Research Article
Security Enhancement for Multicast over Internet of Things by Dynamically Constructed Fountain Codes
Algorithm 1
DC fountain-encoding procedures
. BS records the rowers for full-0-lines and full-1-lines of | matrix and respectively stores them in matrix and . | Determine whether the matrix is empty. | If is not empty | Encoding rules are as follows: | (a) Randomly choose one element from denoted as . | (b) Take out all elements from denoted as | (c) The encoded fountain packet is the exclusive-or of: | , | where denotes the encoded fountain packet | during -th slot. | else | Switch to Step . | Determine whether the length of is smaller than . | If length | Encoding rules follow Algorithm 2. | else | Encoding rules follow Algorithm 3. |
|