Table of Contents Author Guidelines Submit a Manuscript
Journal of Sensors
Volume 2014, Article ID 134357, 8 pages
http://dx.doi.org/10.1155/2014/134357
Research Article

Key Updating Methods for Combinatorial Design Based Key Management Schemes

1College of Business Administration, Zhejiang Gongshang University, Hangzhou 310018, China
2Contemporary Business and Trade Research Center, Zhejiang Gongshang University, Hangzhou 310018, China
3Contemporary Business and Collaborative Innovation Research Center, Zhejiang Gongshang University, Hangzhou 310018, China
4College of Computer Science & Information Engineering, Zhejiang Gongshang University, Hangzhou 310018, China

Received 27 April 2014; Accepted 12 June 2014; Published 1 July 2014

Academic Editor: Gongfa Li

Copyright © 2014 Chonghuan Xu and Weinan Liu. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Abstract

Wireless sensor network (WSN) has become one of the most promising network technologies for many useful applications. However, for the lack of resources, it is different but important to ensure the security of the WSNs. Key management is a corner stone on which to build secure WSNs for it has a fundamental role in confidentiality, authentication, and so on. Combinatorial design theory has been used to generate good-designed key rings for each sensor node in WSNs. A large number of combinatorial design based key management schemes have been proposed but none of them have taken key updating into consideration. In this paper, we point out the essence of key updating for the unital design based key management scheme and propose two key updating methods; then, we conduct performance analysis on the two methods from three aspects; at last, we generalize the two methods to other combinatorial design based key management schemes and enhance the second method.