“…The most commonly used solution is the probabilistic schemes (Xiao et al, 2007;Traynor et al, 2006;Al-Haija, 2010;Silva et al, 2008;Sohraby et al, 2007;Dong-Mei and Bing, 2006;Khalil and Ozdemir, 2012;Chan et al, 2003;Du et al, 2005;2004;Kuchipudi and Basha, 2012). Eschenauer and Gligor (2002) and Xiao et al (2007) were the forerunner to build the first algorithm based probability using the random graph theory that is called the basic scheme, this scheme contains 3 phases: Key pre-distribution phase (where key pool generates a large number of keys P, then each node randomly selects Science Publications JCS number of keys K which called key ring), shared key discovery phase (in this phase any two nodes can establish a secure link if they shared a common key in their key rings) and, key path establishment phase (each node tries to establish a path-key with any node in their transmission range but do not share a common key with it).…”