Research Article

Security-Level Improvement of IoT-Based Systems Using Biometric Features

Table 16

Comparison results.

Security threat (%)System security improvement (relative to each layer)
Layer 1: Biometric in sensor layerLayer 2: Hashing in IoT controllerLayer 3: Application layer

10101.33101.33122.80
20102.32103.29130.58
30102.08105.84133.46
40102.72106.20136.66
50105.14109.91139.73
60107.13111.98143.80
70108.75116.25154.07
80112.41119.26164.19
90114.22120.04174.83
Average106.23110.45144.46
120.38