Research Article
Security-Level Improvement of IoT-Based Systems Using Biometric Features
Table 12
Evaluation of security in the second Markov model with the assumption of using biometric (constant value of b and variable a).
| a | b | P(S) | P(F) | P(F) |
| 0.10 | 0.90 | 31.9 | 68.1 | 10 | 0.20 | 0.90 | 31.9 | 68.1 | 13.19 | 0.30 | 0.90 | 31.9 | 68.1 | 16.38 | 0.40 | 0.90 | 31.9 | 68.1 | 19.57 | 0.50 | 0.90 | 31.9 | 68.1 | 22.76 | 0.60 | 0.90 | 31.9 | 68.1 | 25.95 | 0.70 | 0.90 | 31.9 | 68.1 | 29.14 | 0.80 | 0.90 | 31.9 | 68.1 | 32.33 | 0.90 | 0.90 | 31.9 | 68.1 | 35.52 |
|
|