Research Article

Security Enhancement for Multicast over Internet of Things by Dynamically Constructed Fountain Codes

Algorithm 3

DC fountain-encoding procedures .
Remove the full-0-lines from .
Compute the sum of each row as . Find the minimum value in and records the corresponding
rowers stored in .
Assume the matrix made by is defined as . If the sum of each column in is larger than ,
repeat the next step.
Find the maximum value of the sum of each column in and records one of the corresponding columns
as . Choose the rowers from that column whose elements is non-zero and stored as . Then find the
maximum value of the sum of each row in the matrix made by and delete the corresponding row from .
Assume the rowers of is denoted as . The encoded fountain packet is the exclusive-or of:
,
where denotes the encoded fountain packet during -th slot.