption by using a fountain code to ensure safe transmission of wireless data. Background technique [0002] Compared with the traditional wired communication network, the openness of the wireless communication network makes the secure transmission of data more difficult to realize, because eavesdroppers can easily eavesdrop on the information transmitted between wireless terminals. In order to obtain confidentiality, traditional encryption technology usually adopts symmetric encryption or asymmetric encryption technology in the upper layer protocol, but in dynamic wireless network, traditional encryption technology faces some problems such as key distribution in symmetric encryption and asymmetric encryption in asymmetric encryption. High computational complexity, which limits the usage scenarios of traditional encryption technolo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04L29/06H04L1/00
CPCH04L1/0057H04L1/0061H04L63/0435H04W12/02
Inventor 任品毅吕超孙黎杜清河
Owner XI AN JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products