Research Article
A Portable Random Key Predistribution Scheme for Distributed Sensor Network
Figure 8
The path key is compromised in the indirect encryption. is source node and is destination node. The attacker captures a node (the blue node) whose key ring includes key identifier 46. So the path key between and may be eavesdropped only near the link .