Research Article
Security Enhancement for Multicast over Internet of Things by Dynamically Constructed Fountain Codes
Algorithm 3
DC fountain-encoding procedures
. Remove the full-0-lines from . | Compute the sum of each row as . Find the minimum value in and records the corresponding | rowers stored in . | Assume the matrix made by is defined as . If the sum of each column in is larger than , | repeat the next step. | Find the maximum value of the sum of each column in and records one of the corresponding columns | as . Choose the rowers from that column whose elements is non-zero and stored as . Then find the | maximum value of the sum of each row in the matrix made by and delete the corresponding row from . | Assume the rowers of is denoted as . The encoded fountain packet is the exclusive-or of: | , | where denotes the encoded fountain packet during -th slot. |
|