Research Article

Security Enhancement for Multicast over Internet of Things by Dynamically Constructed Fountain Codes

Algorithm 2

DC fountain-encoding procedures .
Compute the sum of each row as . Find the maximum value in and records one of
the corresponding rowers as .
Traverse K lines to search for several lines whose rowers are denoted as to meet the
following conditions:
(i) Assume the matrix made by and is defined as . The sum of each column for
must be less than 2.
The encoded fountain packet is the exclusive-or of:
,
where denotes the encoded fountain packet during -th slot.