Secure transmission method using fountain code for multiple feedbacks

A technology of secure transmission and fountain code, which is applied in the field of communication, can solve the problems of reducing the decoding rate of input symbols at the eavesdropper's end and the high quality requirements of legitimate channels, and achieve the goal of expanding the advantages of legal channels, low requirements for channel conditions, and realizing safe transmission Effect

Inactive Publication Date: 2018-07-06
PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU
View PDF5 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] Aiming at the problem that the traditional fountain code-based security coding method has high requirements on legal channel quality advantages, the present invention proposes a secure transmission method using fountain code multiple feedbacks, and introduces feedback to optimize the design of the traditional codec process without relying on In the case of other technologies, expand the advantage of legal channels and reduce the decoding rate of input symbols at the eavesdropper

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure transmission method using fountain code for multiple feedbacks
  • Secure transmission method using fountain code for multiple feedbacks
  • Secure transmission method using fountain code for multiple feedbacks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0050] Such as figure 1 As shown, a secure transmission method using multiple feedbacks of fountain codes according to an embodiment of the present invention includes the following steps:

[0051] Step S101: Initialize an original input information symbol set and a coding degree distribution at the sending end, where the original input information symbol set includes a plurality of original input information symbols.

[0052] Step S102: The sending end optimizes and updates the original input information symbol selection mechanism and encoding degree distribution in the encoding and decoding process according to the decoding situation of the legal receiving end. Adjustment of distribution value range.

[0053]Step S103: The sending end divides the encoding and decoding process into multiple encoding and decoding stages based on the time when the feedback information sent by the legal receiving end is received, and in each encoding and decoding stage, the symbol selection mech...

Embodiment 2

[0058] Such as figure 2 As shown, another embodiment of the present invention provides a secure transmission method utilizing multiple feedbacks of fountain codes, comprising the following steps:

[0059] Step S201: Initialize an original input information symbol set and a coding degree distribution at the sending end, where the original input information symbol set includes a plurality of original input information symbols.

[0060] Step S202: The sending end optimizes and updates the original input information symbol selection mechanism and encoding degree distribution in the encoding and decoding process according to the decoding situation of the legal receiving end. Adjustment of distribution value range.

[0061] The step S202 includes:

[0062] Step S2021: Change the value range of the coding degree distribution to the number of original input information symbols that have not yet been decoded by the legal receiving end.

[0063] Step S2022: Remove the original input...

Embodiment 3

[0086] Such as image 3 As shown, the application of a secure transmission method using fountain code multiple feedbacks in the wired communication scenario according to the embodiment of the present invention. The channel quality of the wired network is better, and the transmission channel can be regarded as a deletion channel. The user may receive the correct data, or may not receive the data packet due to network congestion and other reasons. Based on the method of the present invention, the reliability and security of communication can be guaranteed simultaneously, and the method includes the following steps:

[0087] Step S301: Initialize the original input information symbol set and the encoding degree distribution, where the original input information symbols can be randomly generated, and the encoding degree distribution adopts the classic Robust Soliton Distribution (RSD).

[0088] Step S302: According to the feedback mechanism of the present invention, calculate the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of communications, and particularly relates to a secure transmission method using a fountain code for multiple feedbacks. According to the scheme of the invention, a fountain code encoding and decoding process is updated by using the feedback, the purpose of continuously accumulating the legitimate channel advantages can be achieved, the gap between a legitimate receiver and the eavesdropper translation rate can be maximized, and thus a relatively more secure transmission can be implemented. Compared with a common fountain code security transmissionmethod, the scheme of the invention can be tightly coupled with channels, the entire encoding and decoding process is operated on the basis of guaranteeing the reliable transmission, and the transmission reliability cannot be sacrificed due to the pursuit of security performance; moreover, only a small number of feedbacks are needed, and the phenomenon of channel congestion caused by a large number of feedbacks similar to that of the traditional communication cannot occur; and the requirement for channel conditions is low, and strong adaptability and practicability can be achieved in both wired and wireless environments.

Description

technical field [0001] The invention belongs to the field of communication technology, and relates to a safe transmission method using fountain codes, in particular to a safe transmission method using fountain codes for multiple feedbacks. Background technique [0002] With the rapid development of communication technology, while enjoying the convenience and speed of information dissemination, people also put forward higher requirements for the service capability and scope of the communication system. The limited network bandwidth and the rapidly growing network data volume and download scale A pair of contradictions need to be resolved urgently. Fountain code was first introduced because in the traditional feedback retransmission TCP protocol, as the transmission distance increases, the error rate and packet loss rate increase sharply, and the amount of retransmitted information also increases exponentially, which leads to communication system Performance drops. Furthermo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L1/00
CPCH04L1/0009H04L1/0057
Inventor 易鸣汪立康黄开枝彭建华金梁楼洋明钟州周游马克明杨梅樾靳彦青王兵
Owner PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products