“…(2) Each sensor node, from upper level to lower level (i.e., n k i,j , for k = 2 to L), carries out the following steps: chooses a higher sensor node as its KDC based on the best RSSI [11] ; broadcasts its hello message together with the MAC authentication; collects its neighboring list NL(n k i,j ). (3) Each sensor node, from lower level to higher level (i.e., n k i,j , for k = L down to 2), carries out the following steps: updates its master key K m = H(K I , r i ); transmits its ID and neighboring list together with the MAC to its KDC.…”