Comparison between various algorithms.
Since the security of biometric information may be threatened by network attacks, presenting individual’s information without a suitable protection is not suitable for authorization. In traditional cryptographic systems, security was done using individual’s password(s) or driving some other data from primary information as secret key(s). However, encryption and decryption algorithms are slow and contain time-consuming operations for transferring data in network. Thus, it is better that we have no need to decrypt an encrypted trait of an enrolled person, and the system can encrypt the user trait with the user’s passwords and then compare the results with the enrolled persons’ encrypted data stored in database. In this chapter, by considering wireless sensor networks and authenticating server, we introduce a new concept called “digest” and deal with its efficiency in dealing with the security problem. A “digest” can be derived from any kind of information trait through which nobody can capture any information of primary biometric traits. We show that this concept leads to the increase of the accuracy and accessibility of a biometric system.
- biometric authentication
- wireless sensor networks
- system security
A biometry of a person is a physical/logical property that is obtained from trait of the person. Since traits, details vary from person to person and no two people have the same trait, so the trait can be used as an ID in authentication/identification systems. Trait is a biological property of a person like fingerprint, retinal, iris, deoxyribonucleic acid (DNA), etc. The biometric authentication system collects traits of legitimate persons and stores them in database safely in order to use for identification of them in verification time, access time to data or place, etc. Moreover, implementing an authentication system through biometric data can create a secure guarded port for secure data or a place. This biometric security system is a lock and capture mechanism for access control . In order to develop such a system, traits of legitimate persons should be scanned and stored in a safe database. When biometric security system is activated for authentication, it verifies and matches traits of persons with ones in database .
Wireless sensor networks (WSNs) are general networks that are employed in several applications, including military, medical. In all these cases, data security and energy usage are the determining factors in the performance of critical applications. Consequently, methods of protecting and transferring data to the base station are very important because the sensor nodes run on battery power and the energy available for sensors is limited .
In order to implement a flexible biometric security system, we need a favorite channel for transmitting information/data. This channel should be a safe and quick passage to transmit biological traits information/data. Since most of the time, accessing secure channel is costly or impossible, we would use a WSN channel for connecting capturing equipment such as scanner to DB. Obviously, this kind of network is not an enough safe passage for transferring highly secure information/data, because an enemy may capture secure data being transmitted. Therefore, we should code or encrypt them such that it may be incomprehensible for others and enemies are not able to abuse them. This process could be done by integrating with a biometric cryptography algorithms and WSNs .
Moreover, we use cryptographic algorithms for raw highly secure information to convert them to ciphertext. This task provides security as well as privacy.
Current authentication systems mostly are based on ID and password authentication system. Password is a combination of characters, numbers and letters that should be renewed in certain periods to prevent unauthorized people accesses. In order to provide an almost perfect secure system, a biometric security system can be implemented for authentication. But as mentioned above, the main problem is sending and receiving secure data/matching result through unsafe network. It means that network security should be considered as part of security performance for evaluation of security level of a biometric security system .
In this paper, we investigate a biometric security system proposed in  in WSNs. It saves a print of individual biometric traits through especial framework called “digest,” which is output of a one-way function. This framework supplies perfect security without carrying out any encryption or decryption processes. Therefore, it would be a good selection for privacy preserving of users who wish to be authorized through a WSN. In order to make highly memory performance homomorphic property is utilized. This issue improves the algorithm energy consumption in WSN. Finally, Hamming distance measurement is used to compare stored data with newly created data to make decision of matched or mismatched in based node.
2. Related work
There are many studies that present power complexity efficiency methods in wireless sensor networks. These studies applied natural algorithms including genetic algorithm to find best method for transferring data [3, 4, 5].
The primary authentication mechanism is fingerprint whereas it is currently being pushed by the majority of smartphone/personal computer vendors. This solution is so simple due to the fact that our fingerprints could be obtained from everywhere that we were and touched before [6, 7]. Therefore, utilizing some individuals features are recommended to be used as a standalone authentication approach. Most of the smartphone vendors install an additional camera to obtain the fingerprint .
Davida et al. [11, 12] proposed the iris based biometric for, authentication process. Moreover, binary representation of iris texture, called IrisCode  is considered. Also the Hamming distance compared the input and database template representations with a threshold to determine the matching result.
Monrose et al.  combined passwords with keystroke biometrics in secure way. Their technique was inspired by password “salting.” Disadvantage of this method is that it only adds about 15 bits of entropy to the passwords. This leads marginally security. In [15, 16] they made some minor modifications to their primary work. They applied voice biometrics instead of keystroke. Tuyls et al. in [17, 18] supposed that all template are noise-free of a biometric identifier. Thus, they used them directly in to generate a secret named helper data W.
Juels and Wattenberg Davida et al.’s methods [11, 12] to tolerate variance in “fuzzy commitment” scheme . This provides more strong security. Juels and Sudan  showed the security of the fuzzy vault scheme in an information-theoretic sense. Clancy et al.  extended Juels and Sudan  work. Moreover, they used “fingerprint vault” for multiple (typically five) fingerprints of users.
Michelin et al.  proposed the use of the smartphone’s camera for facial and iris recognition by the decision-making using the cloud. Another work on biometric authentication for an Android device  showed an increased level of higher task efficiency achieved using various solution. In , authors studied the usability and practicality of biometric authentication in the workplace and concluded that the ease of technology utilization and its environmental context play a vital role while the integration and the adoption will always incur additional and unexpected resource costs.
The gesture-related user experience research conducted in [25, 26, 27, 28] showed that security and user experience do not necessarily need to contradict each other. This work also promoted pleasure as the best way for fast technology adoption. In , authors addressed the usability of the ECG solution for authentication and concluded that the application of ECG is not yet suitable for dynamic real-life scenarios.
3. The protocol
Here, we explain the proposed biometric cryptosystem  based on Finite Composite order group as well as a figure that clears logical relationship between important parts of the system (Figure 1). The security degree of the system depends on a hard DLP .
For a high security level (with selection of very large factors), factoring N (if N = nm such that (n, m) are coprime numbers) is impossible. Disadvantage of this technique is that performing group operation for large composite groups is slow leading to complicated operations. This system is based on a special
Let d be a security parameter of the system. Let m, p and q denote very large random prime numbers in which and . We define and as modulus for biometric trait. Also we know that .
In Eq. (1) is the inverse of and is the inverse of . Also .
We choose public system parameters as , and master secret key as . Where G be a cyclic group with generator and . Also, and so should kept secret.
3.2 Enrollment (UK, SK, X)
In this phase, we measure biometric trait (
For every client and erases, all values except
3.3 Verification (UK, X
In authentication time, client calculates following equation:
In Eq. (3),
Correctness: we now describe that how verification performs efficiently. From Eq. (4), we have:
Homomorphic verification: the scheme turns out to be useful in homomorphic verification over an additive group, i.e., if be randomized biometric digest , with respect to the public parameter
HD measuring (M, D, M′, D′): the protocol check HD of parameter of Eq. (8), with all one in database along with their mask vectors. Note that:
Matching (HD, ι): Now the protocol compare obtained value to make final output according to Eq. (9)
The protocol includes two main phases: enrolment and verification. Every user should be enrolled through entering his/her biometric features using available instruments in the enrolment phase . These instruments capture images and then process them to output vectors of
The protocol does not save original information in database. Instead, the protocol keeps the information in cache for just some seconds in order to process it using mathematical one-way functions and convert it to different data with different formats and natures. The final processed data
After generating all of fused digests, all of primary information is safely erased from the cache memory and the digest is transmitted to the system database. The database is set of all original digests whose owners and biometric properties are unknown. Hereafter, if an individual wants to enter the system, the system will be able to identify him/her correctly as an authorized/unauthorized client .
After completing the enrollment phase and enrolling clients’ digests, the system runs verification process, i.e., it enters the verification time of the protocol. An individual who request for authentication, enters his/her biometric information and the system captures it, process it to make fused semi-digest .
From now one, the protocol starts comparing algorithms. It firstly combines semi-digest with the secret parameter of the system to generate the corresponding digest. This digest will be compared with available digests in the database. This matching will be carried out using computation of the Hamming Distance measure of four parameters: (1) the stored digest, (2) its mask vector, (3) the new digest, and (4) its mask vector. If the obtained HD is fewer than value of threshold
4. The protocol analysis in WSNs
In this section, we compare the scheme  with those of [9, 10, 11, 12, 14, 17, 20, 21]. Moreover, we review properties of the protocol that were performed on a single core of an Intel®, Pentium® D, 3:2Ghz processor, using MATLAB R2016a. Also we used Miracle library in binary fields  for some mathematical operations.
In this case, we installed the Java Genetic Algorithm Package (JPAC) to test the algorithm in a manner consistent with prior studies. Next, we utilized OMNET++ to trace the movement of the nodes in a virtual environment.
In Table 1, a comparison between various algorithms in WSNs: the proposed scheme in , Soutar et al. [9, 10], Davida et al. [11, 12], Monrose et al. , Linnartz and Tuyls , Juels and Sudan , and Clancy et al.  are given. The third column in Table 1 indicates the key release (R) or key generation (G) classification. Column “Practicality” deals with the complexity of the algorithm. Last column shows the efficiency of algorithms in WSNs.
|Algorithm||Biometric representation||Classification||Privacy preservation||Practicality||Sensitivity to invariance||Security||Efficiency in WSNs|
|Murvet et al. ||Fingerprint, iris||G||H||H||L||H||L|
|Soutar et al. [9, 10]||Fingerprint||R||H||M||H||U||M|
|Davida et al. [11, 12]||Iris||G||H||H||L||U||L|
|Monrose et al. ||Keystroke, voice||G||H||H||H||M||M|
|Linnartz et al. ||No evaluation||G||H||L||L||H||L|
|Juels and Sudan ||No evaluation||G||H||H||L||H||H|
|Clancy et al. ||Fingerprint||G||H||H||M||H||H|
The protocol operates based on new concept
This concept also improved efficiency of identification operation in cost and time as well as it is safe enough to customize for any application.
Wireless sensor networks are flexible and useful networks for securing critical data through biometric authentications. However, they are powered by nodes equipped by the limited capacity batteries. On the other hand, biometric authentication brings greater convenience to users than other authentication systems. This method can perfectly protect legitimated users and data against internal malicious and external frauds. Moreover, this measures and analyzes user’s unique information for automatically recognizing user’s identification. The first five most common traits are fingerprint, hand, eye/Iris, face and voice that would be transmitted through WSN. In this study, we utilized Iris and fingerprint to make a strong biometric authentication system in WSN. The scheme proposed in  was the more efficient in terms of applicable efficiency in WSN in comparison with similar studies. As a future work, the system will be able to operate in any networks by applying property of “Boolean identification.” Further, by studying other difficult problems, we will improve this study to gain linear time efficiency. These new properties help networks to transmit data securely and efficiently in any sensitive network.