**5. Conclusion**

*Wireless Mesh Networks - Security, Architectures and Protocols*

that needs one more processing step to output digest [4].

the system captures it, process it to make fused semi-digest [4].

client's identification has been matched [4].

**4. The protocol analysis in WSNs**

**Algorithm Biometric** 

Murvet et al. [4]

Soutar et al. [9, 10]

Davida et al. [11, 12]

Monrose et al. [14]

Linnartz et al. [17]

Juels and Sudan [20]

Clancy et al. [21]

**Table 1.**

**representation**

*Comparison between various algorithms.*

nobody even system itself can identify the owner and the biometric property of the corresponding digest. Different digests of client will be fused with homomorphic operation. Additionally, he/she cannot misused available digests, because at authentication request time or online mode, system accept just semi-digest data as input

After generating all of fused digests, all of primary information is safely erased from the cache memory and the digest is transmitted to the system database. The database is set of all original digests whose owners and biometric properties are unknown. Hereafter, if an individual wants to enter the system, the system will be able to identify him/her correctly as an authorized/unauthorized client [4].

After completing the enrollment phase and enrolling clients' digests, the system

runs verification process, i.e., it enters the verification time of the protocol. An individual who request for authentication, enters his/her biometric information and

From now one, the protocol starts comparing algorithms. It firstly combines semi-digest with the secret parameter of the system to generate the corresponding digest. This digest will be compared with available digests in the database. This matching will be carried out using computation of the Hamming Distance measure of four parameters: (1) the stored digest, (2) its mask vector, (3) the new digest, and (4) its mask vector. If the obtained HD is fewer than value of threshold *τ*, the

In this section, we compare the scheme [4] with those of [9–12, 14, 17, 20, 21]. Moreover, we review properties of the protocol that were performed on a single core of an Intel®, Pentium® D, 3:2Ghz processor, using MATLAB R2016a. Also we used

In this case, we installed the Java Genetic Algorithm Package (JPAC) to test the algorithm in a manner consistent with prior studies. Next, we utilized OMNET++ to

**Practicality Sensitivity to** 

**invariance**

**Security Efficiency in WSNs**

**preservation**

Fingerprint, iris G H H L H L

Fingerprint R H M H U M

Iris G H H L U L

Keystroke, voice G H H H M M

No evaluation G H L L H L

No evaluation G H H L H H

Fingerprint G H H M H H

Miracle library in binary fields [32] for some mathematical operations.

trace the movement of the nodes in a virtual environment.

**Classification Privacy** 

**62**

Wireless sensor networks are flexible and useful networks for securing critical data through biometric authentications. However, they are powered by nodes equipped by the limited capacity batteries. On the other hand, biometric authentication brings greater convenience to users than other authentication systems. This method can perfectly protect legitimated users and data against internal malicious and external frauds. Moreover, this measures and analyzes user's unique information for automatically recognizing user's identification. The first five most common traits are fingerprint, hand, eye/Iris, face and voice that would be transmitted through WSN. In this study, we utilized Iris and fingerprint to make a strong biometric authentication system in WSN. The scheme proposed in [4] was the more efficient in terms of applicable efficiency in WSN in comparison with similar studies. As a future work, the system will be able to operate in any networks by applying property of "Boolean identification." Further, by studying other difficult problems, we will improve this study to gain linear time efficiency. These new properties help networks to transmit data securely and efficiently in any sensitive network.
