Research Article
Security-Level Improvement of IoT-Based Systems Using Biometric Features
Table 1
Shows summarizing the metrics and limitations of various methods.
| Method | Decentralized management | Security features | Platform independence | Ability to integrate in... | Security | Authentication | Integrity | Cloud | Fog | IoT |
| Rahmani [7] | ✓ | ✓ | ✓ | ✗ | ✗ | ✓ | ✓ | ✓ | Dubey [8] | ✓ | ✓ | ✓ | ✗ | ✗ | ✗ | ✓ | ✓ | Azimi [9] | ✓ | ✓ | ✓ | ✗ | ✗ | ✓ | ✓ | ✓ | Gia [10] | ✓ | ✓ | ✓ | ✗ | ✗ | ✗ | ✓ | ✓ | Hu [11] | ✗ | ✗ | ✗ | ✗ | ✗ | ✓ | ✓ | ✓ | Suneetha et al. [12] | ✗ | ✗ | ✓ | ✗ | ✗ | ✓ | ✓ | ✓ | Jaberi, et.al. 2021 | ✗ | ✗ | ✓ | ✓ | ✓ | ✗ | ✓ | ✓ | Proposed | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
|
|