Int. J. Advanced Networking and Applications Volume: 07 Issue: 06 Pages: 2963-2966 (2016) ISSN: 0975-0290 2963 Message Authentication Protocol for Lifetime Proficient Hash Based Algorithm in Wireless Sensor Networks Mallikarjunaswamy N J 1 Assistant Professor, S.I.E.T, Tumkur Research Scholar, Visvesvaraya Technological University, Belgaum, mallikarjuna2010@gmail.com Latha Yadav T R 2 Assistant Professor, A.I.T, Tumkur Research Scholar,Visvesvaraya Technological,University, Belgaum, chethusavi3@gmail.com Dr. Keshava Prasanna 3 Professor, Dept of CSE, C.I.T, Gubbi, Tumkur keshava2011@rediffmail.com ------------------------------------------------------------------- ABSTRACT----------------------------------------------------------------- Wireless sensor networks are self organized, autonomous, automatic discovery of services, highly scalable, reliable, Infrastructure less service. Mainly applicable in the field of disaster, healthcare. The cryptographic operations such as hash based schemes are more energy consuming (more byte transmitted indirectly consumes more energy). To avoid the energy consumption over a cryptographic operations are design of Message Authentication protocoL for Lifetime enhancement In wireless sensor networks called MALLI, which uses a famous structure of hash algorithm 2AMD-160. To demonstrate that, the execution time and the security achieved by the proposed method are more effective than the MD5 and SHA1. Keywords: Authentication; Hash function; Cryptography; Security; Wireless Sensor Networks (WSN) ------------------------------------------------------------------------------------------------------------------------------------------------ Date of Submission: May 25, 2016 Date of Acceptance: June 20, 2016 ------------------------------------------------------------------------------------------------------------------------------------------------ I. Introduction Wireless sensor network(WSN) is an Adhoc like infrastructure less network that work like self organizing sensor nodes are unattended devices that are severely constrained in terms of processing power, memory size and energy levels and tradeoff between security and energy consumption are major concerns for all application. Since WSN are resource constrained networks, we propose a pragmatic approach where we try to balance these two opposing design elements: security and resource consumption. We evaluate our proposal achieve more energy efficient compare to previous. Code dissemination protocol (eg., MNP[1], MOAP[2], Deluge[3], Freshet[4], Sprinker[5], Strean[6]) have been improved recently to propagate code images using the wireless network created by the wireless nodes. These proposed protocol generally assume well-behaves (i.e.,non malicious) sensors of all the reprogramming protocol in the literature Deluge[6] is the benchmark. Also it has been included in the tinyOS distributions. In order to secure the message transmission confidentiality measures such as encryption, decryption. On the other side, authentication allows entities to validate the integrity of message and also verify the confidentiality of the communicating devices. In the recent years much progress has been made in the design of practical one way hashing algorithms which is efficient for implementation by both hardware and software. The message digest family which consist of various algorithms such as MD2, MD4, MD5 and SHA family which produce 160,256,384,512 bit. The main purpose of this research is to produce a secure one way hashing algorithm of 160 bit to enhance the security and energy consumption. The proposed paper gives improved version of security with a less execution/run time. The more security depends on the length of MD generated by the hash functions which is limited by the size of input to the algorithm. The result shows that proposed scheme provides better security than the existing one. This paper is organized as follows: Section II presents the related work and section III presents the proposed methodology. Section IV presents the Experimental analysis. Section V contains the conclusion and future work. II. Related Work Wireless sensor networking is a wide technology to observe and extract data from the environment and has an important role in ubiquitous computing. However, these