Abstract
Merkle, a well-known cryptographers, is the first to give the conception of Merkle Tree authentication, which is that a complete binary tree is used for authentication and signature of a large amount of data. In recent years, Merkle Tree applied to wireless sensor network is a hot research subject, which has already been paid much more attentions by many researchers. To handle a large number of sensor nodes, Merkle Tree will cause several practical problems such as high computing complexity, the huge memory consumption, high load of communication, validation delay, etc. Grading Merkle tree effectively relieves some of these problems. But with the rising number of sensor nodes and broader geographical scope, wireless sensor networks based on grading Merkle Tree have emerge a lot of problems such as scalability, robustness, flexibility, security, etc. In this paper, wire sensor network struction based on hierarchical Merkle Tree is proposed to solve the above problems.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Merkle, R.: Protocols for public key cryptosystems. In: Proceedings of IEEE Symposium on Research in Security and Privacy, pp. 122–136, April 1980
Ren, K., Shucheng, Yu., Lou, W., Zhang, Y.: Multi-user broadcast authentication in wireless sensor networks. IEEE Trans. Veh. Technol. 58(8), 4554–4564 (2009)
Ren, K., Lou, W., Zeng, K., Moran, P.J.: On broadcast authentication in wireless sensor networks. IEEE Trans. Wirel. Commun. 6(11), 4136–4144 (2007)
Liu, F., Cai, Y., Wang, C., Yan, C.: Research of traverse and application of Merkle authentication tree. Comput. Eng. Appl. (2011)
Narasimha, M., Tsudik, G.: DSAC. Integrity for outsourced databases with signature aggregation and chaining. In: Proceedings of the 2005 ACM CIKM International Conference on Information and Knowledge Management, Bremen, Germany, 31 October–5 November 2005, pp. 235–236 (2005)
Eric-Hall, W., Jutla, C.S.: Parallelizable authentication trees. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, vol. 3897, pp. 95–109. Springer, Heidelberg (2006)
Jakobsson, M., Leighton, T., Micali, S., Szydlo, M.: Fractal Merkle tree representation and traversal. In: RSA Cryptographers Track, RSA Security Conference (2003)
He, J., Xu, G., Fu, X., Zhou, Z.: A hybrid and efficient scheme of multicast source authentication. In: Proceedings of Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, vol. 2, pp. 123–125 (2007)
Buchmann, J., Dahmen, E., Schneider, M.: Merkle tree traversal revisited. In: Buchmann, J., Ding, J. (eds.) PQCrypto. Lecture Notes in Computer Science, vol. 5299, pp. 63–78. Springer, Heidelberg (2008)
Yuan, H., Atallah, M.J.: Effcient distributed third-party data authentication for tree hierarchies. In: International Conference on Distributed Computing Systems, vol. 5, no. 3, pp. 184–193 (2008)
Kundu, A., Bertino, E.: Structural signature for tree data structures. Proc. VLDB Endow. 1(1), 138–150 (2008)
Jutla, C., Yung, M.: PayTree. Amortized-signature for flexible micropayments. In: 2nd USENIX Workshop on Electronic Commerce, pp. 213–221 (1996)
Chen, L.: An effcient group key agreement scheme for MANETs based on Merkle identity tree. In: 2010 Second WRI World Congress on Software Engineering, vol. 16, pp. 151–154 (2010)
Santhanam, L., Xie, B., Agrawal, D.P.: Secure and efficient authentication in wireless mesh networks using merkle trees, pp. 966–972 (2008)
Zhou, J., Li, C., Cao, Q., et al.: An intrusion-tolerant secure routing protocol with key exchange for wireless sensor network. In: International Conference on Information and Automation, ICIA 2008, pp. 1547–1552 (2008)
Song, F., Zhao, B.: Trust-based LEACH protocol for wireless sensor networks. In: Second International Conference on Future Generation Communication and Networking, FGCN 2008, pp. 202–207 (2008)
Kondratieva, V., Seo, S.-W.: Optimized hash tree for authentication in sensor networks. IEEE Commun. Lett. 11, 149–151 (2007)
Perrig, A., Stankovic, J., Wagner, D.: Security in wireless sensor networks. Commun. ACM 47(6), 53–57 (2004)
Jiang, Y., Shi, H., Zhao, H.: Strangy for broadcast authentication in wireless sensor networks based on hierarchical Merkle tree. J. Syst. Simul. 19(24), 5700–5704 (2007)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
You, S., Xue, F., Qi, Z., Liu, H. (2019). Wireless Sensor Network Protocol Based on Hierarchical Merkle Tree. In: Sun, S. (eds) Signal and Information Processing, Networking and Computers. ICSINC 2018. Lecture Notes in Electrical Engineering, vol 494. Springer, Singapore. https://doi.org/10.1007/978-981-13-1733-0_2
Download citation
DOI: https://doi.org/10.1007/978-981-13-1733-0_2
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-1732-3
Online ISBN: 978-981-13-1733-0
eBook Packages: EngineeringEngineering (R0)