Consider the family of sensor routing protocols where each sensor communicates either directly or indirectly with a base station. In turn the base station correlates and aggregates information from each sensor. Accordingly, the base station will need to verify the authenticity of the sensor, the integrity of the communication and ascertain that it is not a replay of an earlier communication. Recall the assumption that the base station is computationally robust and secure. In our protocol each sensor j shares a unique 64 bit Key Key , with the base station. Our protocol provides for a multi-hop scenario where the range of a base station.