A Bezier Curve Based Key Management Scheme for Hierarchical Wireless Sensor Networks

2012 ◽  
Vol 263-266 ◽  
pp. 2979-2985
Author(s):  
Yong Luo Shen ◽  
Jun Zhang ◽  
Di Wei Yang ◽  
Lin Bo Luo

In this paper, we propose a novel key management scheme based on Bezier curves for hierarchical wireless sensor networks (WSNs). The design of our scheme is motivated by the idea that a Bezier curve can be subdivided into arbitrarily continuous pieces of sub Bezier curves. The subdivided sub Bezier curves are easily organized to a hierarchical architecture that is similar to hierarchical WSNs. The subdivided Bezier curves are unique and independent from each other so that it is suitable to assign each node in the WSN with a sub Bezier curve. Since a piece of Bezier curve can be presented by its control points, in the proposed key management scheme, the secret keys for each node are selected from the corresponding Bezier curve’s control points. Comparing with existing key management schemes, the proposed scheme is more suitable for distributing secret keys for hierarchical WSNs and more efficient in terms of computational and storage cost.

2016 ◽  
Vol 2016 ◽  
pp. 1-12 ◽  
Author(s):  
Gang Hu ◽  
Huanxin Cao ◽  
Suxia Zhang

Besides inheriting the properties of classical Bézier curves of degreen, the correspondingλ-Bézier curves have a good performance in adjusting their shapes by changing shape control parameter. In this paper, we derive an approximation algorithm for multidegree reduction ofλ-Bézier curves in theL2-norm. By analysing the properties ofλ-Bézier curves of degreen, a method which can deal with approximatingλ-Bézier curve of degreen+1byλ-Bézier curve of degreem  (m≤n)is presented. Then, in unrestricted andC0,C1constraint conditions, the new control points of approximatingλ-Bézier curve can be obtained by solving linear equations, which can minimize the least square error between the approximating curves and the original ones. Finally, several numerical examples of degree reduction are given and the errors are computed in three conditions. The results indicate that the proposed method is effective and easy to implement.


2010 ◽  
Vol 21 (3) ◽  
pp. 516-527 ◽  
Author(s):  
Ting YUAN ◽  
Jian-Qing MA ◽  
Yi-Ping ZHONG ◽  
Shi-Yong ZHANG

Sign in / Sign up

Export Citation Format

Share Document