Research Article
Security-Level Improvement of IoT-Based Systems Using Biometric Features
Table 11
Evaluation of security in the second Markov model with the assumption of using a password (constant value of a and variable b).
| a | b | P(S) | P(F) | P(F) |
| 0.10 | 0.10 | 23.4 | 76.6 | 71.28 | 0.10 | 0.20 | 23.4 | 76.6 | 63.62 | 0.10 | 0.30 | 23.4 | 76.6 | 55.96 | 0.10 | 0.40 | 23.4 | 76.6 | 48.3 | 0.10 | 0.50 | 23.4 | 76.6 | 40.64 | 0.10 | 0.60 | 23.4 | 76.6 | 32.98 | 0.10 | 0.70 | 23.4 | 76.6 | 25.32 | 0.10 | 0.80 | 23.4 | 76.6 | 17.66 | 0.10 | 0.90 | 23.4 | 76.6 | 10 |
|
|