“…This is a common problem which exists in many tree-based key management schemes. The existing ones such as [4,9,7,10,11,12,13,14,15,16,17,18,19] could work perfectly, only when all legitimate node users are authorized to access all the child nodes under the specific one.…”