[미국특허]
Secure network coding for multi-resolution wireless transmission
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
H04N-007/167
H04L-001/18
H04N-021/2343
H04N-021/2347
H04N-021/266
H04N-021/2662
H04N-021/61
H04N-021/6377
H04N-021/647
H04W-012/06
H04L-001/00
출원번호
US-0836981
(2013-03-15)
등록번호
US-9137492
(2015-09-15)
발명자
/ 주소
Lima, Luisa
Gheorghiu, Steluta
Barros, Joao
Medard, Muriel
Toledo, Alberto Lopez
Vilela, Joao
출원인 / 주소
Massachusetts Institute of Technology
대리인 / 주소
Daly, Crowley, Mofford & Durkee, LLP
인용정보
피인용 횟수 :
2인용 특허 :
28
초록▼
Described herein is a method and system for hierarchical wireless video with network coding which limits encryption operations to a critical set of network coding coefficients in combination with multi-resolution video coding. Such a method and system achieves hierarchical fidelity levels, robustnes
Described herein is a method and system for hierarchical wireless video with network coding which limits encryption operations to a critical set of network coding coefficients in combination with multi-resolution video coding. Such a method and system achieves hierarchical fidelity levels, robustness against wireless packet loss and efficient security by exploiting the algebraic structure of network coding.
대표청구항▼
1. A method for streaming video data in a network including a server node, a plurality of relay nodes and one or more receiver nodes and including a set of security operations and video streaming operations with network coding, the method comprising performing a one-time key distribution between the
1. A method for streaming video data in a network including a server node, a plurality of relay nodes and one or more receiver nodes and including a set of security operations and video streaming operations with network coding, the method comprising performing a one-time key distribution between the source node and each of the one or more receiver nodes;dividing the video data into one or more group of pictures (GoP), each of the more than one group of pictures having a predetermined time of duration;for each group of pictures (GoP), generating at the source node and an n×n lower-triangular matrix A, in which l is a number of layers in the GoP wherein there are nj rows in the matrix A for each layer, and n=nll and wherein matrix A is used for encoding at the source only and each non-zero entry of matrix A is an elemental aij chosen uniformly at random from all non-zero elements of the field Fg\{0};dividing the GoP into a plurality of vectors b(1) . . . b(w), each of the vectors having n symbols b1-bn in which positions nl(lj−1)+1 to nllj of each vector belongs layer lj;encrypting ml symbols of each layer in vectors b(i) 1≦l≦w, with a stream cypher and random keys k(1)-k(j) where there is one key for each layer;applying the encoding matrix A successively to the information symbols to be sent to provide a payload of one or more packets, comprised of encoded information symbols;encrypting each nl lines of a matrix A with a corresponding layer key, wherein the first matrix A corresponds to a locked coefficients matrix;generating an n×n identity matrix corresponding to the unlocked coefficients wherein each of the packets comprise a header and the payload and wherein the header comprises the locked and unlocked coefficients;encoding the packets in relay nodes in accordance with a random linear network coding (RLNC) protocol wherein algebraic coding is performed on unlocked coefficients, locked coefficients and payload and wherein the relay nodes identify the layer of a packet by looking at the first non-zero position in the unlocked coefficients, and packets are mixed with packets of the same or lower layers only; andsending the first nl lines of matrix A unencrypted so as to make the base layer accessible to all nodes and wherein encryption of the locked coefficients then starts at row nl+1 such that layer 1 is accessible to all nodes in the network. 2. The method of claim 1 wherein the time of duration is one second. 3. The method of claim 1 wherein performing algebraic coding on unlocked coefficients, locked coefficients and payload comprises performing algebraic coding indistinguishably on unlocked coefficients, locked coefficients and payload. 4. The method of claim 1 further comprising: applying, via the receivers, Gaussian elimination following standard RLNC over the unlocked coefficients;recovering the locked coefficients by decrypting each line of the matrix with the corresponding key; andobtaining plaintext by a forward substitution process. 5. The method of claim 1 wherein the protected symbols are encrypted with the key for the lowest level in the network such that all legitimate participants in the protocol can decrypt the locked symbols. 6. The method of claim 1 further comprising starting the encryption of plaintext symbols at symbol nl+1, so that the base layer is accessible by all the nodes in the network. 7. The method of claim 1 wherein only a single key per layer is used for multi-resolution encryption and wherein the single key for each layer is shared among all legitimate receivers for that layer. 8. The method of claim 1 wherein in order to achieve maximum security, encrypting comprises encrypting the base layer of the GoP. 9. The method of claim 6 wherein encrypting ml symbols of each layer in vectors bi 1x, the resulting packet belongs to layer y. 13. A system for streaming video data in a network, the system comprising: (a) a server node for dividing the video data into more than one group of pictures (GoP), each of the more than one group of pictures having a predetermined time of duration wherein for each group of pictures (GoP), the source node generates an n×n lower-triangular matrix A, in which l is the number of layers in the GoP and n=nll and wherein matrix A is used for encoding at the source only and each non-zero entry of matrix A is an element aij chosen uniformly at random from all non-zero elements of the field Fq\{0} and the source divides the GoP into a plurality of vectors b(1) . . . b(w), each of the vectors having n symbols b1-bn in which the symbol from index nl(lj−1)+1 tp nllj belong to layer lj of the GoP and wherein the number of vectors created is computed as size of GoP/n and wherein the source node encrypts ml positions of each layer of each vector b(i) yielding m encrypted positions in total for each use of the encoding matrix wherein the output of the operation of a stream cypher on a symbol P with a random key K is denoted as E(P, K) and applies the encoding matrix A successively to the information symbols to be sent to provide encoded information symbols which comprise a payload of one or more packets wherein encrypting ml symbols of each layer in vectors b(i) 1<=l<=w, with a stream cipher and random keys k(1)-k(l) yields payload vectors of the form: c(i)=A(E(b1(i),k(1)), . . . ,E(bml(i),k(1)),bml+1(i), . . . ,bnl(i),E(bnl+1(i),k(2)), . . . ,E(bnl+ml(i),k(2)),bnl+ml+1(i), . . . ,b2nl(i),. . . ,E(bnl(l−1)(l),k(l)), . . . ,E(bnl(l−1)+ml(l),k(l)),bnl(l−1)+ml+1(i), . . . ,bn(i))T and wherein composing a payload of the packets includes forming the payload by concatenating vectors c(1) to c(w) and the source node encrypts each line of a first matrix A with a corresponding layer key wherein the first matrix A corresponds to a locked coefficients matrix and generates an n×n identity matrix corresponding to the unlocked coefficients wherein each of the one or more packets comprise a header and the payload; (b) a plurality of relay nodes wherein the one or more packets are encoded in the relay nodes in accordance with a random linear network coding (RLNC) protocol, wherein the relay nodes identify the layer of a packet by looking at the first non-zero position in the unlocked coefficients, and packets are mixed with packets of the same or lower layers only; and(c) one or more receiver nodes wherein the header comprises the locked and unlocked coefficients and encodes the one or more packets.
Choi, Sung-Ho; Park, Chang-Soo; Kim, Jae-Yoel; Park, Seong-III; Jung, Ki-Ho; Choi, Ho-Kyu; Lee, Hyun-Woo; Kwak, Yong-Jun; Lee, Kook-Heui, Apparatus and method for allocating channel using OVSF code for uplink synchronous transmission scheme in a W-CDMA communication system.
Knapp,David J.; Ho,Horace C., Communication system and method for sending asynchronous data and/or isochronous streaming data across a synchronous network within a frame segment using a coding violation to signify at least the beginning of a data transfer.
Knapp,David J.; Ho,Horace C., Communication system and method for sending isochronous streaming data across a synchronous network within a frame segment using a coding violation to signify invalid or empty bytes within the frame .
Malik Imran (Germantown MD) Lowe D. Ray (Gaithersburg MD), Method and apparatus for adjusting the postamble false detection probability threshold for a burst transmission.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.