Skip to main content

Wireless Sensor Network Protocol Based on Hierarchical Merkle Tree

  • Conference paper
  • First Online:
Signal and Information Processing, Networking and Computers (ICSINC 2018)

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 494))

Abstract

Merkle, a well-known cryptographers, is the first to give the conception of Merkle Tree authentication, which is that a complete binary tree is used for authentication and signature of a large amount of data. In recent years, Merkle Tree applied to wireless sensor network is a hot research subject, which has already been paid much more attentions by many researchers. To handle a large number of sensor nodes, Merkle Tree will cause several practical problems such as high computing complexity, the huge memory consumption, high load of communication, validation delay, etc. Grading Merkle tree effectively relieves some of these problems. But with the rising number of sensor nodes and broader geographical scope, wireless sensor networks based on grading Merkle Tree have emerge a lot of problems such as scalability, robustness, flexibility, security, etc. In this paper, wire sensor network struction based on hierarchical Merkle Tree is proposed to solve the above problems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Merkle, R.: Protocols for public key cryptosystems. In: Proceedings of IEEE Symposium on Research in Security and Privacy, pp. 122–136, April 1980

    Google Scholar 

  2. Ren, K., Shucheng, Yu., Lou, W., Zhang, Y.: Multi-user broadcast authentication in wireless sensor networks. IEEE Trans. Veh. Technol. 58(8), 4554–4564 (2009)

    Article  Google Scholar 

  3. Ren, K., Lou, W., Zeng, K., Moran, P.J.: On broadcast authentication in wireless sensor networks. IEEE Trans. Wirel. Commun. 6(11), 4136–4144 (2007)

    Article  Google Scholar 

  4. Liu, F., Cai, Y., Wang, C., Yan, C.: Research of traverse and application of Merkle authentication tree. Comput. Eng. Appl. (2011)

    Google Scholar 

  5. Narasimha, M., Tsudik, G.: DSAC. Integrity for outsourced databases with signature aggregation and chaining. In: Proceedings of the 2005 ACM CIKM International Conference on Information and Knowledge Management, Bremen, Germany, 31 October–5 November 2005, pp. 235–236 (2005)

    Google Scholar 

  6. Eric-Hall, W., Jutla, C.S.: Parallelizable authentication trees. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, vol. 3897, pp. 95–109. Springer, Heidelberg (2006)

    Google Scholar 

  7. Jakobsson, M., Leighton, T., Micali, S., Szydlo, M.: Fractal Merkle tree representation and traversal. In: RSA Cryptographers Track, RSA Security Conference (2003)

    Google Scholar 

  8. He, J., Xu, G., Fu, X., Zhou, Z.: A hybrid and efficient scheme of multicast source authentication. In: Proceedings of Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, vol. 2, pp. 123–125 (2007)

    Google Scholar 

  9. Buchmann, J., Dahmen, E., Schneider, M.: Merkle tree traversal revisited. In: Buchmann, J., Ding, J. (eds.) PQCrypto. Lecture Notes in Computer Science, vol. 5299, pp. 63–78. Springer, Heidelberg (2008)

    Google Scholar 

  10. Yuan, H., Atallah, M.J.: Effcient distributed third-party data authentication for tree hierarchies. In: International Conference on Distributed Computing Systems, vol. 5, no. 3, pp. 184–193 (2008)

    Google Scholar 

  11. Kundu, A., Bertino, E.: Structural signature for tree data structures. Proc. VLDB Endow. 1(1), 138–150 (2008)

    Article  Google Scholar 

  12. Jutla, C., Yung, M.: PayTree. Amortized-signature for flexible micropayments. In: 2nd USENIX Workshop on Electronic Commerce, pp. 213–221 (1996)

    Google Scholar 

  13. Chen, L.: An effcient group key agreement scheme for MANETs based on Merkle identity tree. In: 2010 Second WRI World Congress on Software Engineering, vol. 16, pp. 151–154 (2010)

    Google Scholar 

  14. Santhanam, L., Xie, B., Agrawal, D.P.: Secure and efficient authentication in wireless mesh networks using merkle trees, pp. 966–972 (2008)

    Google Scholar 

  15. Zhou, J., Li, C., Cao, Q., et al.: An intrusion-tolerant secure routing protocol with key exchange for wireless sensor network. In: International Conference on Information and Automation, ICIA 2008, pp. 1547–1552 (2008)

    Google Scholar 

  16. Song, F., Zhao, B.: Trust-based LEACH protocol for wireless sensor networks. In: Second International Conference on Future Generation Communication and Networking, FGCN 2008, pp. 202–207 (2008)

    Google Scholar 

  17. Kondratieva, V., Seo, S.-W.: Optimized hash tree for authentication in sensor networks. IEEE Commun. Lett. 11, 149–151 (2007)

    Article  Google Scholar 

  18. Perrig, A., Stankovic, J., Wagner, D.: Security in wireless sensor networks. Commun. ACM 47(6), 53–57 (2004)

    Article  Google Scholar 

  19. Jiang, Y., Shi, H., Zhao, H.: Strangy for broadcast authentication in wireless sensor networks based on hierarchical Merkle tree. J. Syst. Simul. 19(24), 5700–5704 (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Siqing You .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

You, S., Xue, F., Qi, Z., Liu, H. (2019). Wireless Sensor Network Protocol Based on Hierarchical Merkle Tree. In: Sun, S. (eds) Signal and Information Processing, Networking and Computers. ICSINC 2018. Lecture Notes in Electrical Engineering, vol 494. Springer, Singapore. https://doi.org/10.1007/978-981-13-1733-0_2

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-1733-0_2

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-1732-3

  • Online ISBN: 978-981-13-1733-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics