DOI QR코드

DOI QR Code

A Method of Combining Scrambling Technology with Error Control Coding to Realize Both Confidentiality and Reliability in Wireless M2M Communication

  • Zhang, Meng (National ASIC Research Center, Southeast University) ;
  • Wang, Zhe (National ASIC Research Center, Southeast University) ;
  • Guo, Menghan (Institute of RF- & OE-ICs, Southeast University)
  • Received : 2011.09.01
  • Accepted : 2012.01.18
  • Published : 2012.01.30

Abstract

In this paper we present a novel method of applying image scrambling technology which belongs to the information hiding field in the error control coding to introduce confidentiality in wireless machine to machine communication. The interleaver in serial concatenated convolutional codes, which is the key module in overcoming burst errors, is deliberately designed with the scrambling function to provide a low error rate for those authorized transceivers. By contrast, the unauthorized transceivers without keys would get so high an error rate that decoding bits could bring little value, thus realizing both the confidentiality and reliability in wireless machine to machine communication.

Keywords

References

  1. Hu, R.Q., Yi Qian, Hsiao-Hwa Chen and Jamalipour, A., "Recent progress in machine-to- machine communications," IEEE Communications Magazine, vol. 49, no. 4, pp. 24-26, Apr. 2011.
  2. Du Jiang and Chao ShiWei, "A study of information security for M2M of IOT," in Proc. of 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE), vol. 3, pp. 576-579, pp. 20-22 Aug. 2010.
  3. Chin-Feng Lai, Yueh-Min Huang, Jiann-Liang Chen, Wen Ji and Min Chen, "Design and integration of the OpenCore based mobile TV framework for DVB-H/ T wireless network," Jounal of ACM Multimedia Systems, 2010.
  4. L. Zhou, X. Wang, W. Tu, G. Muntean and B. Geller, "Distributed scheduling scheme for video streaming over multi-channel multi-radio multi-hop wireless networks," IEEE Journal on Selected Areas in Communications, vol 28, no. 3, pp. 409-419, 2010.
  5. B.Sklar, "Digital communications: Fundamentals and applications," pp. 890-893. 2001.
  6. Robert H. Morelos-Zaragoza, "The art of error correcting coding," pp. 2-185, 2006.
  7. C. Berrou, A. Glavieux and P. Thitimajshima, "Near shannon limit error-correcting coding and decoding: Turbo-codes," in Proc. of IEEE International Conference on Communications(ICC'93), pp. 1064-1070, May. 1993.
  8. S.-Y. Chung, G. D. Forney, Jr., T. J. Richardson and R. Urbanke, "On the design of low-density parity-check codes within 0.0045 dB of the Shannon Limit," IEEE Communication Letter, vol. 5, no. 2, pp. 58-60, Feb. 2001.
  9. A. Huebner and R. Jordan, "On higher order permutors for serially concatenated convolutional codes," IEEE Transactions on Information Theory, pp. 1238-1248, 2006.
  10. D.J.C. MacKay, "Information theory, inference, and learning algorithms," Cambridge University Press, pp. 8-12, 2003.
  11. Fabien A. P. Petitcolas, Ross J. Anderson, and Markus G. Kuhn, "Information hiding :A survey," Proeeding of the IEEE, vol. 87, no. 7, pp. 1062-1078, Jul. 1999. https://doi.org/10.1109/5.771065
  12. N. Jiping, Z. Yongchuan, H. Zhihua, and Y. Zuqiao, "A digital image scrambling method based on AES and error-correcting code," in Proc. of CSSE , vol.3, pp. 677-680, 2008.
  13. Lixin, D., "A new approach of data hiding within speech based on hash and Hilbert transform," in Proc. of ICSNC, 2006.
  14. S. Benedetto, D. Divsalar, G. Montorsi, and F. Pollara, "Serial concatenation of interleaved codes: Performance analysis, design, and iterative decoding," Transactions on Information Theory, pp. 909-926, 1998.
  15. Mohamed El-Hadedy, Danilo Gligoroski , Svein J. Knapskog and Einar Johan Aas, "Low area FPGA and ASIC implementations of the hash function "Blue Midnight Wish-256,"," in Proc. of International Conference on Computer Engineering & Systems, pp. 10-14, 2009.

Cited by

  1. RESH: A Secure Authentication Algorithm Based on Regeneration Encoding Self-Healing Technology in WSN vol.2016, pp.None, 2012, https://doi.org/10.1155/2016/2098680