test
server time: root: http://itiis.org
current_path: /journals/tiis/digital-library/manuscript/282
current_url: http://itiis.org/journals/tiis/digital-library/manuscript/282
A Method of Combining Scrambling Technology with Error Control Coding to Realize Both Confidentiality and Reliability in Wireless M2M Communication
  • KSII Transactions on Internet and Information Systems
    Monthly Online Journal (eISSN: 1976-7277)

A Method of Combining Scrambling Technology with Error Control Coding to Realize Both Confidentiality and Reliability in Wireless M2M Communication

Vol. 6, No. 1, January 29, 2012
10.3837/tiis.2012.01.010, Download Paper (Free):

Abstract

In this paper we present a novel method of applying image scrambling technology which belongs to the information hiding field in the error control coding to introduce confidentiality in wireless machine to machine communication. The interleaver in serial concatenated convolutional codes, which is the key module in overcoming burst errors, is deliberately designed with the scrambling function to provide a low error rate for those authorized transceivers. By contrast, the unauthorized transceivers without keys would get so high an error rate that decoding bits could bring little value, thus realizing both the confidentiality and reliability in wireless machine to machine communication.


Statistics

Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2015)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article

[IEEE Style]
M. Zhang, Z. Wang and M. Guo, "A Method of Combining Scrambling Technology with Error Control Coding to Realize Both Confidentiality and Reliability in Wireless M2M Communication," KSII Transactions on Internet and Information Systems, vol. 6, no. 1, pp. 162-177, 2012. DOI: 10.3837/tiis.2012.01.010.

[ACM Style]
Meng Zhang, Zhe Wang, and Menghan Guo. 2012. A Method of Combining Scrambling Technology with Error Control Coding to Realize Both Confidentiality and Reliability in Wireless M2M Communication. KSII Transactions on Internet and Information Systems, 6, 1, (2012), 162-177. DOI: 10.3837/tiis.2012.01.010.