shows the scenario of a compromised node. The node that is labelled symbolizes a
node that has been hacked. As mentioned throughout this paper, the LEAP protocol is very
efficient when it comes to dealing with compromised nodes. With its key refreshing and
revocation schemes, if a node is affected, these mechanisms prove advantageous. With the many
keys assigned to all the sensor nodes with its periodic updates, if one of the nodes is unable to
decrypt an updated key, the compromised node will not be able to further participate in the data
transmission which will then inform the surrounding nodes and eventually the base station that
this node is no longer wanted. The compromised node will be removed.