Research Article

Security Enhancement for Multicast over Internet of Things by Dynamically Constructed Fountain Codes

Figure 3

The transmission flow chart for BS during one transmitting slot.