C. Secret sharing scheme
In the system, we use (k, n) threshold method [5]. A source node encrypts and sends the data with n shares to a destination node, and the destination node decrypts it by collecting k of n shares. Even if the share was lost due to eavesdropping and packet loss, the destination node can decrypt it if the total number of received shares is equal to or larger than k.