**1. Introduction**

A biometry of a person is a physical/logical property that is obtained from trait of the person. Since traits, details vary from person to person and no two people have the same trait, so the trait can be used as an ID in authentication/identification systems. Trait is a biological property of a person like fingerprint, retinal, iris, deoxyribonucleic acid (DNA), etc. The biometric authentication system collects traits of legitimate persons and stores them in database safely in order to use for identification of them in verification time, access time to data or place, etc. Moreover, implementing an authentication system through biometric data can create a secure guarded port for secure data or a place. This biometric security system is a lock and capture mechanism for access control [1]. In order to develop such a system, traits of legitimate persons should be scanned and stored in a safe database. When biometric security system is activated for authentication, it verifies and matches traits of persons with ones in database [1].

Wireless sensor networks (WSNs) are general networks that are employed in several applications, including military, medical. In all these cases, data security

**56**

*Wireless Mesh Networks - Security, Architectures and Protocols*

on Computing for Sustainable Global Development (INDIACom). 2016

[10] Zhu S, Setia S, Jajodia S. Leap+: Efficient security mechanisms for largescale distributed sensor networks. ACM Transactions on Sensor Networks. Nov.

[11] Hoa LV, Vinh TQ. Real-time key Management for Wireless Mesh Network. Journal of Telecommunication, Electronic and Computer Engineering.

[12] Whittaker ET, Robinson G. Lagrange's formula of interpolation. In: The Calculus of Observations: A Treatise on Numerical Mathematics. 4th ed. New York: Dover; 1976.

2006;**2**(4):500-528

2018;**10**(2-6):13-18

pp. 28-30

[1] Akyildiz F, Wang X, Wang W. Wireless mesh networks: A survey. Elsevier Journal of Computer Networks.

[2] Siddiqui MS, Hong CS. Security issues in wireless mesh networks. In: Proceedings of the International Conference on Multimedia and Ubiquitous Engineering (MUE'07). New York: IEEE Press; 2007. pp. 41-47

[3] Agarrwal S, Gupta N. Authentication and key management in wireless mesh network. MIT International Journal of Computer Science & Information Technology. Aug. 2012;**2**(2):70-74

[4] Gao L, Chang E, Parvin S, Han S, Dillon T. A secure key management model for wireless mesh networks. IEEE

[5] Shamir A. How to share a secret. Communications of the ACM.

[6] Li F, Xin X, Hu Y. Key management in ad hoc networks using self-certified public key system. International Journal of Mobile Communications.

[7] Lan Y, Wu C, Zhang Y. A secretsharing based key management in wireless sensor network. 4th IEEE International Conference on Software Engineering and Service Science

[8] Gandino F, Ferrero R, Montrucchio B, Rebaudengo M. Fast hierarchical key management scheme with transitory master key for wireless sensor networks. IEEE Internet of Things Journal. 2016

[9] Singh A, Awasthi AK, Singh K. Lightweight multilevel key management scheme for large scale wireless sensor network. In: International Conference

AINA. 2010:655-660

1979;**22**(11):612-613

2007;**5**(1):94-106

(ICSESS). 2013

2005;**47**(4):445-487

**References**

and energy usage are the determining factors in the performance of critical applications. Consequently, methods of protecting and transferring data to the base station are very important because the sensor nodes run on battery power and the energy available for sensors is limited [2].

In order to implement a flexible biometric security system, we need a favorite channel for transmitting information/data. This channel should be a safe and quick passage to transmit biological traits information/data. Since most of the time, accessing secure channel is costly or impossible, we would use a WSN channel for connecting capturing equipment such as scanner to DB. Obviously, this kind of network is not an enough safe passage for transferring highly secure information/ data, because an enemy may capture secure data being transmitted. Therefore, we should code or encrypt them such that it may be incomprehensible for others and enemies are not able to abuse them. This process could be done by integrating with a biometric cryptography algorithms and WSNs [3].

Moreover, we use cryptographic algorithms for raw highly secure information to convert them to ciphertext. This task provides security as well as privacy.

Current authentication systems mostly are based on ID and password authentication system. Password is a combination of characters, numbers and letters that should be renewed in certain periods to prevent unauthorized people accesses. In order to provide an almost perfect secure system, a biometric security system can be implemented for authentication. But as mentioned above, the main problem is sending and receiving secure data/matching result through unsafe network. It means that network security should be considered as part of security performance for evaluation of security level of a biometric security system [3].

In this paper, we investigate a biometric security system proposed in [4] in WSNs. It saves a print of individual biometric traits through especial framework called "digest," which is output of a one-way function. This framework supplies perfect security without carrying out any encryption or decryption processes. Therefore, it would be a good selection for privacy preserving of users who wish to be authorized through a WSN. In order to make highly memory performance homomorphic property is utilized. This issue improves the algorithm energy consumption in WSN. Finally, Hamming distance measurement is used to compare stored data with newly created data to make decision of matched or mismatched in based node.
