Unlock instant, AI-driven research and patent intelligence for your innovation.

Improved anti-eavesdropping method based on fountain code

A fountain and decoding technology, applied in baseband system, baseband system components, channel estimation, etc., can solve the problem of high decoding rate of eavesdroppers

Active Publication Date: 2018-11-06
LIAONING UNIVERSITY OF TECHNOLOGY
View PDF9 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Therefore, in the existing encoding method, due to the randomness of the arrangement of each column of the encoding matrix, there is a possibility that the eavesdropper and the receiver can restore the source information at the same time or in advance, so that the decoding rate of the eavesdropper can reach a higher level.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Improved anti-eavesdropping method based on fountain code
  • Improved anti-eavesdropping method based on fountain code
  • Improved anti-eavesdropping method based on fountain code

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0051] An improved anti-eavesdropping method based on fountain codes is characterized in that it comprises the following steps:

[0052] Step 1: Perform channel estimation on the channel between the source and the receiver, and obtain the channel deletion probability P between the two er ;

[0053] Step 2: The source quantifies the source information to obtain binary message codewords, and then groups them into groups of k message symbols;

[0054] Step 3: The coding matrix source randomly generates k / (1-P according to the RSD degree distribution function er ) column coding matrix P 1 . Will P 1 The columns in are rearranged according to the value of degree d from large to small, and the obtained k×k / (1-P er ) coding matrix is ​​set to P 1 ', P 1 ', the column corresponding to degree 1 is arranged in the back; continue to obtain the coding matrix P according to the RSD degree distribution function 2 , whose columns are long enough to satisfy m≥k, where m represents the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An improved anti-eavesdropping method based on a fountain code comprises the steps of: 1, performing channel estimation between an information source and a receiving end to acquire a channel deletionratio Per; 2, quantizing information of the information source by the information source to acquire binary message code words, and grouping the code words; 3, acquiring an improved LT (Luby Transform)encoding matrix P'; 4, according to the encoding matrix P', multiplying the encoding matrix P' with the information source message code words to acquire an improved LT code, and sending the improvedLT code to the receiving end; 5, when the receiving end receives the LT code encoding symbol, if the encoding symbol is right, participating in BP (Belief Propagation) decoding till all the information source message code words are decoded, and sending an ACK (Acknowledge Character) to the information source; and 6, after the information source receives the ACK acknowledge character sent by the receiving end, stopping sending the improved LT encoding symbol, preparing next group of k message symbols and repeating the step 4 till all the information source messages are sent. By combining the channel noise, the probability that the eavesdropper restores the messages after the receiver is increased, so that the error rate of the eavesdropper is increased.

Description

technical field [0001] The invention belongs to the technical field of wireless transmission information security, in particular to an improved anti-eavesdropping method based on a fountain code. Background technique [0002] With the rapid development of the information age, wireless transmission has become an indispensable part of people's daily life. Due to the broadcast characteristics of wireless communication, the interception and malicious use of data pose a huge threat to wireless communication, and wireless voice communication is also vulnerable to the threat of eavesdropping within the transmission range, especially when some commercial secrets, military secrets and sensitive personal information are involved. If it is eavesdropped during the transmission, it will cause huge losses, and the problem of wireless communication security has to be solved. [0003] The LT code is a kind of practical code with unlimited code rate belonging to the fountain code. The LT co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L25/02H04B7/0456H04W12/00H04W12/126
CPCH04B7/0456H04L25/0202H04L25/0242H04W12/00
Inventor 牛芳琳王南孙福明张娅
Owner LIAONING UNIVERSITY OF TECHNOLOGY