Research Article

A Portable Random Key Predistribution Scheme for Distributed Sensor Network

Figure 8

The path key is compromised in the indirect encryption.   is source node and   is destination node. The attacker captures a node (the blue node) whose key ring includes key identifier 46. So the path key between   and may be eavesdropped only near the link .