Research Article
A Portable Random Key Predistribution Scheme for Distributed Sensor Network
Figure 9
The path key is compromised in the basic scheme. is source node and is destination node. The attacker captures a node (the blue node) whose key ring includes key identifiers 37 and 39. So the path key between and may be compromised at the link (-) which share the key 37, and it may also be compromised at the link (-) which share the key 39.