Research Article
Security-Level Improvement of IoT-Based Systems Using Biometric Features
Table 10
Evaluation of security in the second Markov model with the assumption of using a password (constant value of b and variable a).
| a | b | P(S) | P(F) | P(F) |
| 0.10 | 0.90 | 23.4 | 76.6 | 10 | 0.20 | 0.90 | 23.4 | 76.6 | 12.34 | 0.30 | 0.90 | 23.4 | 76.6 | 14.68 | 0.40 | 0.90 | 23.4 | 76.6 | 17.02 | 0.50 | 0.90 | 23.4 | 76.6 | 19.36 | 0.60 | 0.90 | 23.4 | 76.6 | 21.7 | 0.70 | 0.90 | 23.4 | 76.6 | 24.04 | 0.80 | 0.90 | 23.4 | 76.6 | 26.38 | 0.90 | 0.90 | 23.4 | 76.6 | 28.72 |
|
|