Research Article

Key Updating Methods for Combinatorial Design Based Key Management Schemes

Table 6

The computation operation of the two methods.

 Generate RNPoly generationPoly evaluationHash

The sensor node in the first method100
The GM in the second method110
The sensor node in the second method00