Research Article
Security Enhancement for Multicast over Internet of Things by Dynamically Constructed Fountain Codes
Algorithm 2
DC fountain-encoding procedures
. Compute the sum of each row as . Find the maximum value in and records one of | the corresponding rowers as . | Traverse K lines to search for several lines whose rowers are denoted as to meet the | following conditions: | (i) Assume the matrix made by and is defined as . The sum of each column for | must be less than 2. | The encoded fountain packet is the exclusive-or of: | , | where denotes the encoded fountain packet during -th slot. |
|