Message and Its Origin Authentication Protocol for Data Aggregation in Sensor Networks

  • HongKi Lee
  • DaeHun Nyang
  • JooSeok Song
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4097)


In distributed sensor networks, the researches for authentication in sensor network have been focused on broadcast authentication. In this paper, we propose a message and its origin authentication protocol for data aggregation in sensor networks, based on one way hash chain and Merkle tree authentication with pre-deployment knowledge. Proposed protocol provides not only for downstream messages but also for upstream messages among neighbors, and it solves the secret value update issue with multiple Merkle trees and unbalanced energy consumption among sensor nodes with graceful handover of aggregator. In treating compromised node problem, our protocol provides an equivalent security level of pair-wise key sharing scheme, while much less memory requirements compared to pair-wise key sharing scheme.


sensor networks aggregation authentication Merkle tree hash chain 


  1. 1.
    Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.D.: SPINS: Security Protocols for Sensor Networks. In: Proceedings of the MOBICOM (2001)Google Scholar
  2. 2.
    Liu, D., Ning, P.: Multilevel μTESLA: Broadcast Authentication for Distributed Sensor Networks. ACM Transactions on Embedded Computing Systems 3(4), 800–836 (2004)CrossRefGoogle Scholar
  3. 3.
    Liu, D., Ning, P., Zhu, S., Jajodia, S.: Practical Broadcast Authentication in Sensor Networks. In: Proceedings of the MobiQuitous (2005)Google Scholar
  4. 4.
    Merkle, R.: Protocols for public key cryptosystems. In: Proceedings of the IEEE Symposium on Research in Security and Privacy (1980)Google Scholar
  5. 5.
    Heinzelman, W., Chandrakasan, A., Balakrshnan, H.: Energy-efficient communication protocol for wireless sensor network. In: Proceedings of the HICSS (2000)Google Scholar
  6. 6.
    Lindsey, S., Raghavendra, C.: PEGASIS: Power-Efficient gathering in sensor information systems. In: Proceedings of the IEEE Aerospace Conference, vol. 3, pp. 1125–1130 (2002)Google Scholar
  7. 7.
    Du, W., Deng, J., Han, Y.S., Chen, S., Varshney, P.K.: A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge. In: Proceedings of the IEEE INFOCOM (2004)Google Scholar
  8. 8.
    Eschenauer, L., Gligor, V.: A Key Management Scheme for Distributed Sensor Networks. In: Proceedings of the ACM CCS (2002)Google Scholar
  9. 9.
    Ganesan, P., Venugopalan, R., Peddabachagari, P., Dean, A., Mueller, F., Sichitiu, M.: Analyzing and modeling encryption overhead for sensor network nodes. In: Proceedings of the ACM WSNA (2003)Google Scholar
  10. 10.
    Wander, A.S., Gura, N., Eberle, H., Gupta, V., Shantz, S.C.: Enery Analysis of Public-Key Cryptography for Wireless Sensor Networks. In: Proceedings of the IEEE PerCom (March 2005)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • HongKi Lee
    • 1
  • DaeHun Nyang
    • 2
  • JooSeok Song
    • 1
  1. 1.Department of Computer ScienceYonsei UniversitySeoulKorea
  2. 2.Graduate School of Information Technology and TelecommunicationsInha UniversityIncheonKorea

Personalised recommendations