Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for guaranteeing secure transmission of wireless data based on fountain codes

A wireless data transmission and wireless data technology, applied in the direction of digital transmission system, transmission system, electrical components, etc., can solve the problems of unguaranteed security and difficult realization of dynamic wireless network, etc., and achieve the effect of reasonable design and simple operation

Active Publication Date: 2016-02-03
博纳信远能源科技有限公司
View PDF3 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In view of the potential security risks of eavesdroppers in wireless networks, the existing high-level network protocol layers use encryption technology to ensure that data is not eavesdropped. However, the implementation of encryption technology is based on the assumption that eavesdroppers have limited computing power. Unlimited computing power, security cannot be guaranteed
In addition, the key management mechanism is also difficult to implement for dynamic wireless networks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for guaranteeing secure transmission of wireless data based on fountain codes
  • Method for guaranteeing secure transmission of wireless data based on fountain codes
  • Method for guaranteeing secure transmission of wireless data based on fountain codes

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The present invention will be further described in detail below in conjunction with the accompanying drawings and specific implementation examples.

[0033] Fountain code uses a linear encoding and decoding method, which allows the sending end to continuously generate encoding symbols, and does not stop encoding and sending until it receives feedback from the user that it has been correctly received. It is a channel encoding that increases transmission reliability. The sender does not need to know the channel state information of the legal receiver, but it can still ensure reliable data transmission. When the sending end of wireless transmission uses fountain code encoding, it will stop encoding and sending until it receives feedback from the legal receiving end that it has received correctly.

[0034] The core idea of ​​the present invention is that in the process of wireless data transmission, the sending end uses the fountain code encoding method to encode k informat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for guaranteeing secure transmission of wireless data based on fountain codes. The method comprises the following steps that each time slot sending end adopts a fountain code method to complete a check package encoding process; after the check package generated at the sending end is subjected to CRC (Cyclic Redundancy Check) coding of a data link layer and channel coding of a physical layer, the check package is sent to a legal user, and a tapping user taps current time slot transmission check package information; when packet loss does not occur in the channel, a legal receiving end completes a decoded operation of the received check package, and updates a set of serial numbers of decoded information packets and feeds the set back to the sending end after correct decoding, otherwise the set of the serial numbers of the decoded information packets is not updated; and the legal receiving end judges whether the number of the successfully decoded information packets is equal to the number of source information packets and decides whether to inform the sending end to stop sending the check package according to the information. According to the method, real-time adjustment of an encoding scheme for the sending end is carried out according to the decoding speed of the legal user, so that the intercept probability for the tapping user in a wireless data transmission process is remarkably reduced and the transmission efficiency of the sending end is improved.

Description

Technical field: [0001] The invention belongs to the technical field of wireless communication, and in particular relates to a method for guaranteeing wireless data secure transmission based on fountain codes, which uses fountain code technology to reduce the interception probability of eavesdropping users during wireless data transmission and improve the transmission efficiency of the sending end. Background technique: [0002] Compared with the cable communication system, the openness of the wireless communication network makes its security transmission problem more difficult, because it is easy for eavesdroppers to eavesdrop on the confidential data at the wireless device end. In view of the potential security risks of eavesdroppers in wireless networks, the existing high-level network protocol layers use encryption technology to ensure that data is not eavesdropped. However, the implementation of encryption technology is based on the assumption that eavesdroppers have lim...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L1/00
CPCH04L1/0056
Inventor 杜清河李婉瑜孙黎任品毅王熠晨
Owner 博纳信远能源科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products