Research Article
Key Updating Methods for Combinatorial Design Based Key Management Schemes
Table 6
The computation operation of the two methods.
| ā | Generate RN | Poly generation | Poly evaluation | Hash |
| The sensor node in the first method | 1 | 0 | 0 | | The GM in the second method | 1 | 1 | 0 | | The sensor node in the second method | 0 | 0 | | |
|
|