From: Providing perfect forward secrecy for location-aware wireless sensor networks
AP[5]
SECK[2]
Our scheme
Prior to deployment
l
k + m + 1
1
After deployment
l + n + 1
k + 2
n + 1