The advantages of this protocol are simply that it reduces the participation of a base station and
it is efficient in terms of communication and energy. Its security purposes mainly cover local
communication such as routing information and protecting messages sent from the nodes. The
establishment of this key allows nodes to decrypt and authenticate certain messages like
readings from neighboring nodes. Therefore, LEAP permits the use of cluster keys which one
node may use to protect its data allowing only authenticated neighboring nodes to obtain and
decrypt this data.