Research Article
Using Physical Context-Based Authentication against External Attacks: Models and Protocols
Figure 6
How is generated from packets tracing information.
(a) Packets of the same source address |
(b) Packets frequency distribution histogram |
(c) Histogram binary representation (partial ID) |