Research Article

Security-Level Improvement of IoT-Based Systems Using Biometric Features

Table 1

Shows summarizing the metrics and limitations of various methods.

MethodDecentralized managementSecurity featuresPlatform independenceAbility to integrate in...
SecurityAuthenticationIntegrityCloudFogIoT

Rahmani [7]
Dubey [8]
Azimi [9]
Gia [10]
Hu [11]
Suneetha et al. [12]
Jaberi, et.al. 2021
Proposed