Research Article

Security-Level Improvement of IoT-Based Systems Using Biometric Features

Figure 12

Combining hash and fingerprint biometric encryption algorithms.