The special needs for cryptography, of both wired and wireless networks, have attracted the researchers’ major interest in the design of new security schemes. This work deals with the access control in network hierarchy. More analytically, an efficient architecture and the implementation of a key management protocol are proposed in this paper. This protocol main philosophy is centered in the usage of hash functions. Alternative hash functions have been implemented and studied, in order to select between the most efficient proposed architecture, concerning both performance and allocated resources. Finally the dynamic access of the system is presented. The proposed system could be applied efficiently in networks with multi-nodes and multi-users authentication demands, providing high speed performance and high level security strength.