“…For static key management schemes, the network resilience against node capture can be further enhanced by using the key polynomials (as in [40]) or deployment location [20,38,39]. Examples of static key management schemes include [9,15,16,20,21,25,29,[37][38][39]41] and dynamic key management schemes are [10,24,42]. In [24], Eltoweissy et al [24] proposed a dynamic key management system, called exclusion-based system (EBS).…”