Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2018, Article ID 6590928, 14 pages
Research Article

Using Physical Context-Based Authentication against External Attacks: Models and Protocols

1National Institute of Metrology, Quality and Technology, Rio de Janeiro, RJ, Brazil
2Federal Center for Technological Education, Rio de Janeiro, RJ, Brazil
3Federal University of Rio de Janeiro, Rio de Janeiro, RJ, Brazil

Correspondence should be addressed to Wilson S. Melo Jr.; rb.vog.ortemni@roinujsw

Received 25 August 2017; Revised 17 December 2017; Accepted 21 January 2018; Published 25 February 2018

Academic Editor: Indrakshi Ray

Copyright © 2018 Wilson S. Melo Jr. et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.


Modern systems are increasingly dependent on the integration of physical processes and information technologies. This trend is remarkable in applications involving sensor networks, cyberphysical systems, and Internet of Things. Despite its complexity, such integration results in physical context information that can be used to improve security, especially authentication. In this paper, we show that entities sharing the same physical context can use it for establishing a secure communication channel and protecting each other against external attacks. We present such approach proposing a theoretical model for generating unique bitstreams. Two different protocols are suggested. Each one is evaluated using probabilistic analysis and simulation. In the end, we implement the authentication mechanism in a case study using networks radio signal as physical event generator. The results demonstrate the performance of each of the protocols and their suitability for applications in real world.