Research Article
Security-Level Improvement of IoT-Based Systems Using Biometric Features
Table 13
Evaluation of security in the second Markov model with the assumption of using biometric (constant value of a and variable b).
| a | b | P(S) | P(F) | P(F) |
| 0.10 | 0.10 | 31.9 | 68.1 | 64.48 | 0.10 | 0.20 | 31.9 | 68.1 | 57.67 | 0.10 | 0.30 | 31.9 | 68.1 | 50.86 | 0.10 | 0.40 | 31.9 | 68.1 | 44.05 | 0.10 | 0.50 | 31.9 | 68.1 | 37.24 | 0.10 | 0.60 | 31.9 | 68.1 | 30.43 | 0.10 | 0.70 | 31.9 | 68.1 | 23.62 | 0.10 | 0.80 | 31.9 | 68.1 | 16.81 | 0.10 | 0.90 | 31.9 | 68.1 | 10 |
|
|