Research Article

A Portable Random Key Predistribution Scheme for Distributed Sensor Network

Figure 9

The path key is compromised in the basic scheme.  is source node and is destination node. The attacker captures a node (the blue node) whose key ring includes key identifiers 37 and 39. So the path key between and may be compromised at the link (-) which share the key 37, and it may also be compromised at the link (-) which share the key 39.