Research Article

Security-Level Improvement of IoT-Based Systems Using Biometric Features

Figure 16

Schematic of implementing the IoT application.