Research Article

A Portable Random Key Predistribution Scheme for Distributed Sensor Network

Figure 7

The path key is compromised in the direct encryption.   is source node and is destination node. The attacker captures a node (the blue node) whose key ring includes key identifier 19. So the path key between and may be eavesdropped at anywhere near the path (-----), for example, at the link (-).