Key Related Work(cont d) Summary of limitations a No security oriented network hierarchy a Random key pre-distribution schemes encounter the key exchange Issue Large storage of pre-loaded keys Large number of key exchanges O Localization information needed for establishing network architecture O No energy analysis for secure routing a Resilience against node compromise w/o tamper resistant hardwareKey Related Work (cont’d) Summary of Limitations ❑ No security oriented network hierarchy ❑ Random key pre-distribution schemes encounter the key exchange issue ➢ Large storage of pre-loaded keys ➢ Large number of key exchanges ❑ Localization information needed for establishing network architecture ❑ No energy analysis for secure routing ❑ Resilience against node compromise w/o tamper resistant hardware 7