Reed–Solomon Code based Green & Survivable Communications Using Selective Encryption

نویسندگان

  • HONGGANG WANG
  • LIUDONG XING
  • HOWARD E. MICHEL
  • H. E. Michel
چکیده

Reliability and security are two major criteria for survivable communications in error-prone wireless environments. To ensure reliable communications, Forward Error Correcting (FEC) codes such as Reed-Solomon (RS) codes are employed for error detection and correction by adding redundancies into the original data to form code words. Secure data communications based on FEC are achieved in many traditional approaches by encrypting the whole code words, which is not computationally or energy efficient. In this paper, we propose a new selective encryption approach based on FEC code words to effectively sustain both green and survivable communications in wireless networking systems.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Securing the IEEE 802.16 OFDM WiMAX PHYSICAL AND MAC Layer Using STBC Coding and Encryption

-This work proposes model design in securing the IEEE 802.16 WiMAX Physical and MAC layer, using Orthogonal Frequency Division Multiplexing (OFDM) and STBC model. Typically, it addresses the physical and MAC layer security concerns, using a Space Time Block Coding (STBC), link encryption, and Message Authentication Code (MAC) technique. The model conforms to Multiple Input Single Output (MISO) ...

متن کامل

A Distinguisher-Based Attack on a Variant of McEliece's Cryptosystem Based on Reed-Solomon Codes

Baldi et al. proposed a variant of McEliece’s cryptosystem. The main idea is to replace its permutation matrix by adding to it a rank 1 matrix. The motivation for this change is twofold: it would allow the use of codes that were shown to be insecure in the original McEliece’s cryptosystem, and it would reduce the key size while keeping the same security against generic decoding attacks. The aut...

متن کامل

Distinguisher-based attacks on public-key cryptosystems using Reed-Solomon codes

The purpose of this paper is to demonstrate that a distinguisher of Reed-Solomon codes based on the square code construction leads to the cryptanalysis of several cryptosystems relying on them. These schemes are respectively (i) a homomorphic encryption scheme proposed by Bogdanov and Lee; (ii) a variation of the McEliece cryptosystem proposed by Baldi et al. which firstly uses ReedSolomon code...

متن کامل

A general construction of Reed-Solomon codes based on generalized discrete Fourier transform

In this paper, we employ the concept of the Generalized Discrete Fourier Transform, which in turn relies on the Hasse derivative of polynomials, to give a general construction of Reed-Solomon codes over Galois fields of characteristic not necessarily co-prime with the length of the code. The constructed linear codes  enjoy nice algebraic properties just as the classic one.

متن کامل

Securing the IEEE 802.16 OFDM WiMAX PHYSICAL a MAC Layer Using STBC Coding and Encryption

This work proposes model design in securing the IEEE 802.16 WiMAX Physical and MAC layer, using Orthogonal Frequency Division Multiplexing (OFDM) and STBC model. Typically, it addresses the physical and MAC layer security concerns, using a Space Time Block Coding (STBC) , link encryption, and Message Authentication Code (MAC) technique. The model conforms to Multiple Input Single Output (MISO) ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009