I. Introduction
Wireless sensor networks offer economically solutions for various applications, and they are increasingly deployed in security-critical areas [1], such as battle field. Wireless sensor networks must not only report each event promptly, but also reject false reports and tampered data packets. However, sensor nodes are not made tamper-proof due to cost constraints. Therefore, sensor nodes containing the keys or communication protocols, could be captured and analyzed easily [2] [3] [4] after deployment. Then they may be forged and put back into sensor networks without being noticed. Finally, the adversary may launch a variety of attacks [5] [6], such as selective forward data and tamper data. Further more, wireless sensor nodes are powered by batteries, so they only have limited energy capacity [7], and the computation and communication cost should be strictly controlled. These circumstances pose critical challenges to protocol designers.