Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

This sensor does not use a simple checksum or even a more advanced CRC. Instead data integrity is verified by a hash code, generated by multiplying the message bits with the byte sequence generated by a linear feedback shift register (LFSR). This algorithm has been referred to as "an LFSR-based Toeplitz hash" in some of the literature.

...


Algorithm

1. Generate LSFR sequence equal to the length of the message.

...