Research Article
Security-Level Improvement of IoT-Based Systems Using Biometric Features
| Security threat (%) | System security improvement (relative to each layer) | Layer 1: Biometric in sensor layer | Layer 2: Hashing in IoT controller | Layer 3: Application layer |
| 10 | 101.33 | 101.33 | 122.80 | 20 | 102.32 | 103.29 | 130.58 | 30 | 102.08 | 105.84 | 133.46 | 40 | 102.72 | 106.20 | 136.66 | 50 | 105.14 | 109.91 | 139.73 | 60 | 107.13 | 111.98 | 143.80 | 70 | 108.75 | 116.25 | 154.07 | 80 | 112.41 | 119.26 | 164.19 | 90 | 114.22 | 120.04 | 174.83 | Average | 106.23 | 110.45 | 144.46 | 120.38 |
|
|