Reed–Solomon Code based Green & Survivable Communications Using Selective Encryption
نویسندگان
چکیده
Reliability and security are two major criteria for survivable communications in error-prone wireless environments. To ensure reliable communications, Forward Error Correcting (FEC) codes such as Reed-Solomon (RS) codes are employed for error detection and correction by adding redundancies into the original data to form code words. Secure data communications based on FEC are achieved in many traditional approaches by encrypting the whole code words, which is not computationally or energy efficient. In this paper, we propose a new selective encryption approach based on FEC code words to effectively sustain both green and survivable communications in wireless networking systems.
منابع مشابه
Securing the IEEE 802.16 OFDM WiMAX PHYSICAL AND MAC Layer Using STBC Coding and Encryption
-This work proposes model design in securing the IEEE 802.16 WiMAX Physical and MAC layer, using Orthogonal Frequency Division Multiplexing (OFDM) and STBC model. Typically, it addresses the physical and MAC layer security concerns, using a Space Time Block Coding (STBC), link encryption, and Message Authentication Code (MAC) technique. The model conforms to Multiple Input Single Output (MISO) ...
متن کاملA Distinguisher-Based Attack on a Variant of McEliece's Cryptosystem Based on Reed-Solomon Codes
Baldi et al. proposed a variant of McEliece’s cryptosystem. The main idea is to replace its permutation matrix by adding to it a rank 1 matrix. The motivation for this change is twofold: it would allow the use of codes that were shown to be insecure in the original McEliece’s cryptosystem, and it would reduce the key size while keeping the same security against generic decoding attacks. The aut...
متن کاملDistinguisher-based attacks on public-key cryptosystems using Reed-Solomon codes
The purpose of this paper is to demonstrate that a distinguisher of Reed-Solomon codes based on the square code construction leads to the cryptanalysis of several cryptosystems relying on them. These schemes are respectively (i) a homomorphic encryption scheme proposed by Bogdanov and Lee; (ii) a variation of the McEliece cryptosystem proposed by Baldi et al. which firstly uses ReedSolomon code...
متن کاملA general construction of Reed-Solomon codes based on generalized discrete Fourier transform
In this paper, we employ the concept of the Generalized Discrete Fourier Transform, which in turn relies on the Hasse derivative of polynomials, to give a general construction of Reed-Solomon codes over Galois fields of characteristic not necessarily co-prime with the length of the code. The constructed linear codes enjoy nice algebraic properties just as the classic one.
متن کاملSecuring the IEEE 802.16 OFDM WiMAX PHYSICAL a MAC Layer Using STBC Coding and Encryption
This work proposes model design in securing the IEEE 802.16 WiMAX Physical and MAC layer, using Orthogonal Frequency Division Multiplexing (OFDM) and STBC model. Typically, it addresses the physical and MAC layer security concerns, using a Space Time Block Coding (STBC) , link encryption, and Message Authentication Code (MAC) technique. The model conforms to Multiple Input Single Output (MISO) ...
متن کامل