Research Article

Key Updating Methods for Combinatorial Design Based Key Management Schemes

Table 6

The computation operation of the two methods.

ā€‰Generate RNPoly generationPoly evaluationHash

The sensor node in the first method100
The GM in the second method110
The sensor node in the second method00