Wireless D2D Homomorphic Data Exchange with Butterfly Network Coding

碩士 === 國立中正大學 === 通訊工程研究所 === 102 === In this thesis, we adopt exclusive or (XOR) operation and homomorphic encryption on Device-to-Device (D2D) data transmission. By doing so, we can improve the transmission efficiency without decrypting the data from the cipher domain. Reliable Butterfly Network C...

Full description

Bibliographic Details
Main Authors: Feng-Yu Liu, 劉豐瑜
Other Authors: Wei-Cheng Liu
Format: Others
Language:zh-TW
Published: 2014
Online Access:http://ndltd.ncl.edu.tw/handle/kwc5e8
id ndltd-TW-102CCU00650025
record_format oai_dc
spelling ndltd-TW-102CCU006500252019-05-15T21:23:13Z http://ndltd.ncl.edu.tw/handle/kwc5e8 Wireless D2D Homomorphic Data Exchange with Butterfly Network Coding 結合網路編碼與同態運算進行資料交換 Feng-Yu Liu 劉豐瑜 碩士 國立中正大學 通訊工程研究所 102 In this thesis, we adopt exclusive or (XOR) operation and homomorphic encryption on Device-to-Device (D2D) data transmission. By doing so, we can improve the transmission efficiency without decrypting the data from the cipher domain. Reliable Butterfly Network Construction (RBC) is an important issue as well. We modify the system model by taking propagation path loss and shadowing effect into consideration and choose appropriate relays to build a butterfly mesh network. According to the result, we use appropriate network coding to improve the transmission efficiency, use homomorphic encryption to maintain the security of data and use RBC to construct a reliable network. If the main network relays cannot work, in this way, we would have backup relays to continue the communication. Wei-Cheng Liu 劉維正 2014 學位論文 ; thesis 63 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國立中正大學 === 通訊工程研究所 === 102 === In this thesis, we adopt exclusive or (XOR) operation and homomorphic encryption on Device-to-Device (D2D) data transmission. By doing so, we can improve the transmission efficiency without decrypting the data from the cipher domain. Reliable Butterfly Network Construction (RBC) is an important issue as well. We modify the system model by taking propagation path loss and shadowing effect into consideration and choose appropriate relays to build a butterfly mesh network. According to the result, we use appropriate network coding to improve the transmission efficiency, use homomorphic encryption to maintain the security of data and use RBC to construct a reliable network. If the main network relays cannot work, in this way, we would have backup relays to continue the communication.
author2 Wei-Cheng Liu
author_facet Wei-Cheng Liu
Feng-Yu Liu
劉豐瑜
author Feng-Yu Liu
劉豐瑜
spellingShingle Feng-Yu Liu
劉豐瑜
Wireless D2D Homomorphic Data Exchange with Butterfly Network Coding
author_sort Feng-Yu Liu
title Wireless D2D Homomorphic Data Exchange with Butterfly Network Coding
title_short Wireless D2D Homomorphic Data Exchange with Butterfly Network Coding
title_full Wireless D2D Homomorphic Data Exchange with Butterfly Network Coding
title_fullStr Wireless D2D Homomorphic Data Exchange with Butterfly Network Coding
title_full_unstemmed Wireless D2D Homomorphic Data Exchange with Butterfly Network Coding
title_sort wireless d2d homomorphic data exchange with butterfly network coding
publishDate 2014
url http://ndltd.ncl.edu.tw/handle/kwc5e8
work_keys_str_mv AT fengyuliu wirelessd2dhomomorphicdataexchangewithbutterflynetworkcoding
AT liúfēngyú wirelessd2dhomomorphicdataexchangewithbutterflynetworkcoding
AT fengyuliu jiéhéwǎnglùbiānmǎyǔtóngtàiyùnsuànjìnxíngzīliàojiāohuàn
AT liúfēngyú jiéhéwǎnglùbiānmǎyǔtóngtàiyùnsuànjìnxíngzīliàojiāohuàn
_version_ 1719113245914038272