However, the major disadvantage of this protocol, which can influence the network most, is that
it only consists of a single base station and assumes that it is never compromised [7]. Other
drawbacks include security weakness that is present during the process of key establishment,
and the high cost of capacity needed to store the four different keys for each node, when the
number of nodes is small.