several efforts are made through the use of the keying mechanisms to
ensure that a compromised node is revoked or at least prevent it from slowing the network
operations. On the other hand, the LEAP protocol lacks in preventing attacks on the base station
itself, which happens to be very critical as the base station covers a large network operational
area.