Handover keying is like having a spare key for your house that you give to your friend, so they can come in when you're not home. Just like how you trust your friend to have the spare key and take care of your house, in handover keying, one device in a network gives its secret key to another device so that it can authenticate itself and securely transmit data.
Say, you have a bunch of friends who all come over to play in your yard. You have a big gate that they need to unlock to come in. But, you only want your best friend to have the ability to unlock the gate and let others in because you trust him the most. So, you give him the spare key to the lock. But, you also make sure that the key is secure, so it cannot be copied or stolen by someone else.
Similarly, in a computer network, devices want to talk securely with each other, but they need to confirm each other's identity first. One device may give the other its secret key to use to prove its authenticity, but they have to do it in a way that keeps the key safe from hackers. This is called handover keying, and it is an essential part of ensuring secure communication between devices in a network.